Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-1000876 (GCVE-0-2018-1000876)
Vulnerability from cvelistv5
- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T12:47:57.189Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=3a551c7a1b80fca579461774860574eabfd7f18f"
},
{
"name": "106304",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/106304"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23994"
},
{
"name": "RHSA-2019:2075",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2075"
},
{
"name": "openSUSE-SU-2019:2415",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html"
},
{
"name": "openSUSE-SU-2019:2432",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html"
},
{
"name": "USN-4336-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/4336-1/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"dateAssigned": "2018-12-19T00:00:00",
"datePublic": "2018-12-20T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "binutils version 2.32 and earlier contains a Integer Overflow vulnerability in objdump, bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc that can result in Integer overflow trigger heap overflow. Successful exploitation allows execution of arbitrary code.. This attack appear to be exploitable via Local. This vulnerability appears to have been fixed in after commit 3a551c7a1b80fca579461774860574eabfd7f18f."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-04-29T02:06:35",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=3a551c7a1b80fca579461774860574eabfd7f18f"
},
{
"name": "106304",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/106304"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23994"
},
{
"name": "RHSA-2019:2075",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2075"
},
{
"name": "openSUSE-SU-2019:2415",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html"
},
{
"name": "openSUSE-SU-2019:2432",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html"
},
{
"name": "USN-4336-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/4336-1/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2018-12-19T20:52:45.262881",
"DATE_REQUESTED": "2018-12-17T03:18:24",
"ID": "CVE-2018-1000876",
"REQUESTER": "yanshb@gmail.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "binutils version 2.32 and earlier contains a Integer Overflow vulnerability in objdump, bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc that can result in Integer overflow trigger heap overflow. Successful exploitation allows execution of arbitrary code.. This attack appear to be exploitable via Local. This vulnerability appears to have been fixed in after commit 3a551c7a1b80fca579461774860574eabfd7f18f."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=3a551c7a1b80fca579461774860574eabfd7f18f",
"refsource": "MISC",
"url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=3a551c7a1b80fca579461774860574eabfd7f18f"
},
{
"name": "106304",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106304"
},
{
"name": "https://sourceware.org/bugzilla/show_bug.cgi?id=23994",
"refsource": "MISC",
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23994"
},
{
"name": "RHSA-2019:2075",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:2075"
},
{
"name": "openSUSE-SU-2019:2415",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html"
},
{
"name": "openSUSE-SU-2019:2432",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html"
},
{
"name": "USN-4336-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/4336-1/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2018-1000876",
"datePublished": "2018-12-20T17:00:00",
"dateReserved": "2018-12-17T00:00:00",
"dateUpdated": "2024-08-05T12:47:57.189Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2018-1000876\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2018-12-20T17:29:01.033\",\"lastModified\":\"2024-11-21T03:40:33.533\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"binutils version 2.32 and earlier contains a Integer Overflow vulnerability in objdump, bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc that can result in Integer overflow trigger heap overflow. Successful exploitation allows execution of arbitrary code.. This attack appear to be exploitable via Local. This vulnerability appears to have been fixed in after commit 3a551c7a1b80fca579461774860574eabfd7f18f.\"},{\"lang\":\"es\",\"value\":\"binutils, en versiones 2.32 y anteriores, contiene una vulnerabilidad de desbordamiento de enteros en objdump, bfd_get_dynamic_reloc_upper_bound y bfd_canonicalize_dynamic_reloc que puede resultar en un desbordamiento de enteros que desencadena un desbordamiento de memoria din\u00e1mica (heap). Si se explota con \u00e9xito, podr\u00eda conducir a la ejecuci\u00f3n de c\u00f3digo arbitrario. Este ataque parece ser explotable localmente. La vulnerabilidad parece haber sido solucionada tras el commit con ID 3a551c7a1b80fca579461774860574eabfd7f18f.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":4.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"},{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.32\",\"matchCriteriaId\":\"28CC79FD-6BF9-4B39-970C-C509C931C6C1\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C068A4-3780-4EAB-A937-6082DF847564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF4996-72F4-4FA4-814F-F5991E7A8318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.securityfocus.com/bid/106304\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2075\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://sourceware.org/bugzilla/show_bug.cgi?id=23994\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=3a551c7a1b80fca579461774860574eabfd7f18f\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://usn.ubuntu.com/4336-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.securityfocus.com/bid/106304\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2075\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://sourceware.org/bugzilla/show_bug.cgi?id=23994\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=3a551c7a1b80fca579461774860574eabfd7f18f\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://usn.ubuntu.com/4336-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
RHBA-2020:0547
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Container Image Rebuild for Ansible Tower 3.4 Dependency",
"title": "Topic"
},
{
"category": "general",
"text": "The ansible-tower-memcached container image has been updated for Red Hat Ansible Tower 3.4 for RHEL 7 to address security advisories:\n\nRHSA-2019:2030\nRHSA-2019:2118\nRHSA-2019:2136\nRHSA-2019:2197\nRHSA-2019:2237\nRHSA-2019:2304\nRHSA-2019:4190\nRHSA-2020:0227",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2020:0547",
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
},
{
"category": "external",
"summary": "https://access.redhat.com/errata/RHSA-2019:2030",
"url": "https://access.redhat.com/errata/RHSA-2019:2030"
},
{
"category": "external",
"summary": "https://access.redhat.com/errata/RHSA-2019:2118",
"url": "https://access.redhat.com/errata/RHSA-2019:2118"
},
{
"category": "external",
"summary": "https://access.redhat.com/errata/RHSA-2019:2136",
"url": "https://access.redhat.com/errata/RHSA-2019:2136"
},
{
"category": "external",
"summary": "https://access.redhat.com/errata/RHSA-2019:2197",
"url": "https://access.redhat.com/errata/RHSA-2019:2197"
},
{
"category": "external",
"summary": "https://access.redhat.com/errata/RHSA-2019:2237",
"url": "https://access.redhat.com/errata/RHSA-2019:2237"
},
{
"category": "external",
"summary": "https://access.redhat.com/errata/RHSA-2019:2304",
"url": "https://access.redhat.com/errata/RHSA-2019:2304"
},
{
"category": "external",
"summary": "https://access.redhat.com/errata/RHSA-2019:4190",
"url": "https://access.redhat.com/errata/RHSA-2019:4190"
},
{
"category": "external",
"summary": "https://access.redhat.com/errata/RHSA-2020:0227",
"url": "https://access.redhat.com/errata/RHSA-2020:0227"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhba-2020_0547.json"
}
],
"title": "Red Hat Bug Fix Advisory: Container Image Rebuild for Ansible Tower 3.4 Dependency",
"tracking": {
"current_release_date": "2025-11-25T18:21:27+00:00",
"generator": {
"date": "2025-11-25T18:21:27+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHBA-2020:0547",
"initial_release_date": "2020-02-18T15:13:57+00:00",
"revision_history": [
{
"date": "2020-02-18T15:13:57+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-02-18T15:13:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-25T18:21:27+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Ansible Tower 3.4 for RHEL 7 Server",
"product": {
"name": "Red Hat Ansible Tower 3.4 for RHEL 7 Server",
"product_id": "7Server-Ansible-Tower-3.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ansible_tower:3.4::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Ansible Tower"
},
{
"branches": [
{
"category": "product_version",
"name": "ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"product": {
"name": "ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"product_id": "ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c?arch=amd64\u0026repository_url=registry.redhat.io/ansible-tower-37/ansible-tower-memcached-rhel7\u0026tag=1.4.15-28"
}
}
},
{
"category": "product_version",
"name": "ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"product": {
"name": "ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"product_id": "ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c?arch=amd64\u0026repository_url=registry.redhat.io/ansible-tower-35/ansible-tower-memcached\u0026tag=1.4.15-28"
}
}
},
{
"category": "product_version",
"name": "ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"product": {
"name": "ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"product_id": "ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c?arch=amd64\u0026repository_url=registry.redhat.io/ansible-tower-34/ansible-tower-memcached\u0026tag=1.4.15-28"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64 as a component of Red Hat Ansible Tower 3.4 for RHEL 7 Server",
"product_id": "7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
},
"product_reference": "ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"relates_to_product_reference": "7Server-Ansible-Tower-3.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64 as a component of Red Hat Ansible Tower 3.4 for RHEL 7 Server",
"product_id": "7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
},
"product_reference": "ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"relates_to_product_reference": "7Server-Ansible-Tower-3.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64 as a component of Red Hat Ansible Tower 3.4 for RHEL 7 Server",
"product_id": "7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
},
"product_reference": "ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"relates_to_product_reference": "7Server-Ansible-Tower-3.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-10739",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2016-02-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1347549"
}
],
"notes": [
{
"category": "description",
"text": "In the GNU C Library (aka glibc or libc6) through 2.28, the getaddrinfo function would successfully parse a string that contained an IPv4 address followed by whitespace and arbitrary characters, which could lead applications to incorrectly assume that it had parsed a valid string, without the possibility of embedded HTTP headers or other potentially dangerous substrings.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glibc: getaddrinfo should reject IP addresses with trailing characters",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security has rated this issue as having Moderate security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-10739"
},
{
"category": "external",
"summary": "RHBZ#1347549",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1347549"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-10739",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10739"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-10739",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10739"
}
],
"release_date": "2016-04-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glibc: getaddrinfo should reject IP addresses with trailing characters"
},
{
"cve": "CVE-2018-0495",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-06-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1591163"
}
],
"notes": [
{
"category": "description",
"text": "Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Since the 5.8.3 release, Red Hat CloudForms no longer uses libtomcrypt.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-0495"
},
{
"category": "external",
"summary": "RHBZ#1591163",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591163"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-0495",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0495"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0495",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0495"
},
{
"category": "external",
"summary": "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/",
"url": "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/"
}
],
"release_date": "2018-06-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries"
},
{
"cve": "CVE-2018-0734",
"cwe": {
"id": "CWE-385",
"name": "Covert Timing Channel"
},
"discovery_date": "2018-10-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1644364"
}
],
"notes": [
{
"category": "description",
"text": "The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: timing side channel attack in the DSA signature algorithm",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-0734"
},
{
"category": "external",
"summary": "RHBZ#1644364",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644364"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-0734",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0734"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0734",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0734"
}
],
"release_date": "2018-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: timing side channel attack in the DSA signature algorithm"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Labs"
]
}
],
"cve": "CVE-2018-1122",
"cwe": {
"id": "CWE-829",
"name": "Inclusion of Functionality from Untrusted Control Sphere"
},
"discovery_date": "2018-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1575466"
}
],
"notes": [
{
"category": "description",
"text": "If the HOME environment variable is unset or empty, top will read its configuration file from the current working directory without any security check. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "procps: Local privilege escalation in top",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1122"
},
{
"category": "external",
"summary": "RHBZ#1575466",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575466"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1122"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1122",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1122"
},
{
"category": "external",
"summary": "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt",
"url": "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt"
}
],
"release_date": "2018-05-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "procps: Local privilege escalation in top"
},
{
"cve": "CVE-2018-5818",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2018-12-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1661608"
}
],
"notes": [
{
"category": "description",
"text": "An error within the \"parse_rollei()\" function (internal/dcraw_common.cpp) within LibRaw versions prior to 0.19.1 can be exploited to trigger an infinite loop.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "LibRaw: DoS in parse_rollei function in internal/dcraw_common.cpp",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-5818"
},
{
"category": "external",
"summary": "RHBZ#1661608",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661608"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-5818",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5818"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5818",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5818"
}
],
"release_date": "2018-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "LibRaw: DoS in parse_rollei function in internal/dcraw_common.cpp"
},
{
"cve": "CVE-2018-5819",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2018-12-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1661604"
}
],
"notes": [
{
"category": "description",
"text": "An error within the \"parse_sinar_ia()\" function (internal/dcraw_common.cpp) within LibRaw versions prior to 0.19.1 can be exploited to exhaust available CPU resources.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "LibRaw: DoS in parse_sinar_ia function in internal/dcraw_common.cpp",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-5819"
},
{
"category": "external",
"summary": "RHBZ#1661604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661604"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-5819",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5819"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5819",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5819"
}
],
"release_date": "2018-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "LibRaw: DoS in parse_sinar_ia function in internal/dcraw_common.cpp"
},
{
"cve": "CVE-2018-12404",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-12-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1657913"
}
],
"notes": [
{
"category": "description",
"text": "A cached side channel attack during handshakes using RSA encryption could allow for the decryption of encrypted content. This is a variant of the Adaptive Chosen Ciphertext attack (AKA Bleichenbacher attack) and affects all NSS versions prior to NSS 3.41.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nss: Cache side-channel variant of the Bleichenbacher attack",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12404"
},
{
"category": "external",
"summary": "RHBZ#1657913",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1657913"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12404",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12404"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12404",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12404"
}
],
"release_date": "2018-11-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nss: Cache side-channel variant of the Bleichenbacher attack"
},
{
"cve": "CVE-2018-12641",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2018-06-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1594410"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in arm_pt in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there are recursive stack frames: demangle_arm_hp_template, demangle_class_name, demangle_fund_type, do_type, do_arg, demangle_args, and demangle_nested_args. This can occur during execution of nm-new.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "binutils: Stack Exhaustion in the demangling functions provided by libiberty",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The issue is classified as low severity primarily because binutils is not typically exposed to untrusted inputs in most environments, limiting its exploitation potential. The stack overflow in demangle_class_name() only triggers during the parsing of malformed ELF files, which would require an attacker to convince a user to process a malicious file with binutils. Moreover, binutils does not handle privileged operations, meaning exploitation is unlikely to lead to system compromise or escalation of privileges. Additionally, the impact is localized to the application itself, without affecting the broader system or network security.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12641"
},
{
"category": "external",
"summary": "RHBZ#1594410",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1594410"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12641",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12641"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12641",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12641"
}
],
"release_date": "2018-04-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "binutils: Stack Exhaustion in the demangling functions provided by libiberty"
},
{
"cve": "CVE-2018-12697",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2018-06-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1595417"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference (aka SEGV on unknown address 0x000000000000) was discovered in work_stuff_copy_to_from in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. This can occur during execution of objdump.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "binutils: NULL pointer dereference in work_stuff_copy_to_from in cplus-dem.c.",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is classified with a low severity primarily because binutils is not typically exposed to untrusted inputs in most environments, limiting the possibility of exploitation. Additionally, this NULL pointer dereference is only triggered during the parsing of a specially crafted file, requiring an attacker to convince a user to process this file with objdump. Furthermore, binutils does not handle privileged operations, meaning that exploitation is unlikely to lead to system compromise or escalation of privileges. Also, the impact is limited to the application itself, without affecting the broader system or network security.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12697"
},
{
"category": "external",
"summary": "RHBZ#1595417",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1595417"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12697",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12697"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12697",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12697"
}
],
"release_date": "2018-04-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "binutils: NULL pointer dereference in work_stuff_copy_to_from in cplus-dem.c."
},
{
"acknowledgments": [
{
"names": [
"the Curl project"
]
},
{
"names": [
"Zhaoyang Wu"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-14618",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2018-08-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1622707"
}
],
"notes": [
{
"category": "description",
"text": "curl before version 7.61.1 is vulnerable to a buffer overrun in the NTLM authentication code. The internal function Curl_ntlm_core_mk_nt_hash multiplies the length of the password by two (SUM) to figure out how large temporary storage area to allocate from the heap. The length value is then subsequently used to iterate over the password and generate output into the allocated storage buffer. On systems with a 32 bit size_t, the math to calculate SUM triggers an integer overflow when the password length exceeds 2GB (2^31 bytes). This integer overflow usually causes a very small buffer to actually get allocated instead of the intended very huge one, making the use of that buffer end up in a heap buffer overflow. (This bug is almost identical to CVE-2017-8816.)",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: NTLM password overflow via integer overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-14618"
},
{
"category": "external",
"summary": "RHBZ#1622707",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1622707"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-14618",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14618"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14618",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14618"
},
{
"category": "external",
"summary": "https://curl.haxx.se/docs/CVE-2018-14618.html",
"url": "https://curl.haxx.se/docs/CVE-2018-14618.html"
}
],
"release_date": "2018-09-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "curl: NTLM password overflow via integer overflow"
},
{
"acknowledgments": [
{
"names": [
"the Python Security Response Team"
]
}
],
"cve": "CVE-2018-14647",
"cwe": {
"id": "CWE-335",
"name": "Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)"
},
"discovery_date": "2018-09-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1631822"
}
],
"notes": [
{
"category": "description",
"text": "Python\u0027s elementtree C accelerator failed to initialise Expat\u0027s hash salt during initialization. This could make it easy to conduct denial of service attacks against Expat by contructing an XML document that would cause pathological hash collisions in Expat\u0027s internal data structures, consuming large amounts CPU and RAM.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: Missing salt initialization in _elementtree.c module",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-14647"
},
{
"category": "external",
"summary": "RHBZ#1631822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1631822"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-14647",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14647"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14647",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14647"
},
{
"category": "external",
"summary": "https://bugs.python.org/issue34623",
"url": "https://bugs.python.org/issue34623"
}
],
"release_date": "2018-09-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: Missing salt initialization in _elementtree.c module"
},
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ubuntu"
]
}
],
"cve": "CVE-2018-15686",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2018-10-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1639071"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered that systemd is vulnerable to a state injection attack when deserializing the state of a service. Properties longer than LINE_MAX are not correctly parsed and an attacker may abuse this flaw in particularly configured services to inject, change, or corrupt the service state.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "systemd: line splitting via fgets() allows for state injection during daemon-reexec",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-15686"
},
{
"category": "external",
"summary": "RHBZ#1639071",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1639071"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-15686",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15686"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-15686",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-15686"
}
],
"release_date": "2018-10-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.6,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "systemd: line splitting via fgets() allows for state injection during daemon-reexec"
},
{
"cve": "CVE-2018-16062",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2018-08-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1623752"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds read was discovered in elfutils in the way it reads DWARF address ranges information. Function dwarf_getaranges() in dwarf_getaranges.c does not properly check whether it reads beyond the limits of the ELF section. An attacker could use this flaw to cause a denial of service via a crafted file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "elfutils: Heap-based buffer over-read in libdw/dwarf_getaranges.c:dwarf_getaranges() via crafted file",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-16062"
},
{
"category": "external",
"summary": "RHBZ#1623752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1623752"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-16062",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16062"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16062",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16062"
}
],
"release_date": "2018-08-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "elfutils: Heap-based buffer over-read in libdw/dwarf_getaranges.c:dwarf_getaranges() via crafted file"
},
{
"cve": "CVE-2018-16402",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2018-09-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1625050"
}
],
"notes": [
{
"category": "description",
"text": "libelf/elf_end.c in elfutils 0.173 allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact because it tries to decompress twice.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "elfutils: Double-free due to double decompression of sections in crafted ELF causes crash",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-16402"
},
{
"category": "external",
"summary": "RHBZ#1625050",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1625050"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-16402",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16402"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16402",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16402"
}
],
"release_date": "2018-08-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "elfutils: Double-free due to double decompression of sections in crafted ELF causes crash"
},
{
"cve": "CVE-2018-16403",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2018-09-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1625055"
}
],
"notes": [
{
"category": "description",
"text": "libdw in elfutils 0.173 checks the end of the attributes list incorrectly in dwarf_getabbrev in dwarf_getabbrev.c and dwarf_hasattr in dwarf_hasattr.c, leading to a heap-based buffer over-read and an application crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "elfutils: Heap-based buffer over-read in libdw/dwarf_getabbrev.c and libwd/dwarf_hasattr.c causes crash",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-16403"
},
{
"category": "external",
"summary": "RHBZ#1625055",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1625055"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-16403",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16403"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16403",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16403"
}
],
"release_date": "2018-08-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "elfutils: Heap-based buffer over-read in libdw/dwarf_getabbrev.c and libwd/dwarf_hasattr.c causes crash"
},
{
"acknowledgments": [
{
"names": [
"the Curl project"
]
},
{
"names": [
"Brian Carpenter"
],
"organization": "Geeknik Labs",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-16842",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2018-10-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1644124"
}
],
"notes": [
{
"category": "description",
"text": "Curl versions 7.14.1 through 7.61.1 are vulnerable to a heap-based buffer over-read in the tool_msgs.c:voutf() function that may result in information exposure and denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: Heap-based buffer over-read in the curl tool warning formatting",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-16842"
},
{
"category": "external",
"summary": "RHBZ#1644124",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644124"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-16842",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16842"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16842",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16842"
},
{
"category": "external",
"summary": "https://curl.haxx.se/docs/CVE-2018-16842.html",
"url": "https://curl.haxx.se/docs/CVE-2018-16842.html"
}
],
"release_date": "2018-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.6,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "curl: Heap-based buffer over-read in the curl tool warning formatting"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Labs"
]
}
],
"cve": "CVE-2018-16866",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-11-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1653867"
}
],
"notes": [
{
"category": "description",
"text": "An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon \u0027:\u0027. A local attacker can use this flaw to disclose process memory data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "systemd: out-of-bounds read when parsing a crafted syslog message",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of systemd as shipped with Red Hat Enterprise Linux 7. Red Hat Product Security has rated this issue as having a security impact of Moderate. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.\n\nRed Hat Virtualization Hypervisor and Management Appliance include vulnerable versions of systemd. However, since exploitation requires local access and impact is restricted to information disclosure, this flaw is rated as having a security issue of Low. Future updates may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-16866"
},
{
"category": "external",
"summary": "RHBZ#1653867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1653867"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-16866",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16866"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16866",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16866"
},
{
"category": "external",
"summary": "https://www.qualys.com/2019/01/09/system-down/system-down.txt",
"url": "https://www.qualys.com/2019/01/09/system-down/system-down.txt"
}
],
"release_date": "2019-01-09T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "systemd: out-of-bounds read when parsing a crafted syslog message"
},
{
"cve": "CVE-2018-16888",
"cwe": {
"id": "CWE-250",
"name": "Execution with Unnecessary Privileges"
},
"discovery_date": "2019-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1662867"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered systemd does not correctly check the content of PIDFile files before using it to kill processes. When a service is run from an unprivileged user (e.g. User field set in the service file), a local attacker who is able to write to the PIDFile of the mentioned service may use this flaw to trick systemd into killing other services and/or privileged processes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "systemd: kills privileged process if unprivileged PIDFile was tampered",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-16888"
},
{
"category": "external",
"summary": "RHBZ#1662867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1662867"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-16888",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16888"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16888",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16888"
}
],
"release_date": "2017-08-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "systemd: kills privileged process if unprivileged PIDFile was tampered"
},
{
"cve": "CVE-2018-18310",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2018-10-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1642604"
}
],
"notes": [
{
"category": "description",
"text": "An invalid memory address dereference was discovered in dwfl_segment_report_module.c in libdwfl in elfutils through v0.174. The vulnerability allows attackers to cause a denial of service (application crash) with a crafted ELF file, as demonstrated by consider_notes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "elfutils: invalid memory address dereference was discovered in dwfl_segment_report_module.c in libdwfl",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of elfutils as shipped with Red Hat Enterprise Linux 5, 6, and 7.\n\nRed Hat Enterprise Linux 5 is now in Extended Life Phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nRed Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Low, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-18310"
},
{
"category": "external",
"summary": "RHBZ#1642604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1642604"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-18310",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18310"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-18310",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-18310"
}
],
"release_date": "2018-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "elfutils: invalid memory address dereference was discovered in dwfl_segment_report_module.c in libdwfl"
},
{
"cve": "CVE-2018-18520",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2018-10-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646477"
}
],
"notes": [
{
"category": "description",
"text": "An Invalid Memory Address Dereference exists in the function elf_end in libelf in elfutils through v0.174. Although eu-size is intended to support ar files inside ar files, handle_ar in size.c closes the outer ar file before handling all inner entries. The vulnerability allows attackers to cause a denial of service (application crash) with a crafted ELF file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "elfutils: eu-size cannot handle recursive ar files",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of elfutils as shipped with Red Hat Enterprise Linux 5, 6, and 7.\n\nRed Hat Enterprise Linux 5 is now in Extended Life Phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nRed Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Low, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-18520"
},
{
"category": "external",
"summary": "RHBZ#1646477",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646477"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-18520",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18520"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-18520",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-18520"
}
],
"release_date": "2018-10-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "elfutils: eu-size cannot handle recursive ar files"
},
{
"cve": "CVE-2018-18521",
"cwe": {
"id": "CWE-369",
"name": "Divide By Zero"
},
"discovery_date": "2018-10-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646482"
}
],
"notes": [
{
"category": "description",
"text": "Divide-by-zero vulnerabilities in the function arlib_add_symbols() in arlib.c in elfutils 0.174 allow remote attackers to cause a denial of service (application crash) with a crafted ELF file, as demonstrated by eu-ranlib, because a zero sh_entsize is mishandled.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "elfutils: Divide-by-zero in arlib_add_symbols function in arlib.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of elfutils as shipped with Red Hat Enterprise Linux 5, 6, and 7.\n\nRed Hat Enterprise Linux 5 is now in Extended Life Phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nRed Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Low, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-18521"
},
{
"category": "external",
"summary": "RHBZ#1646482",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646482"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-18521",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18521"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-18521",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-18521"
}
],
"release_date": "2018-10-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "elfutils: Divide-by-zero in arlib_add_symbols function in arlib.c"
},
{
"cve": "CVE-2018-20217",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"discovery_date": "2018-12-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1665296"
}
],
"notes": [
{
"category": "description",
"text": "A Reachable Assertion issue was discovered in the KDC in MIT Kerberos 5 (aka krb5) before 1.17. If an attacker can obtain a krbtgt ticket using an older encryption type (single-DES, triple-DES, or RC4), the attacker can crash the KDC by making an S4U2Self request.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: Reachable assertion in the KDC using S4U2Self requests",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-20217"
},
{
"category": "external",
"summary": "RHBZ#1665296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1665296"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-20217",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20217"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-20217",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20217"
}
],
"release_date": "2018-12-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "krb5: Reachable assertion in the KDC using S4U2Self requests"
},
{
"cve": "CVE-2018-1000876",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2018-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1664699"
}
],
"notes": [
{
"category": "description",
"text": "binutils version 2.32 and earlier contains a Integer Overflow vulnerability in objdump, bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc that can result in Integer overflow trigger heap overflow. Successful exploitation allows execution of arbitrary code.. This attack appear to be exploitable via Local. This vulnerability appears to have been fixed in after commit 3a551c7a1b80fca579461774860574eabfd7f18f.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "binutils: integer overflow leads to heap-based buffer overflow in objdump",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The issue is classified as moderate severity primarily because of the unlikelihood of running a 32bit compiled objdump and/or having a compiled binary that uses 32bit compiled binutils libraries to analyze binaries from a not trusted source. Moreover, binutils does not handle privileged operations, meaning exploitation is unlikely to lead to system compromise or escalation of privileges. Additionally, the impact is localized to the application itself, without affecting the broader system or network security. \n\nAs per upstream binutils security policy this issue is not considered as a security flaw. Basically the key element of the policy that affects this is the understanding that analysis of untrusted binaries must always be done in a sandbox because the ELF format is open ended enough to make the analysis tools do anything, like including and processing arbitrary files. This eliminates the only possible vulnerability vector here, which is the possibility of a user being tricked into downloading and analyzing an untrusted ELF without sandboxing.\n\nSee the binutils security policy for more details:\nhttps://sourceware.org/cgit/binutils-gdb/tree/binutils/SECURITY.txt\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-190: Integer Overflow leading to a CWE-122: Heap-based Buffer Overflow vulnerability, and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token-based multi-factor authentication (MFA) and enforced through least privilege, ensuring only authorized users can execute or modify code. Red Hat also applies least functionality, enabling only essential features, services, and ports to reduce the attack surface for heap-based buffer overflow exploits. The environment uses IPS/IDS and antimalware solutions to detect and respond to threats in real time, helping prevent or limit exploitation attempts. Static code analysis and peer reviews ensure all user inputs are thoroughly validated, reducing the risk of system instability, data exposure, or privilege escalation. Finally, memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) enhance resilience against buffer overflows and denial-of-service attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1000876"
},
{
"category": "external",
"summary": "RHBZ#1664699",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1664699"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000876"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000876",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000876"
}
],
"release_date": "2018-12-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "binutils: integer overflow leads to heap-based buffer overflow in objdump"
},
{
"cve": "CVE-2019-1559",
"cwe": {
"id": "CWE-325",
"name": "Missing Cryptographic Step"
},
"discovery_date": "2019-02-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1683804"
}
],
"notes": [
{
"category": "description",
"text": "If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt data. In order for this to be exploitable \"non-stitched\" ciphersuites must be in use. Stitched ciphersuites are optimised implementations of certain commonly used ciphersuites. Also the application must call SSL_shutdown() twice even if a protocol error has occurred (applications should not do this but some do anyway). Fixed in OpenSSL 1.0.2r (Affected 1.0.2-1.0.2q).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: 0-byte record padding oracle",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "1 For this issue to be exploitable, the (server) application using the OpenSSL library needs to use it incorrectly.\n2. There are multiple other requirements for the attack to succeed: \n - The ciphersuite used must be obsolete CBC cipher without a stitched implementation (or the system be in FIPS mode)\n - the attacker has to be a MITM\n - the attacker has to be able to control the client side to send requests to the buggy server on demand",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-1559"
},
{
"category": "external",
"summary": "RHBZ#1683804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1683804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-1559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1559"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-1559",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1559"
},
{
"category": "external",
"summary": "https://github.com/RUB-NDS/TLS-Padding-Oracles",
"url": "https://github.com/RUB-NDS/TLS-Padding-Oracles"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20190226.txt",
"url": "https://www.openssl.org/news/secadv/20190226.txt"
}
],
"release_date": "2019-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
},
{
"category": "workaround",
"details": "As a workaround you can disable SHA384 if applications (compiled with OpenSSL) allow for adjustment of the ciphersuite string configuration.",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: 0-byte record padding oracle"
},
{
"acknowledgments": [
{
"names": [
"the libssh2 project"
]
},
{
"names": [
"Chris Coulson"
],
"organization": "Canonical Ltd.",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2019-3858",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2019-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1687306"
}
],
"notes": [
{
"category": "description",
"text": "An out of bounds read flaw was discovered in libssh2 when a specially crafted SFTP packet is received from the server. A remote attacker who compromises a SSH server may be able to cause a denial of service or read data in the client memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libssh2: Zero-byte allocation with a specially crafted SFTP packed leading to an out-of-bounds read",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw was present in libssh2 packages included in Red Hat Virtualization Hypervisor and Management Appliance, however libssh2 in these hosts is never exposed to malicious clients or servers.\n\nlibssh2 is no longer included in the virt module since Red Hat Enterprise Linux 8.1.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-3858"
},
{
"category": "external",
"summary": "RHBZ#1687306",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1687306"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-3858",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3858"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3858",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3858"
},
{
"category": "external",
"summary": "https://www.libssh2.org/CVE-2019-3858.html",
"url": "https://www.libssh2.org/CVE-2019-3858.html"
}
],
"release_date": "2019-03-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libssh2: Zero-byte allocation with a specially crafted SFTP packed leading to an out-of-bounds read"
},
{
"acknowledgments": [
{
"names": [
"the libssh2 project"
]
},
{
"names": [
"Chris Coulson"
],
"organization": "Canonical Ltd.",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2019-3861",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2019-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1687311"
}
],
"notes": [
{
"category": "description",
"text": "An out of bounds read flaw was discovered in libssh2 in the way SSH packets with a padding length value greater than the packet length are parsed. A remote attacker who compromises a SSH server may be able to cause a denial of service or read data in the client memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libssh2: Out-of-bounds reads with specially crafted SSH packets",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw was present in libssh2 packages included in Red Hat Virtualization Hypervisor and Management Appliance, however libssh2 in these hosts is never exposed to malicious clients or servers.\n\nlibssh2 is no longer included in the virt module since Red Hat Enterprise Linux 8.1.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-3861"
},
{
"category": "external",
"summary": "RHBZ#1687311",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1687311"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-3861",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3861"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3861",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3861"
},
{
"category": "external",
"summary": "https://www.libssh2.org/CVE-2019-3861.html",
"url": "https://www.libssh2.org/CVE-2019-3861.html"
}
],
"release_date": "2019-03-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libssh2: Out-of-bounds reads with specially crafted SSH packets"
},
{
"acknowledgments": [
{
"names": [
"the libssh2 project"
]
},
{
"names": [
"Chris Coulson"
],
"organization": "Canonical Ltd.",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2019-3862",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"discovery_date": "2019-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1687312"
}
],
"notes": [
{
"category": "description",
"text": "An out of bounds read flaw was discovered in libssh2 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit status message and no payload are parsed. A remote attacker who compromises a SSH server may be able to cause a denial of service or read data in the client memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libssh2: Out-of-bounds memory comparison with specially crafted message channel request",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw was present in libssh2 packages included in Red Hat Virtualization Hypervisor and Management Appliance, however libssh2 in these hosts is never exposed to malicious clients or servers.\n\nlibssh2 is no longer included in the virt module since Red Hat Enterprise Linux 8.1.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-3862"
},
{
"category": "external",
"summary": "RHBZ#1687312",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1687312"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-3862",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3862"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3862",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3862"
},
{
"category": "external",
"summary": "https://www.libssh2.org/CVE-2019-3862.html",
"url": "https://www.libssh2.org/CVE-2019-3862.html"
}
],
"release_date": "2019-03-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libssh2: Out-of-bounds memory comparison with specially crafted message channel request"
},
{
"cve": "CVE-2019-5010",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2019-01-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1666519"
}
],
"notes": [
{
"category": "description",
"text": "A null pointer dereference vulnerability was found in the certificate parsing code in Python. This causes a denial of service to applications when parsing specially crafted certificates. This vulnerability is unlikely to be triggered if application enables SSL/TLS certificate validation and accepts certificates only from trusted root certificate authorities.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: NULL pointer dereference using a specially crafted X509 certificate",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of python as shipped with Red Hat Enterprise Linux 5 and 6.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-5010"
},
{
"category": "external",
"summary": "RHBZ#1666519",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666519"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-5010",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5010"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5010",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5010"
},
{
"category": "external",
"summary": "https://python-security.readthedocs.io/vuln/ssl-crl-dps-dos.html",
"url": "https://python-security.readthedocs.io/vuln/ssl-crl-dps-dos.html"
}
],
"release_date": "2019-01-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: NULL pointer dereference using a specially crafted X509 certificate"
},
{
"cve": "CVE-2019-7149",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2019-01-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1671443"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer over-read was discovered in the function read_srclines in dwarf_getsrclines.c in libdw in elfutils 0.175. A crafted input can cause segmentation faults, leading to denial-of-service, as demonstrated by eu-nm.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "elfutils: heap-based buffer over-read in read_srclines in dwarf_getsrclines.c in libdw",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-7149"
},
{
"category": "external",
"summary": "RHBZ#1671443",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671443"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-7149",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7149"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-7149",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-7149"
}
],
"release_date": "2019-01-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "elfutils: heap-based buffer over-read in read_srclines in dwarf_getsrclines.c in libdw"
},
{
"cve": "CVE-2019-7150",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2019-01-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1671446"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in elfutils 0.175. A segmentation fault can occur in the function elf64_xlatetom in libelf/elf32_xlatetom.c, due to dwfl_segment_report_module not checking whether the dyn data read from a core file is truncated. A crafted input can cause a program crash, leading to denial-of-service, as demonstrated by eu-stack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "elfutils: segmentation fault in elf64_xlatetom in libelf/elf32_xlatetom.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-7150"
},
{
"category": "external",
"summary": "RHBZ#1671446",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671446"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-7150",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7150"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-7150",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-7150"
}
],
"release_date": "2018-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "elfutils: segmentation fault in elf64_xlatetom in libelf/elf32_xlatetom.c"
},
{
"cve": "CVE-2019-7664",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2019-02-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1677536"
}
],
"notes": [
{
"category": "description",
"text": "In elfutils 0.175, a negative-sized memcpy is attempted in elf_cvt_note in libelf/note_xlate.h because of an incorrect overflow check. Crafted elf input causes a segmentation fault, leading to denial of service (program crash).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "elfutils: out of bound write in elf_cvt_note in libelf/note_xlate.h",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-7664"
},
{
"category": "external",
"summary": "RHBZ#1677536",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1677536"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-7664",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7664"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-7664",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-7664"
}
],
"release_date": "2019-01-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "elfutils: out of bound write in elf_cvt_note in libelf/note_xlate.h"
},
{
"cve": "CVE-2019-7665",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2019-02-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1677538"
}
],
"notes": [
{
"category": "description",
"text": "In elfutils 0.175, a heap-based buffer over-read was discovered in the function elf32_xlatetom in elf32_xlatetom.c in libelf. A crafted ELF input can cause a segmentation fault leading to denial of service (program crash) because ebl_core_note does not reject malformed core file notes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "elfutils: heap-based buffer over-read in function elf32_xlatetom in elf32_xlatetom.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-7665"
},
{
"category": "external",
"summary": "RHBZ#1677538",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1677538"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-7665",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7665"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-7665",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-7665"
}
],
"release_date": "2019-01-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "elfutils: heap-based buffer over-read in function elf32_xlatetom in elf32_xlatetom.c"
},
{
"cve": "CVE-2019-9740",
"cwe": {
"id": "CWE-113",
"name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
},
"discovery_date": "2019-03-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1688169"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the query string after a ? character) followed by an HTTP header or a Redis command. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: CRLF injection via the query part of the url passed to urlopen()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects:\n* All current versions of Red Hat OpenStack Platform. However, version 8 is due to retire on the 20th of April 2019, there are no more planned releases prior to this date.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-9740"
},
{
"category": "external",
"summary": "RHBZ#1688169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1688169"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-9740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9740"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9740",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9740"
}
],
"release_date": "2019-03-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: CRLF injection via the query part of the url passed to urlopen()"
},
{
"cve": "CVE-2019-9947",
"cwe": {
"id": "CWE-113",
"name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
},
"discovery_date": "2019-03-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1695572"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: CRLF injection via the path part of the url passed to urlopen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-9947"
},
{
"category": "external",
"summary": "RHBZ#1695572",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695572"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-9947",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9947"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9947",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9947"
}
],
"release_date": "2019-03-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: CRLF injection via the path part of the url passed to urlopen()"
},
{
"cve": "CVE-2019-9948",
"cwe": {
"id": "CWE-749",
"name": "Exposed Dangerous Method or Function"
},
"discovery_date": "2019-03-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1695570"
}
],
"notes": [
{
"category": "description",
"text": "urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen(\u0027local_file:///etc/passwd\u0027) call.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-9948"
},
{
"category": "external",
"summary": "RHBZ#1695570",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695570"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-9948",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9948"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9948",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9948"
}
],
"release_date": "2019-03-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
},
{
"category": "workaround",
"details": "If your application uses a blacklist to prevent \"file://\" schema from being used, consider using a whitelist approach to just allow the schemas you want or add \"local_file://\" schema to your blacklist.",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms"
},
{
"acknowledgments": [
{
"names": [
"the Mozilla project"
]
},
{
"names": [
"Jonas Allmann"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2019-11729",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2019-07-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1728437"
}
],
"notes": [
{
"category": "description",
"text": "Empty or malformed p256-ECDH public keys may trigger a segmentation fault due values being improperly sanitized before being copied into memory and used. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nss: Empty or malformed p256-ECDH public keys may trigger a segmentation fault",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Firefox on Red Hat Enterprise Linux is built against the system nss library.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11729"
},
{
"category": "external",
"summary": "RHBZ#1728437",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728437"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11729",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11729"
},
{
"category": "external",
"summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11729",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11729"
}
],
"release_date": "2019-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nss: Empty or malformed p256-ECDH public keys may trigger a segmentation fault"
},
{
"acknowledgments": [
{
"names": [
"the Mozilla Project"
]
}
],
"cve": "CVE-2019-11745",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2019-11-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1774831"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow was found in the NSC_EncryptUpdate() function in Mozilla nss. A remote attacker could trigger this flaw via SRTP encrypt or decrypt operations, to execute arbitrary code with the permissions of the user running the application (compiled with nss). While the attack complexity is high, the impact to confidentiality, integrity, and availability are high as well.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nss: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Firefox and Thunderbird on Red Hat Enterprise Linux are built against the system nss library.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11745"
},
{
"category": "external",
"summary": "RHBZ#1774831",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774831"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11745",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11745"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11745",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11745"
},
{
"category": "external",
"summary": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.44.3_release_notes",
"url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.44.3_release_notes"
},
{
"category": "external",
"summary": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47.1_release_notes",
"url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47.1_release_notes"
}
],
"release_date": "2019-11-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "nss: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate"
},
{
"cve": "CVE-2019-13734",
"discovery_date": "2019-12-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1781980"
}
],
"notes": [
{
"category": "description",
"text": "Out of bounds write in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "sqlite: fts3: improve shadow table corruption detection",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-13734"
},
{
"category": "external",
"summary": "RHBZ#1781980",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781980"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-13734",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13734"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-13734",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13734"
},
{
"category": "external",
"summary": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html",
"url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html"
}
],
"release_date": "2019-12-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "sqlite: fts3: improve shadow table corruption detection"
},
{
"acknowledgments": [
{
"names": [
"Damien Aumaitre",
"Nicolas Surbayrole"
],
"organization": "Quarkslab"
}
],
"cve": "CVE-2020-1734",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"discovery_date": "2019-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1801804"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the pipe lookup plugin of ansible. Arbitrary commands can be run, when the pipe lookup plugin uses subprocess.Popen() with shell=True, by overwriting ansible facts and the variable is not escaped by quote plugin. An attacker could take advantage and run arbitrary commands by overwriting the ansible facts.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ansible: shell enabled by default in a pipe lookup plugin subprocess",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Ansible Engine 2.7.16, 2.8.10, and 2.9.6 as well as previous versions are affected.\n\nAnsible Tower 3.4.5, 3.5.5 and 3.6.3 as well as previous versions are affected.\n\nIn Red Hat OpenStack Platform, because the flaw has a lower impact, ansible is not directly customer exposed, and the fix would require a substantial amount of development, no update will be provided at this time for the RHOSP ansible package.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1734"
},
{
"category": "external",
"summary": "RHBZ#1801804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1801804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1734",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1734"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1734",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1734"
}
],
"release_date": "2020-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
},
{
"category": "workaround",
"details": "This issue can be avoided by escaping variables which are used in the lookup.",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ansible: shell enabled by default in a pipe lookup plugin subprocess"
},
{
"acknowledgments": [
{
"names": [
"Damien Aumaitre",
"Nicolas Surbayrole"
],
"organization": "Quarkslab"
}
],
"cve": "CVE-2020-1735",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2020-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1802085"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Ansible Engine when the fetch module is used. An attacker could intercept the module, inject a new path, and then choose a new destination path on the controller node.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ansible: path injection on dest parameter in fetch module",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Ansible Engine 2.7.16, 2.8.10, and 2.9.6 as well as previous versions are affected.\n\nAnsible Tower 3.4.5, 3.5.5 and 3.6.3 as well as previous versions are affected.\n\nIn Red Hat OpenStack Platform, because the flaw has a lower impact, ansible is not directly customer exposed, and the fix would require a substantial amount of development, no update will be provided at this time for the RHOSP ansible package.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1735"
},
{
"category": "external",
"summary": "RHBZ#1802085",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802085"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1735",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1735"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1735",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1735"
}
],
"release_date": "2020-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
},
{
"category": "workaround",
"details": "Currently, there is no mitigation for this issue except avoid using the affected fetch module when possible.",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ansible: path injection on dest parameter in fetch module"
},
{
"acknowledgments": [
{
"names": [
"Damien Aumaitre",
"Nicolas Surbayrole"
],
"organization": "Quarkslab"
}
],
"cve": "CVE-2020-1736",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"discovery_date": "2020-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1802124"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Ansible Engine when a file is moved using atomic_move primitive as the file mode cannot be specified. This sets the destination files world-readable if the destination file does not exist and if the file exists, the file could be changed to have less restrictive permissions before the move. This issue affects only the newly created files and not existing ones. If the file already exists at the final destination, those permissions are retained. This could lead to the disclosure of sensitive data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ansible: atomic_move primitive sets permissive permissions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Ansible Engine 2.8.14 and 2.9.12 as well as previous versions and all 2.7.x versions are affected.\n\nAnsible Tower 3.6.5 and 3.7.2 as well as previous versions are affected.\n\nIn Red Hat OpenStack Platform, because the flaw has a lower impact, ansible is not directly customer exposed, and the fix would require a substantial amount of development, no update will be provided at this time for the RHOSP ansible package.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1736"
},
{
"category": "external",
"summary": "RHBZ#1802124",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802124"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1736",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1736"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1736",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1736"
}
],
"release_date": "2020-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
},
{
"category": "workaround",
"details": "This issue can be mitigated by specifying the \"mode\" on the task. That just leaves a race condition in place where newly created files that specify a mode in the task briefly go from 666 - umask to the final mode. An alternative workaround if many new files are created and to avoid setting a specific mode for each file would be to set the \"mode\" to \"preserve\" value. That will maintain the permissions of the source file on the controller in the final file on the managed host.",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 2.2,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ansible: atomic_move primitive sets permissive permissions"
},
{
"acknowledgments": [
{
"names": [
"Damien Aumaitre",
"Nicolas Surbayrole"
],
"organization": "Quarkslab"
}
],
"cve": "CVE-2020-1737",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2020-02-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1802154"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Ansible Engine when using the Extract-Zip function from the win_unzip module as the extracted file(s) are not checked if they belong to the destination folder. An attacker could take advantage of this flaw by crafting an archive anywhere in the file system, using a path traversal.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ansible: Extract-Zip function in win_unzip module does not check extracted path",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Ansible Engine 2.7.16, 2.8.10, and 2.9.6 as well as previous versions are affected.\n\nAnsible Tower 3.4.5, 3.5.5 and 3.6.3 as well as previous versions are affected.\n\nIn Red Hat OpenStack Platform, because the flaw has a lower impact, ansible is not directly customer exposed, and the fix would require a substantial amount of development, no update will be provided at this time for the RHOSP ansible package.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1737"
},
{
"category": "external",
"summary": "RHBZ#1802154",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802154"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1737"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1737",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1737"
}
],
"release_date": "2020-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
},
{
"category": "workaround",
"details": "Currently, there is no mitigation for this issue except avoid using the affected win_unzip module when possible.",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ansible: Extract-Zip function in win_unzip module does not check extracted path"
},
{
"acknowledgments": [
{
"names": [
"Damien Aumaitre",
"Nicolas Surbayrole"
],
"organization": "Quarkslab"
}
],
"cve": "CVE-2020-1738",
"cwe": {
"id": "CWE-88",
"name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)"
},
"discovery_date": "2020-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1802164"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Ansible Engine when the module package or service is used and the parameter \u0027use\u0027 is not specified. If a previous task is executed with a malicious user, the module sent can be selected by the attacker using the ansible facts file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ansible: module package can be selected by the ansible facts",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Ansible Engine 2.7.16, 2.8.10, and 2.9.6 as well as previous versions are affected.\n\nAnsible Tower 3.4.5, 3.5.5 and 3.6.3 as well as previous versions are affected.\n\nIn Red Hat OpenStack Platform, because the flaw has a lower impact, ansible is not directly customer exposed, and the fix would require a substantial amount of development, no update will be provided at this time for the RHOSP ansible package.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1738"
},
{
"category": "external",
"summary": "RHBZ#1802164",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802164"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1738",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1738"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1738",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1738"
}
],
"release_date": "2020-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
},
{
"category": "workaround",
"details": "Specify the parameter \u0027use\u0027 when possible on the package and service modules. Avoid using Ansible Collections on Ansible 2.8.9 or 2.7.16 (and any of the previous versions) as they are not rejecting python with no path (already fixed in 2.9.x).",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.9,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ansible: module package can be selected by the ansible facts"
},
{
"acknowledgments": [
{
"names": [
"Damien Aumaitre",
"Nicolas Surbayrole"
],
"organization": "Quarkslab"
}
],
"cve": "CVE-2020-1739",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2020-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1802178"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Ansible Engine. When a password is set with the argument \"password\" of svn module, it is used on svn command line, disclosing to other users within the same node. An attacker could take advantage by reading the cmdline file from that particular PID on the procfs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ansible: svn module leaks password when specified as a parameter",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Ansible Engine 2.7.16, 2.8.10, and 2.9.6 as well as previous versions are affected.\n\nAnsible Tower 3.4.5, 3.5.5 and 3.6.3 as well as previous versions are affected.\n\nIn Red Hat OpenStack Platform, because the flaw has a lower impact, ansible is not directly customer exposed, and the fix would require a substantial amount of development, no update will be provided at this time for the RHOSP ansible package.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1739"
},
{
"category": "external",
"summary": "RHBZ#1802178",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802178"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1739",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1739"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1739",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1739"
}
],
"release_date": "2020-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
},
{
"category": "workaround",
"details": "Instead of using the parameter \u0027password\u0027 of the subversion module, provide the password with stdin.",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.9,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ansible: svn module leaks password when specified as a parameter"
},
{
"acknowledgments": [
{
"names": [
"Damien Aumaitre",
"Nicolas Surbayrole"
],
"organization": "Quarkslab"
}
],
"cve": "CVE-2020-1740",
"cwe": {
"id": "CWE-377",
"name": "Insecure Temporary File"
},
"discovery_date": "2020-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1802193"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Ansible Engine when using Ansible Vault for editing encrypted files. When a user executes \"ansible-vault edit\", another user on the same computer can read the old and new secret, as it is created in a temporary file with mkstemp and the returned file descriptor is closed and the method write_data is called to write the existing secret in the file. This method will delete the file before recreating it insecurely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ansible: secrets readable after ansible-vault edit",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Ansible Engine 2.7.16, 2.8.10, and 2.9.6 as well as previous versions are affected.\n\nAnsible Tower 3.4.5, 3.5.5 and 3.6.3 as well as previous versions are affected.\n\nIn Red Hat OpenStack Platform, because the flaw has a lower impact, ansible is not directly customer exposed, and the fix would require a substantial amount of development, no update will be provided at this time for the RHOSP ansible package.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1740"
},
{
"category": "external",
"summary": "RHBZ#1802193",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802193"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1740",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1740"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1740",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1740"
}
],
"release_date": "2020-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
},
{
"category": "workaround",
"details": "Currently, there is no mitigation for this issue except avoid using the \u0027edit\u0027 option from \u0027ansible-vault\u0027 command line tool.",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.9,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ansible: secrets readable after ansible-vault edit"
},
{
"acknowledgments": [
{
"names": [
"Felix Fountein"
]
}
],
"cve": "CVE-2020-1746",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2019-12-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1805491"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Ansible Engine when the ldap_attr and ldap_entry community modules are used. The issue discloses the LDAP bind password to stdout or a log file if a playbook task is written using the bind_pw in the parameters field. The highest threat from this vulnerability is data confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ansible: Information disclosure issue in ldap_attr and ldap_entry modules",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* Ansible Engine 2.7.16, 2.8.10, and 2.9.6 as well as previous versions are affected.\n\n* Ansible Tower 3.4.5, 3.5.5 and 3.6.3 as well as previous versions are affected.\n\n* Red Hat Gluster Storage and Red Hat Ceph Storage no longer maintains their own version of Ansible. The fix will be provided from core Ansible. But we still ship ansible separately for ceph ubuntu.\n\n* In Red Hat OpenStack Platform, because the flaw has a lower impact, ansible is not directly customer exposed, and the fix would require a substantial amount of development, no update will be provided at this time for the RHOSP ansible package.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1746"
},
{
"category": "external",
"summary": "RHBZ#1805491",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1805491"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1746",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1746"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1746",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1746"
}
],
"release_date": "2020-02-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
},
{
"category": "workaround",
"details": "Using args keyword and embedding the ldap_auth variable instead of using bind_pw parameter would mitigate this issue.",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ansible: Information disclosure issue in ldap_attr and ldap_entry modules"
},
{
"acknowledgments": [
{
"names": [
"Abhijeet Kasurde"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2020-1753",
"cwe": {
"id": "CWE-532",
"name": "Insertion of Sensitive Information into Log File"
},
"discovery_date": "2020-03-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1811008"
}
],
"notes": [
{
"category": "description",
"text": "A security flaw was found in the Ansible Engine when managing Kubernetes using the k8s connection plugin. Sensitive parameters such as passwords and tokens are passed to the kubectl command line instead of using environment variables or an input configuration file, which is safer. This flaw discloses passwords and tokens from the process list, and the no_log directive from the debug module would not be reflected in the underlying command-line tools options, displaying passwords and tokens on stdout and log files.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Ansible: kubectl connection plugin leaks sensitive information",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Ansible Engine 2.7.17, 2.8.10, and 2.9.6 as well as previous versions are affected.\n\nAnsible Tower 3.4.5, 3.5.5 and 3.6.3 as well as previous versions are affected.\n\nIn Red Hat OpenStack Platform, because the flaw has a lower impact, ansible is not directly customer exposed, and the fix would require a substantial amount of development, no update will be provided at this time for the RHOSP ansible package.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1753"
},
{
"category": "external",
"summary": "RHBZ#1811008",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1811008"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1753",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1753"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1753",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1753"
}
],
"release_date": "2020-03-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
},
{
"category": "workaround",
"details": "Currently, there is no mitigation for this issue.",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Ansible: kubectl connection plugin leaks sensitive information"
},
{
"acknowledgments": [
{
"names": [
"Damien Aumaitre",
"Nicolas Surbayrole"
],
"organization": "Quarkslab"
}
],
"cve": "CVE-2020-10684",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2020-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1815519"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Ansible Engine. When using ansible_facts as a subkey of itself, and promoting it to a variable when injecting is enabled, overwriting the ansible_facts after the clean, an attacker could take advantage of this by altering the ansible_facts leading to privilege escalation or code injection. The highest threat from this vulnerability are to data integrity and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Ansible: code injection when using ansible_facts as a subkey",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* Ansible Engine 2.7.16, 2.8.10, and 2.9.6 as well as previous versions are affected.\n* Ansible Tower 3.4.5, 3.5.5 and 3.6.3 as well as previous versions are affected.\n* Red Hat Gluster Storage and Red Hat Ceph Storage no longer maintains their own version of Ansible. The fix will be consumed from core Ansible. But we still ship ansible separately for ceph ubuntu.\n* Red Hat OpenStack Platform does package the affected code. However, because RHOSP does not use ansible_facts as a subkey directly, the RHOSP impact has been reduced to Moderate and no update will be provided at this time for the RHOSP ansible package.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-10684"
},
{
"category": "external",
"summary": "RHBZ#1815519",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815519"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-10684",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10684"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10684",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10684"
}
],
"release_date": "2020-03-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
},
{
"category": "workaround",
"details": "Currently, there is not a known mitigation except avoiding the functionality of using ansible_facts as a subkey.",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.9,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Ansible: code injection when using ansible_facts as a subkey"
},
{
"acknowledgments": [
{
"names": [
"Damien Aumaitre",
"Nicolas Surbayrole"
],
"organization": "Quarkslab"
}
],
"cve": "CVE-2020-10685",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"discovery_date": "2020-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1814627"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found on Ansible Engine when using modules which decrypts vault files such as assemble, script, unarchive, win_copy, aws_s3 or copy modules. The temporary directory is created in /tmp leaves the secrets unencrypted.\r\n\r\nOn Operating Systems which /tmp is not a tmpfs but part of the root partition, the directory is only cleared on boot and the decrypted data remains when the host is switched off. The system will be vulnerable when the system is not running. So decrypted data must be cleared as soon as possible and the data which normally is encrypted is sensible.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Ansible: modules which use files encrypted with vault are not properly cleaned up",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* Ansible Engine 2.7.16, 2.8.10, and 2.9.6 as well as previous versions are affected.\n\n* Ansible Tower 3.4.5, 3.5.5 and 3.6.3 as well as previous versions are affected.\n\n* In Red Hat OpenStack Platform, because the flaw has a lower impact, ansible is not directly customer exposed, and the fix would require a substantial amount of development, no update will be provided at this time for the RHOSP ansible package.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-10685"
},
{
"category": "external",
"summary": "RHBZ#1814627",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1814627"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-10685",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10685"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10685",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10685"
}
],
"release_date": "2020-03-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
},
{
"category": "workaround",
"details": "Currently, there is no mitigation for this issue except by removing manually the temporary created file after every run.",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Ansible: modules which use files encrypted with vault are not properly cleaned up"
}
]
}
rhba-2020:0547
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Container Image Rebuild for Ansible Tower 3.4 Dependency",
"title": "Topic"
},
{
"category": "general",
"text": "The ansible-tower-memcached container image has been updated for Red Hat Ansible Tower 3.4 for RHEL 7 to address security advisories:\n\nRHSA-2019:2030\nRHSA-2019:2118\nRHSA-2019:2136\nRHSA-2019:2197\nRHSA-2019:2237\nRHSA-2019:2304\nRHSA-2019:4190\nRHSA-2020:0227",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2020:0547",
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
},
{
"category": "external",
"summary": "https://access.redhat.com/errata/RHSA-2019:2030",
"url": "https://access.redhat.com/errata/RHSA-2019:2030"
},
{
"category": "external",
"summary": "https://access.redhat.com/errata/RHSA-2019:2118",
"url": "https://access.redhat.com/errata/RHSA-2019:2118"
},
{
"category": "external",
"summary": "https://access.redhat.com/errata/RHSA-2019:2136",
"url": "https://access.redhat.com/errata/RHSA-2019:2136"
},
{
"category": "external",
"summary": "https://access.redhat.com/errata/RHSA-2019:2197",
"url": "https://access.redhat.com/errata/RHSA-2019:2197"
},
{
"category": "external",
"summary": "https://access.redhat.com/errata/RHSA-2019:2237",
"url": "https://access.redhat.com/errata/RHSA-2019:2237"
},
{
"category": "external",
"summary": "https://access.redhat.com/errata/RHSA-2019:2304",
"url": "https://access.redhat.com/errata/RHSA-2019:2304"
},
{
"category": "external",
"summary": "https://access.redhat.com/errata/RHSA-2019:4190",
"url": "https://access.redhat.com/errata/RHSA-2019:4190"
},
{
"category": "external",
"summary": "https://access.redhat.com/errata/RHSA-2020:0227",
"url": "https://access.redhat.com/errata/RHSA-2020:0227"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhba-2020_0547.json"
}
],
"title": "Red Hat Bug Fix Advisory: Container Image Rebuild for Ansible Tower 3.4 Dependency",
"tracking": {
"current_release_date": "2025-11-25T18:21:27+00:00",
"generator": {
"date": "2025-11-25T18:21:27+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHBA-2020:0547",
"initial_release_date": "2020-02-18T15:13:57+00:00",
"revision_history": [
{
"date": "2020-02-18T15:13:57+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-02-18T15:13:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-25T18:21:27+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Ansible Tower 3.4 for RHEL 7 Server",
"product": {
"name": "Red Hat Ansible Tower 3.4 for RHEL 7 Server",
"product_id": "7Server-Ansible-Tower-3.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ansible_tower:3.4::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Ansible Tower"
},
{
"branches": [
{
"category": "product_version",
"name": "ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"product": {
"name": "ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"product_id": "ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c?arch=amd64\u0026repository_url=registry.redhat.io/ansible-tower-37/ansible-tower-memcached-rhel7\u0026tag=1.4.15-28"
}
}
},
{
"category": "product_version",
"name": "ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"product": {
"name": "ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"product_id": "ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c?arch=amd64\u0026repository_url=registry.redhat.io/ansible-tower-35/ansible-tower-memcached\u0026tag=1.4.15-28"
}
}
},
{
"category": "product_version",
"name": "ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"product": {
"name": "ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"product_id": "ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c?arch=amd64\u0026repository_url=registry.redhat.io/ansible-tower-34/ansible-tower-memcached\u0026tag=1.4.15-28"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64 as a component of Red Hat Ansible Tower 3.4 for RHEL 7 Server",
"product_id": "7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
},
"product_reference": "ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"relates_to_product_reference": "7Server-Ansible-Tower-3.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64 as a component of Red Hat Ansible Tower 3.4 for RHEL 7 Server",
"product_id": "7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
},
"product_reference": "ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"relates_to_product_reference": "7Server-Ansible-Tower-3.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64 as a component of Red Hat Ansible Tower 3.4 for RHEL 7 Server",
"product_id": "7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
},
"product_reference": "ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"relates_to_product_reference": "7Server-Ansible-Tower-3.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-10739",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2016-02-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1347549"
}
],
"notes": [
{
"category": "description",
"text": "In the GNU C Library (aka glibc or libc6) through 2.28, the getaddrinfo function would successfully parse a string that contained an IPv4 address followed by whitespace and arbitrary characters, which could lead applications to incorrectly assume that it had parsed a valid string, without the possibility of embedded HTTP headers or other potentially dangerous substrings.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glibc: getaddrinfo should reject IP addresses with trailing characters",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security has rated this issue as having Moderate security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-10739"
},
{
"category": "external",
"summary": "RHBZ#1347549",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1347549"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-10739",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10739"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-10739",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10739"
}
],
"release_date": "2016-04-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glibc: getaddrinfo should reject IP addresses with trailing characters"
},
{
"cve": "CVE-2018-0495",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-06-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1591163"
}
],
"notes": [
{
"category": "description",
"text": "Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Since the 5.8.3 release, Red Hat CloudForms no longer uses libtomcrypt.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-0495"
},
{
"category": "external",
"summary": "RHBZ#1591163",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591163"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-0495",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0495"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0495",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0495"
},
{
"category": "external",
"summary": "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/",
"url": "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/"
}
],
"release_date": "2018-06-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries"
},
{
"cve": "CVE-2018-0734",
"cwe": {
"id": "CWE-385",
"name": "Covert Timing Channel"
},
"discovery_date": "2018-10-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1644364"
}
],
"notes": [
{
"category": "description",
"text": "The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: timing side channel attack in the DSA signature algorithm",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-0734"
},
{
"category": "external",
"summary": "RHBZ#1644364",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644364"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-0734",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0734"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0734",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0734"
}
],
"release_date": "2018-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: timing side channel attack in the DSA signature algorithm"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Labs"
]
}
],
"cve": "CVE-2018-1122",
"cwe": {
"id": "CWE-829",
"name": "Inclusion of Functionality from Untrusted Control Sphere"
},
"discovery_date": "2018-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1575466"
}
],
"notes": [
{
"category": "description",
"text": "If the HOME environment variable is unset or empty, top will read its configuration file from the current working directory without any security check. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "procps: Local privilege escalation in top",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1122"
},
{
"category": "external",
"summary": "RHBZ#1575466",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575466"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1122"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1122",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1122"
},
{
"category": "external",
"summary": "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt",
"url": "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt"
}
],
"release_date": "2018-05-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "procps: Local privilege escalation in top"
},
{
"cve": "CVE-2018-5818",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2018-12-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1661608"
}
],
"notes": [
{
"category": "description",
"text": "An error within the \"parse_rollei()\" function (internal/dcraw_common.cpp) within LibRaw versions prior to 0.19.1 can be exploited to trigger an infinite loop.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "LibRaw: DoS in parse_rollei function in internal/dcraw_common.cpp",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-5818"
},
{
"category": "external",
"summary": "RHBZ#1661608",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661608"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-5818",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5818"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5818",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5818"
}
],
"release_date": "2018-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "LibRaw: DoS in parse_rollei function in internal/dcraw_common.cpp"
},
{
"cve": "CVE-2018-5819",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2018-12-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1661604"
}
],
"notes": [
{
"category": "description",
"text": "An error within the \"parse_sinar_ia()\" function (internal/dcraw_common.cpp) within LibRaw versions prior to 0.19.1 can be exploited to exhaust available CPU resources.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "LibRaw: DoS in parse_sinar_ia function in internal/dcraw_common.cpp",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-5819"
},
{
"category": "external",
"summary": "RHBZ#1661604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661604"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-5819",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5819"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5819",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5819"
}
],
"release_date": "2018-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "LibRaw: DoS in parse_sinar_ia function in internal/dcraw_common.cpp"
},
{
"cve": "CVE-2018-12404",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-12-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1657913"
}
],
"notes": [
{
"category": "description",
"text": "A cached side channel attack during handshakes using RSA encryption could allow for the decryption of encrypted content. This is a variant of the Adaptive Chosen Ciphertext attack (AKA Bleichenbacher attack) and affects all NSS versions prior to NSS 3.41.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nss: Cache side-channel variant of the Bleichenbacher attack",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12404"
},
{
"category": "external",
"summary": "RHBZ#1657913",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1657913"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12404",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12404"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12404",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12404"
}
],
"release_date": "2018-11-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nss: Cache side-channel variant of the Bleichenbacher attack"
},
{
"cve": "CVE-2018-12641",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2018-06-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1594410"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in arm_pt in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there are recursive stack frames: demangle_arm_hp_template, demangle_class_name, demangle_fund_type, do_type, do_arg, demangle_args, and demangle_nested_args. This can occur during execution of nm-new.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "binutils: Stack Exhaustion in the demangling functions provided by libiberty",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The issue is classified as low severity primarily because binutils is not typically exposed to untrusted inputs in most environments, limiting its exploitation potential. The stack overflow in demangle_class_name() only triggers during the parsing of malformed ELF files, which would require an attacker to convince a user to process a malicious file with binutils. Moreover, binutils does not handle privileged operations, meaning exploitation is unlikely to lead to system compromise or escalation of privileges. Additionally, the impact is localized to the application itself, without affecting the broader system or network security.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12641"
},
{
"category": "external",
"summary": "RHBZ#1594410",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1594410"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12641",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12641"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12641",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12641"
}
],
"release_date": "2018-04-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "binutils: Stack Exhaustion in the demangling functions provided by libiberty"
},
{
"cve": "CVE-2018-12697",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2018-06-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1595417"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference (aka SEGV on unknown address 0x000000000000) was discovered in work_stuff_copy_to_from in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. This can occur during execution of objdump.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "binutils: NULL pointer dereference in work_stuff_copy_to_from in cplus-dem.c.",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is classified with a low severity primarily because binutils is not typically exposed to untrusted inputs in most environments, limiting the possibility of exploitation. Additionally, this NULL pointer dereference is only triggered during the parsing of a specially crafted file, requiring an attacker to convince a user to process this file with objdump. Furthermore, binutils does not handle privileged operations, meaning that exploitation is unlikely to lead to system compromise or escalation of privileges. Also, the impact is limited to the application itself, without affecting the broader system or network security.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12697"
},
{
"category": "external",
"summary": "RHBZ#1595417",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1595417"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12697",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12697"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12697",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12697"
}
],
"release_date": "2018-04-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "binutils: NULL pointer dereference in work_stuff_copy_to_from in cplus-dem.c."
},
{
"acknowledgments": [
{
"names": [
"the Curl project"
]
},
{
"names": [
"Zhaoyang Wu"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-14618",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2018-08-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1622707"
}
],
"notes": [
{
"category": "description",
"text": "curl before version 7.61.1 is vulnerable to a buffer overrun in the NTLM authentication code. The internal function Curl_ntlm_core_mk_nt_hash multiplies the length of the password by two (SUM) to figure out how large temporary storage area to allocate from the heap. The length value is then subsequently used to iterate over the password and generate output into the allocated storage buffer. On systems with a 32 bit size_t, the math to calculate SUM triggers an integer overflow when the password length exceeds 2GB (2^31 bytes). This integer overflow usually causes a very small buffer to actually get allocated instead of the intended very huge one, making the use of that buffer end up in a heap buffer overflow. (This bug is almost identical to CVE-2017-8816.)",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: NTLM password overflow via integer overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-14618"
},
{
"category": "external",
"summary": "RHBZ#1622707",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1622707"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-14618",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14618"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14618",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14618"
},
{
"category": "external",
"summary": "https://curl.haxx.se/docs/CVE-2018-14618.html",
"url": "https://curl.haxx.se/docs/CVE-2018-14618.html"
}
],
"release_date": "2018-09-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "curl: NTLM password overflow via integer overflow"
},
{
"acknowledgments": [
{
"names": [
"the Python Security Response Team"
]
}
],
"cve": "CVE-2018-14647",
"cwe": {
"id": "CWE-335",
"name": "Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)"
},
"discovery_date": "2018-09-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1631822"
}
],
"notes": [
{
"category": "description",
"text": "Python\u0027s elementtree C accelerator failed to initialise Expat\u0027s hash salt during initialization. This could make it easy to conduct denial of service attacks against Expat by contructing an XML document that would cause pathological hash collisions in Expat\u0027s internal data structures, consuming large amounts CPU and RAM.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: Missing salt initialization in _elementtree.c module",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-14647"
},
{
"category": "external",
"summary": "RHBZ#1631822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1631822"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-14647",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14647"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14647",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14647"
},
{
"category": "external",
"summary": "https://bugs.python.org/issue34623",
"url": "https://bugs.python.org/issue34623"
}
],
"release_date": "2018-09-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: Missing salt initialization in _elementtree.c module"
},
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ubuntu"
]
}
],
"cve": "CVE-2018-15686",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2018-10-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1639071"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered that systemd is vulnerable to a state injection attack when deserializing the state of a service. Properties longer than LINE_MAX are not correctly parsed and an attacker may abuse this flaw in particularly configured services to inject, change, or corrupt the service state.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "systemd: line splitting via fgets() allows for state injection during daemon-reexec",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-15686"
},
{
"category": "external",
"summary": "RHBZ#1639071",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1639071"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-15686",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15686"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-15686",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-15686"
}
],
"release_date": "2018-10-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.6,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "systemd: line splitting via fgets() allows for state injection during daemon-reexec"
},
{
"cve": "CVE-2018-16062",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2018-08-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1623752"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds read was discovered in elfutils in the way it reads DWARF address ranges information. Function dwarf_getaranges() in dwarf_getaranges.c does not properly check whether it reads beyond the limits of the ELF section. An attacker could use this flaw to cause a denial of service via a crafted file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "elfutils: Heap-based buffer over-read in libdw/dwarf_getaranges.c:dwarf_getaranges() via crafted file",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-16062"
},
{
"category": "external",
"summary": "RHBZ#1623752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1623752"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-16062",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16062"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16062",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16062"
}
],
"release_date": "2018-08-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "elfutils: Heap-based buffer over-read in libdw/dwarf_getaranges.c:dwarf_getaranges() via crafted file"
},
{
"cve": "CVE-2018-16402",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2018-09-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1625050"
}
],
"notes": [
{
"category": "description",
"text": "libelf/elf_end.c in elfutils 0.173 allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact because it tries to decompress twice.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "elfutils: Double-free due to double decompression of sections in crafted ELF causes crash",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-16402"
},
{
"category": "external",
"summary": "RHBZ#1625050",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1625050"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-16402",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16402"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16402",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16402"
}
],
"release_date": "2018-08-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "elfutils: Double-free due to double decompression of sections in crafted ELF causes crash"
},
{
"cve": "CVE-2018-16403",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2018-09-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1625055"
}
],
"notes": [
{
"category": "description",
"text": "libdw in elfutils 0.173 checks the end of the attributes list incorrectly in dwarf_getabbrev in dwarf_getabbrev.c and dwarf_hasattr in dwarf_hasattr.c, leading to a heap-based buffer over-read and an application crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "elfutils: Heap-based buffer over-read in libdw/dwarf_getabbrev.c and libwd/dwarf_hasattr.c causes crash",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-16403"
},
{
"category": "external",
"summary": "RHBZ#1625055",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1625055"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-16403",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16403"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16403",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16403"
}
],
"release_date": "2018-08-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "elfutils: Heap-based buffer over-read in libdw/dwarf_getabbrev.c and libwd/dwarf_hasattr.c causes crash"
},
{
"acknowledgments": [
{
"names": [
"the Curl project"
]
},
{
"names": [
"Brian Carpenter"
],
"organization": "Geeknik Labs",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-16842",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2018-10-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1644124"
}
],
"notes": [
{
"category": "description",
"text": "Curl versions 7.14.1 through 7.61.1 are vulnerable to a heap-based buffer over-read in the tool_msgs.c:voutf() function that may result in information exposure and denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: Heap-based buffer over-read in the curl tool warning formatting",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-16842"
},
{
"category": "external",
"summary": "RHBZ#1644124",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644124"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-16842",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16842"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16842",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16842"
},
{
"category": "external",
"summary": "https://curl.haxx.se/docs/CVE-2018-16842.html",
"url": "https://curl.haxx.se/docs/CVE-2018-16842.html"
}
],
"release_date": "2018-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.6,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "curl: Heap-based buffer over-read in the curl tool warning formatting"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Labs"
]
}
],
"cve": "CVE-2018-16866",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-11-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1653867"
}
],
"notes": [
{
"category": "description",
"text": "An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon \u0027:\u0027. A local attacker can use this flaw to disclose process memory data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "systemd: out-of-bounds read when parsing a crafted syslog message",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of systemd as shipped with Red Hat Enterprise Linux 7. Red Hat Product Security has rated this issue as having a security impact of Moderate. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.\n\nRed Hat Virtualization Hypervisor and Management Appliance include vulnerable versions of systemd. However, since exploitation requires local access and impact is restricted to information disclosure, this flaw is rated as having a security issue of Low. Future updates may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-16866"
},
{
"category": "external",
"summary": "RHBZ#1653867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1653867"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-16866",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16866"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16866",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16866"
},
{
"category": "external",
"summary": "https://www.qualys.com/2019/01/09/system-down/system-down.txt",
"url": "https://www.qualys.com/2019/01/09/system-down/system-down.txt"
}
],
"release_date": "2019-01-09T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "systemd: out-of-bounds read when parsing a crafted syslog message"
},
{
"cve": "CVE-2018-16888",
"cwe": {
"id": "CWE-250",
"name": "Execution with Unnecessary Privileges"
},
"discovery_date": "2019-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1662867"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered systemd does not correctly check the content of PIDFile files before using it to kill processes. When a service is run from an unprivileged user (e.g. User field set in the service file), a local attacker who is able to write to the PIDFile of the mentioned service may use this flaw to trick systemd into killing other services and/or privileged processes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "systemd: kills privileged process if unprivileged PIDFile was tampered",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-16888"
},
{
"category": "external",
"summary": "RHBZ#1662867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1662867"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-16888",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16888"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16888",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16888"
}
],
"release_date": "2017-08-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "systemd: kills privileged process if unprivileged PIDFile was tampered"
},
{
"cve": "CVE-2018-18310",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2018-10-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1642604"
}
],
"notes": [
{
"category": "description",
"text": "An invalid memory address dereference was discovered in dwfl_segment_report_module.c in libdwfl in elfutils through v0.174. The vulnerability allows attackers to cause a denial of service (application crash) with a crafted ELF file, as demonstrated by consider_notes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "elfutils: invalid memory address dereference was discovered in dwfl_segment_report_module.c in libdwfl",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of elfutils as shipped with Red Hat Enterprise Linux 5, 6, and 7.\n\nRed Hat Enterprise Linux 5 is now in Extended Life Phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nRed Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Low, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-18310"
},
{
"category": "external",
"summary": "RHBZ#1642604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1642604"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-18310",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18310"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-18310",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-18310"
}
],
"release_date": "2018-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "elfutils: invalid memory address dereference was discovered in dwfl_segment_report_module.c in libdwfl"
},
{
"cve": "CVE-2018-18520",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2018-10-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646477"
}
],
"notes": [
{
"category": "description",
"text": "An Invalid Memory Address Dereference exists in the function elf_end in libelf in elfutils through v0.174. Although eu-size is intended to support ar files inside ar files, handle_ar in size.c closes the outer ar file before handling all inner entries. The vulnerability allows attackers to cause a denial of service (application crash) with a crafted ELF file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "elfutils: eu-size cannot handle recursive ar files",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of elfutils as shipped with Red Hat Enterprise Linux 5, 6, and 7.\n\nRed Hat Enterprise Linux 5 is now in Extended Life Phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nRed Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Low, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-18520"
},
{
"category": "external",
"summary": "RHBZ#1646477",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646477"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-18520",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18520"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-18520",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-18520"
}
],
"release_date": "2018-10-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "elfutils: eu-size cannot handle recursive ar files"
},
{
"cve": "CVE-2018-18521",
"cwe": {
"id": "CWE-369",
"name": "Divide By Zero"
},
"discovery_date": "2018-10-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646482"
}
],
"notes": [
{
"category": "description",
"text": "Divide-by-zero vulnerabilities in the function arlib_add_symbols() in arlib.c in elfutils 0.174 allow remote attackers to cause a denial of service (application crash) with a crafted ELF file, as demonstrated by eu-ranlib, because a zero sh_entsize is mishandled.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "elfutils: Divide-by-zero in arlib_add_symbols function in arlib.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of elfutils as shipped with Red Hat Enterprise Linux 5, 6, and 7.\n\nRed Hat Enterprise Linux 5 is now in Extended Life Phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nRed Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Low, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-18521"
},
{
"category": "external",
"summary": "RHBZ#1646482",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646482"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-18521",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18521"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-18521",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-18521"
}
],
"release_date": "2018-10-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "elfutils: Divide-by-zero in arlib_add_symbols function in arlib.c"
},
{
"cve": "CVE-2018-20217",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"discovery_date": "2018-12-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1665296"
}
],
"notes": [
{
"category": "description",
"text": "A Reachable Assertion issue was discovered in the KDC in MIT Kerberos 5 (aka krb5) before 1.17. If an attacker can obtain a krbtgt ticket using an older encryption type (single-DES, triple-DES, or RC4), the attacker can crash the KDC by making an S4U2Self request.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: Reachable assertion in the KDC using S4U2Self requests",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-20217"
},
{
"category": "external",
"summary": "RHBZ#1665296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1665296"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-20217",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20217"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-20217",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20217"
}
],
"release_date": "2018-12-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "krb5: Reachable assertion in the KDC using S4U2Self requests"
},
{
"cve": "CVE-2018-1000876",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2018-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1664699"
}
],
"notes": [
{
"category": "description",
"text": "binutils version 2.32 and earlier contains a Integer Overflow vulnerability in objdump, bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc that can result in Integer overflow trigger heap overflow. Successful exploitation allows execution of arbitrary code.. This attack appear to be exploitable via Local. This vulnerability appears to have been fixed in after commit 3a551c7a1b80fca579461774860574eabfd7f18f.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "binutils: integer overflow leads to heap-based buffer overflow in objdump",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The issue is classified as moderate severity primarily because of the unlikelihood of running a 32bit compiled objdump and/or having a compiled binary that uses 32bit compiled binutils libraries to analyze binaries from a not trusted source. Moreover, binutils does not handle privileged operations, meaning exploitation is unlikely to lead to system compromise or escalation of privileges. Additionally, the impact is localized to the application itself, without affecting the broader system or network security. \n\nAs per upstream binutils security policy this issue is not considered as a security flaw. Basically the key element of the policy that affects this is the understanding that analysis of untrusted binaries must always be done in a sandbox because the ELF format is open ended enough to make the analysis tools do anything, like including and processing arbitrary files. This eliminates the only possible vulnerability vector here, which is the possibility of a user being tricked into downloading and analyzing an untrusted ELF without sandboxing.\n\nSee the binutils security policy for more details:\nhttps://sourceware.org/cgit/binutils-gdb/tree/binutils/SECURITY.txt\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-190: Integer Overflow leading to a CWE-122: Heap-based Buffer Overflow vulnerability, and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token-based multi-factor authentication (MFA) and enforced through least privilege, ensuring only authorized users can execute or modify code. Red Hat also applies least functionality, enabling only essential features, services, and ports to reduce the attack surface for heap-based buffer overflow exploits. The environment uses IPS/IDS and antimalware solutions to detect and respond to threats in real time, helping prevent or limit exploitation attempts. Static code analysis and peer reviews ensure all user inputs are thoroughly validated, reducing the risk of system instability, data exposure, or privilege escalation. Finally, memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) enhance resilience against buffer overflows and denial-of-service attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1000876"
},
{
"category": "external",
"summary": "RHBZ#1664699",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1664699"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000876"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000876",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000876"
}
],
"release_date": "2018-12-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "binutils: integer overflow leads to heap-based buffer overflow in objdump"
},
{
"cve": "CVE-2019-1559",
"cwe": {
"id": "CWE-325",
"name": "Missing Cryptographic Step"
},
"discovery_date": "2019-02-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1683804"
}
],
"notes": [
{
"category": "description",
"text": "If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt data. In order for this to be exploitable \"non-stitched\" ciphersuites must be in use. Stitched ciphersuites are optimised implementations of certain commonly used ciphersuites. Also the application must call SSL_shutdown() twice even if a protocol error has occurred (applications should not do this but some do anyway). Fixed in OpenSSL 1.0.2r (Affected 1.0.2-1.0.2q).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: 0-byte record padding oracle",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "1 For this issue to be exploitable, the (server) application using the OpenSSL library needs to use it incorrectly.\n2. There are multiple other requirements for the attack to succeed: \n - The ciphersuite used must be obsolete CBC cipher without a stitched implementation (or the system be in FIPS mode)\n - the attacker has to be a MITM\n - the attacker has to be able to control the client side to send requests to the buggy server on demand",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-1559"
},
{
"category": "external",
"summary": "RHBZ#1683804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1683804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-1559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1559"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-1559",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1559"
},
{
"category": "external",
"summary": "https://github.com/RUB-NDS/TLS-Padding-Oracles",
"url": "https://github.com/RUB-NDS/TLS-Padding-Oracles"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20190226.txt",
"url": "https://www.openssl.org/news/secadv/20190226.txt"
}
],
"release_date": "2019-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
},
{
"category": "workaround",
"details": "As a workaround you can disable SHA384 if applications (compiled with OpenSSL) allow for adjustment of the ciphersuite string configuration.",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: 0-byte record padding oracle"
},
{
"acknowledgments": [
{
"names": [
"the libssh2 project"
]
},
{
"names": [
"Chris Coulson"
],
"organization": "Canonical Ltd.",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2019-3858",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2019-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1687306"
}
],
"notes": [
{
"category": "description",
"text": "An out of bounds read flaw was discovered in libssh2 when a specially crafted SFTP packet is received from the server. A remote attacker who compromises a SSH server may be able to cause a denial of service or read data in the client memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libssh2: Zero-byte allocation with a specially crafted SFTP packed leading to an out-of-bounds read",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw was present in libssh2 packages included in Red Hat Virtualization Hypervisor and Management Appliance, however libssh2 in these hosts is never exposed to malicious clients or servers.\n\nlibssh2 is no longer included in the virt module since Red Hat Enterprise Linux 8.1.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-3858"
},
{
"category": "external",
"summary": "RHBZ#1687306",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1687306"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-3858",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3858"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3858",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3858"
},
{
"category": "external",
"summary": "https://www.libssh2.org/CVE-2019-3858.html",
"url": "https://www.libssh2.org/CVE-2019-3858.html"
}
],
"release_date": "2019-03-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libssh2: Zero-byte allocation with a specially crafted SFTP packed leading to an out-of-bounds read"
},
{
"acknowledgments": [
{
"names": [
"the libssh2 project"
]
},
{
"names": [
"Chris Coulson"
],
"organization": "Canonical Ltd.",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2019-3861",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2019-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1687311"
}
],
"notes": [
{
"category": "description",
"text": "An out of bounds read flaw was discovered in libssh2 in the way SSH packets with a padding length value greater than the packet length are parsed. A remote attacker who compromises a SSH server may be able to cause a denial of service or read data in the client memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libssh2: Out-of-bounds reads with specially crafted SSH packets",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw was present in libssh2 packages included in Red Hat Virtualization Hypervisor and Management Appliance, however libssh2 in these hosts is never exposed to malicious clients or servers.\n\nlibssh2 is no longer included in the virt module since Red Hat Enterprise Linux 8.1.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-3861"
},
{
"category": "external",
"summary": "RHBZ#1687311",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1687311"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-3861",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3861"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3861",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3861"
},
{
"category": "external",
"summary": "https://www.libssh2.org/CVE-2019-3861.html",
"url": "https://www.libssh2.org/CVE-2019-3861.html"
}
],
"release_date": "2019-03-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libssh2: Out-of-bounds reads with specially crafted SSH packets"
},
{
"acknowledgments": [
{
"names": [
"the libssh2 project"
]
},
{
"names": [
"Chris Coulson"
],
"organization": "Canonical Ltd.",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2019-3862",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"discovery_date": "2019-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1687312"
}
],
"notes": [
{
"category": "description",
"text": "An out of bounds read flaw was discovered in libssh2 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit status message and no payload are parsed. A remote attacker who compromises a SSH server may be able to cause a denial of service or read data in the client memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libssh2: Out-of-bounds memory comparison with specially crafted message channel request",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw was present in libssh2 packages included in Red Hat Virtualization Hypervisor and Management Appliance, however libssh2 in these hosts is never exposed to malicious clients or servers.\n\nlibssh2 is no longer included in the virt module since Red Hat Enterprise Linux 8.1.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-3862"
},
{
"category": "external",
"summary": "RHBZ#1687312",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1687312"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-3862",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3862"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3862",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3862"
},
{
"category": "external",
"summary": "https://www.libssh2.org/CVE-2019-3862.html",
"url": "https://www.libssh2.org/CVE-2019-3862.html"
}
],
"release_date": "2019-03-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libssh2: Out-of-bounds memory comparison with specially crafted message channel request"
},
{
"cve": "CVE-2019-5010",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2019-01-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1666519"
}
],
"notes": [
{
"category": "description",
"text": "A null pointer dereference vulnerability was found in the certificate parsing code in Python. This causes a denial of service to applications when parsing specially crafted certificates. This vulnerability is unlikely to be triggered if application enables SSL/TLS certificate validation and accepts certificates only from trusted root certificate authorities.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: NULL pointer dereference using a specially crafted X509 certificate",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of python as shipped with Red Hat Enterprise Linux 5 and 6.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-5010"
},
{
"category": "external",
"summary": "RHBZ#1666519",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666519"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-5010",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5010"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5010",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5010"
},
{
"category": "external",
"summary": "https://python-security.readthedocs.io/vuln/ssl-crl-dps-dos.html",
"url": "https://python-security.readthedocs.io/vuln/ssl-crl-dps-dos.html"
}
],
"release_date": "2019-01-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: NULL pointer dereference using a specially crafted X509 certificate"
},
{
"cve": "CVE-2019-7149",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2019-01-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1671443"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer over-read was discovered in the function read_srclines in dwarf_getsrclines.c in libdw in elfutils 0.175. A crafted input can cause segmentation faults, leading to denial-of-service, as demonstrated by eu-nm.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "elfutils: heap-based buffer over-read in read_srclines in dwarf_getsrclines.c in libdw",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-7149"
},
{
"category": "external",
"summary": "RHBZ#1671443",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671443"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-7149",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7149"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-7149",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-7149"
}
],
"release_date": "2019-01-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "elfutils: heap-based buffer over-read in read_srclines in dwarf_getsrclines.c in libdw"
},
{
"cve": "CVE-2019-7150",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2019-01-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1671446"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in elfutils 0.175. A segmentation fault can occur in the function elf64_xlatetom in libelf/elf32_xlatetom.c, due to dwfl_segment_report_module not checking whether the dyn data read from a core file is truncated. A crafted input can cause a program crash, leading to denial-of-service, as demonstrated by eu-stack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "elfutils: segmentation fault in elf64_xlatetom in libelf/elf32_xlatetom.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-7150"
},
{
"category": "external",
"summary": "RHBZ#1671446",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671446"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-7150",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7150"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-7150",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-7150"
}
],
"release_date": "2018-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "elfutils: segmentation fault in elf64_xlatetom in libelf/elf32_xlatetom.c"
},
{
"cve": "CVE-2019-7664",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2019-02-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1677536"
}
],
"notes": [
{
"category": "description",
"text": "In elfutils 0.175, a negative-sized memcpy is attempted in elf_cvt_note in libelf/note_xlate.h because of an incorrect overflow check. Crafted elf input causes a segmentation fault, leading to denial of service (program crash).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "elfutils: out of bound write in elf_cvt_note in libelf/note_xlate.h",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-7664"
},
{
"category": "external",
"summary": "RHBZ#1677536",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1677536"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-7664",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7664"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-7664",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-7664"
}
],
"release_date": "2019-01-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "elfutils: out of bound write in elf_cvt_note in libelf/note_xlate.h"
},
{
"cve": "CVE-2019-7665",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2019-02-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1677538"
}
],
"notes": [
{
"category": "description",
"text": "In elfutils 0.175, a heap-based buffer over-read was discovered in the function elf32_xlatetom in elf32_xlatetom.c in libelf. A crafted ELF input can cause a segmentation fault leading to denial of service (program crash) because ebl_core_note does not reject malformed core file notes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "elfutils: heap-based buffer over-read in function elf32_xlatetom in elf32_xlatetom.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-7665"
},
{
"category": "external",
"summary": "RHBZ#1677538",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1677538"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-7665",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7665"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-7665",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-7665"
}
],
"release_date": "2019-01-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "elfutils: heap-based buffer over-read in function elf32_xlatetom in elf32_xlatetom.c"
},
{
"cve": "CVE-2019-9740",
"cwe": {
"id": "CWE-113",
"name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
},
"discovery_date": "2019-03-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1688169"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the query string after a ? character) followed by an HTTP header or a Redis command. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: CRLF injection via the query part of the url passed to urlopen()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects:\n* All current versions of Red Hat OpenStack Platform. However, version 8 is due to retire on the 20th of April 2019, there are no more planned releases prior to this date.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-9740"
},
{
"category": "external",
"summary": "RHBZ#1688169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1688169"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-9740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9740"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9740",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9740"
}
],
"release_date": "2019-03-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: CRLF injection via the query part of the url passed to urlopen()"
},
{
"cve": "CVE-2019-9947",
"cwe": {
"id": "CWE-113",
"name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
},
"discovery_date": "2019-03-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1695572"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: CRLF injection via the path part of the url passed to urlopen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-9947"
},
{
"category": "external",
"summary": "RHBZ#1695572",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695572"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-9947",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9947"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9947",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9947"
}
],
"release_date": "2019-03-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: CRLF injection via the path part of the url passed to urlopen()"
},
{
"cve": "CVE-2019-9948",
"cwe": {
"id": "CWE-749",
"name": "Exposed Dangerous Method or Function"
},
"discovery_date": "2019-03-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1695570"
}
],
"notes": [
{
"category": "description",
"text": "urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen(\u0027local_file:///etc/passwd\u0027) call.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-9948"
},
{
"category": "external",
"summary": "RHBZ#1695570",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695570"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-9948",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9948"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9948",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9948"
}
],
"release_date": "2019-03-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
},
{
"category": "workaround",
"details": "If your application uses a blacklist to prevent \"file://\" schema from being used, consider using a whitelist approach to just allow the schemas you want or add \"local_file://\" schema to your blacklist.",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms"
},
{
"acknowledgments": [
{
"names": [
"the Mozilla project"
]
},
{
"names": [
"Jonas Allmann"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2019-11729",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2019-07-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1728437"
}
],
"notes": [
{
"category": "description",
"text": "Empty or malformed p256-ECDH public keys may trigger a segmentation fault due values being improperly sanitized before being copied into memory and used. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nss: Empty or malformed p256-ECDH public keys may trigger a segmentation fault",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Firefox on Red Hat Enterprise Linux is built against the system nss library.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11729"
},
{
"category": "external",
"summary": "RHBZ#1728437",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728437"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11729",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11729"
},
{
"category": "external",
"summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11729",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11729"
}
],
"release_date": "2019-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nss: Empty or malformed p256-ECDH public keys may trigger a segmentation fault"
},
{
"acknowledgments": [
{
"names": [
"the Mozilla Project"
]
}
],
"cve": "CVE-2019-11745",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2019-11-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1774831"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow was found in the NSC_EncryptUpdate() function in Mozilla nss. A remote attacker could trigger this flaw via SRTP encrypt or decrypt operations, to execute arbitrary code with the permissions of the user running the application (compiled with nss). While the attack complexity is high, the impact to confidentiality, integrity, and availability are high as well.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nss: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Firefox and Thunderbird on Red Hat Enterprise Linux are built against the system nss library.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11745"
},
{
"category": "external",
"summary": "RHBZ#1774831",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774831"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11745",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11745"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11745",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11745"
},
{
"category": "external",
"summary": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.44.3_release_notes",
"url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.44.3_release_notes"
},
{
"category": "external",
"summary": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47.1_release_notes",
"url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47.1_release_notes"
}
],
"release_date": "2019-11-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "nss: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate"
},
{
"cve": "CVE-2019-13734",
"discovery_date": "2019-12-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1781980"
}
],
"notes": [
{
"category": "description",
"text": "Out of bounds write in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "sqlite: fts3: improve shadow table corruption detection",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-13734"
},
{
"category": "external",
"summary": "RHBZ#1781980",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781980"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-13734",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13734"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-13734",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13734"
},
{
"category": "external",
"summary": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html",
"url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html"
}
],
"release_date": "2019-12-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "sqlite: fts3: improve shadow table corruption detection"
},
{
"acknowledgments": [
{
"names": [
"Damien Aumaitre",
"Nicolas Surbayrole"
],
"organization": "Quarkslab"
}
],
"cve": "CVE-2020-1734",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"discovery_date": "2019-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1801804"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the pipe lookup plugin of ansible. Arbitrary commands can be run, when the pipe lookup plugin uses subprocess.Popen() with shell=True, by overwriting ansible facts and the variable is not escaped by quote plugin. An attacker could take advantage and run arbitrary commands by overwriting the ansible facts.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ansible: shell enabled by default in a pipe lookup plugin subprocess",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Ansible Engine 2.7.16, 2.8.10, and 2.9.6 as well as previous versions are affected.\n\nAnsible Tower 3.4.5, 3.5.5 and 3.6.3 as well as previous versions are affected.\n\nIn Red Hat OpenStack Platform, because the flaw has a lower impact, ansible is not directly customer exposed, and the fix would require a substantial amount of development, no update will be provided at this time for the RHOSP ansible package.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1734"
},
{
"category": "external",
"summary": "RHBZ#1801804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1801804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1734",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1734"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1734",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1734"
}
],
"release_date": "2020-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
},
{
"category": "workaround",
"details": "This issue can be avoided by escaping variables which are used in the lookup.",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ansible: shell enabled by default in a pipe lookup plugin subprocess"
},
{
"acknowledgments": [
{
"names": [
"Damien Aumaitre",
"Nicolas Surbayrole"
],
"organization": "Quarkslab"
}
],
"cve": "CVE-2020-1735",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2020-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1802085"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Ansible Engine when the fetch module is used. An attacker could intercept the module, inject a new path, and then choose a new destination path on the controller node.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ansible: path injection on dest parameter in fetch module",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Ansible Engine 2.7.16, 2.8.10, and 2.9.6 as well as previous versions are affected.\n\nAnsible Tower 3.4.5, 3.5.5 and 3.6.3 as well as previous versions are affected.\n\nIn Red Hat OpenStack Platform, because the flaw has a lower impact, ansible is not directly customer exposed, and the fix would require a substantial amount of development, no update will be provided at this time for the RHOSP ansible package.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1735"
},
{
"category": "external",
"summary": "RHBZ#1802085",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802085"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1735",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1735"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1735",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1735"
}
],
"release_date": "2020-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
},
{
"category": "workaround",
"details": "Currently, there is no mitigation for this issue except avoid using the affected fetch module when possible.",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ansible: path injection on dest parameter in fetch module"
},
{
"acknowledgments": [
{
"names": [
"Damien Aumaitre",
"Nicolas Surbayrole"
],
"organization": "Quarkslab"
}
],
"cve": "CVE-2020-1736",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"discovery_date": "2020-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1802124"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Ansible Engine when a file is moved using atomic_move primitive as the file mode cannot be specified. This sets the destination files world-readable if the destination file does not exist and if the file exists, the file could be changed to have less restrictive permissions before the move. This issue affects only the newly created files and not existing ones. If the file already exists at the final destination, those permissions are retained. This could lead to the disclosure of sensitive data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ansible: atomic_move primitive sets permissive permissions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Ansible Engine 2.8.14 and 2.9.12 as well as previous versions and all 2.7.x versions are affected.\n\nAnsible Tower 3.6.5 and 3.7.2 as well as previous versions are affected.\n\nIn Red Hat OpenStack Platform, because the flaw has a lower impact, ansible is not directly customer exposed, and the fix would require a substantial amount of development, no update will be provided at this time for the RHOSP ansible package.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1736"
},
{
"category": "external",
"summary": "RHBZ#1802124",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802124"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1736",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1736"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1736",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1736"
}
],
"release_date": "2020-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
},
{
"category": "workaround",
"details": "This issue can be mitigated by specifying the \"mode\" on the task. That just leaves a race condition in place where newly created files that specify a mode in the task briefly go from 666 - umask to the final mode. An alternative workaround if many new files are created and to avoid setting a specific mode for each file would be to set the \"mode\" to \"preserve\" value. That will maintain the permissions of the source file on the controller in the final file on the managed host.",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 2.2,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ansible: atomic_move primitive sets permissive permissions"
},
{
"acknowledgments": [
{
"names": [
"Damien Aumaitre",
"Nicolas Surbayrole"
],
"organization": "Quarkslab"
}
],
"cve": "CVE-2020-1737",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2020-02-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1802154"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Ansible Engine when using the Extract-Zip function from the win_unzip module as the extracted file(s) are not checked if they belong to the destination folder. An attacker could take advantage of this flaw by crafting an archive anywhere in the file system, using a path traversal.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ansible: Extract-Zip function in win_unzip module does not check extracted path",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Ansible Engine 2.7.16, 2.8.10, and 2.9.6 as well as previous versions are affected.\n\nAnsible Tower 3.4.5, 3.5.5 and 3.6.3 as well as previous versions are affected.\n\nIn Red Hat OpenStack Platform, because the flaw has a lower impact, ansible is not directly customer exposed, and the fix would require a substantial amount of development, no update will be provided at this time for the RHOSP ansible package.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1737"
},
{
"category": "external",
"summary": "RHBZ#1802154",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802154"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1737"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1737",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1737"
}
],
"release_date": "2020-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
},
{
"category": "workaround",
"details": "Currently, there is no mitigation for this issue except avoid using the affected win_unzip module when possible.",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ansible: Extract-Zip function in win_unzip module does not check extracted path"
},
{
"acknowledgments": [
{
"names": [
"Damien Aumaitre",
"Nicolas Surbayrole"
],
"organization": "Quarkslab"
}
],
"cve": "CVE-2020-1738",
"cwe": {
"id": "CWE-88",
"name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)"
},
"discovery_date": "2020-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1802164"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Ansible Engine when the module package or service is used and the parameter \u0027use\u0027 is not specified. If a previous task is executed with a malicious user, the module sent can be selected by the attacker using the ansible facts file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ansible: module package can be selected by the ansible facts",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Ansible Engine 2.7.16, 2.8.10, and 2.9.6 as well as previous versions are affected.\n\nAnsible Tower 3.4.5, 3.5.5 and 3.6.3 as well as previous versions are affected.\n\nIn Red Hat OpenStack Platform, because the flaw has a lower impact, ansible is not directly customer exposed, and the fix would require a substantial amount of development, no update will be provided at this time for the RHOSP ansible package.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1738"
},
{
"category": "external",
"summary": "RHBZ#1802164",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802164"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1738",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1738"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1738",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1738"
}
],
"release_date": "2020-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
},
{
"category": "workaround",
"details": "Specify the parameter \u0027use\u0027 when possible on the package and service modules. Avoid using Ansible Collections on Ansible 2.8.9 or 2.7.16 (and any of the previous versions) as they are not rejecting python with no path (already fixed in 2.9.x).",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.9,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ansible: module package can be selected by the ansible facts"
},
{
"acknowledgments": [
{
"names": [
"Damien Aumaitre",
"Nicolas Surbayrole"
],
"organization": "Quarkslab"
}
],
"cve": "CVE-2020-1739",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2020-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1802178"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Ansible Engine. When a password is set with the argument \"password\" of svn module, it is used on svn command line, disclosing to other users within the same node. An attacker could take advantage by reading the cmdline file from that particular PID on the procfs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ansible: svn module leaks password when specified as a parameter",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Ansible Engine 2.7.16, 2.8.10, and 2.9.6 as well as previous versions are affected.\n\nAnsible Tower 3.4.5, 3.5.5 and 3.6.3 as well as previous versions are affected.\n\nIn Red Hat OpenStack Platform, because the flaw has a lower impact, ansible is not directly customer exposed, and the fix would require a substantial amount of development, no update will be provided at this time for the RHOSP ansible package.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1739"
},
{
"category": "external",
"summary": "RHBZ#1802178",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802178"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1739",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1739"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1739",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1739"
}
],
"release_date": "2020-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
},
{
"category": "workaround",
"details": "Instead of using the parameter \u0027password\u0027 of the subversion module, provide the password with stdin.",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.9,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ansible: svn module leaks password when specified as a parameter"
},
{
"acknowledgments": [
{
"names": [
"Damien Aumaitre",
"Nicolas Surbayrole"
],
"organization": "Quarkslab"
}
],
"cve": "CVE-2020-1740",
"cwe": {
"id": "CWE-377",
"name": "Insecure Temporary File"
},
"discovery_date": "2020-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1802193"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Ansible Engine when using Ansible Vault for editing encrypted files. When a user executes \"ansible-vault edit\", another user on the same computer can read the old and new secret, as it is created in a temporary file with mkstemp and the returned file descriptor is closed and the method write_data is called to write the existing secret in the file. This method will delete the file before recreating it insecurely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ansible: secrets readable after ansible-vault edit",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Ansible Engine 2.7.16, 2.8.10, and 2.9.6 as well as previous versions are affected.\n\nAnsible Tower 3.4.5, 3.5.5 and 3.6.3 as well as previous versions are affected.\n\nIn Red Hat OpenStack Platform, because the flaw has a lower impact, ansible is not directly customer exposed, and the fix would require a substantial amount of development, no update will be provided at this time for the RHOSP ansible package.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1740"
},
{
"category": "external",
"summary": "RHBZ#1802193",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802193"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1740",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1740"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1740",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1740"
}
],
"release_date": "2020-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
},
{
"category": "workaround",
"details": "Currently, there is no mitigation for this issue except avoid using the \u0027edit\u0027 option from \u0027ansible-vault\u0027 command line tool.",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.9,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ansible: secrets readable after ansible-vault edit"
},
{
"acknowledgments": [
{
"names": [
"Felix Fountein"
]
}
],
"cve": "CVE-2020-1746",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2019-12-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1805491"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Ansible Engine when the ldap_attr and ldap_entry community modules are used. The issue discloses the LDAP bind password to stdout or a log file if a playbook task is written using the bind_pw in the parameters field. The highest threat from this vulnerability is data confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ansible: Information disclosure issue in ldap_attr and ldap_entry modules",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* Ansible Engine 2.7.16, 2.8.10, and 2.9.6 as well as previous versions are affected.\n\n* Ansible Tower 3.4.5, 3.5.5 and 3.6.3 as well as previous versions are affected.\n\n* Red Hat Gluster Storage and Red Hat Ceph Storage no longer maintains their own version of Ansible. The fix will be provided from core Ansible. But we still ship ansible separately for ceph ubuntu.\n\n* In Red Hat OpenStack Platform, because the flaw has a lower impact, ansible is not directly customer exposed, and the fix would require a substantial amount of development, no update will be provided at this time for the RHOSP ansible package.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1746"
},
{
"category": "external",
"summary": "RHBZ#1805491",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1805491"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1746",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1746"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1746",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1746"
}
],
"release_date": "2020-02-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
},
{
"category": "workaround",
"details": "Using args keyword and embedding the ldap_auth variable instead of using bind_pw parameter would mitigate this issue.",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ansible: Information disclosure issue in ldap_attr and ldap_entry modules"
},
{
"acknowledgments": [
{
"names": [
"Abhijeet Kasurde"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2020-1753",
"cwe": {
"id": "CWE-532",
"name": "Insertion of Sensitive Information into Log File"
},
"discovery_date": "2020-03-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1811008"
}
],
"notes": [
{
"category": "description",
"text": "A security flaw was found in the Ansible Engine when managing Kubernetes using the k8s connection plugin. Sensitive parameters such as passwords and tokens are passed to the kubectl command line instead of using environment variables or an input configuration file, which is safer. This flaw discloses passwords and tokens from the process list, and the no_log directive from the debug module would not be reflected in the underlying command-line tools options, displaying passwords and tokens on stdout and log files.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Ansible: kubectl connection plugin leaks sensitive information",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Ansible Engine 2.7.17, 2.8.10, and 2.9.6 as well as previous versions are affected.\n\nAnsible Tower 3.4.5, 3.5.5 and 3.6.3 as well as previous versions are affected.\n\nIn Red Hat OpenStack Platform, because the flaw has a lower impact, ansible is not directly customer exposed, and the fix would require a substantial amount of development, no update will be provided at this time for the RHOSP ansible package.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1753"
},
{
"category": "external",
"summary": "RHBZ#1811008",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1811008"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1753",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1753"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1753",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1753"
}
],
"release_date": "2020-03-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
},
{
"category": "workaround",
"details": "Currently, there is no mitigation for this issue.",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Ansible: kubectl connection plugin leaks sensitive information"
},
{
"acknowledgments": [
{
"names": [
"Damien Aumaitre",
"Nicolas Surbayrole"
],
"organization": "Quarkslab"
}
],
"cve": "CVE-2020-10684",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2020-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1815519"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Ansible Engine. When using ansible_facts as a subkey of itself, and promoting it to a variable when injecting is enabled, overwriting the ansible_facts after the clean, an attacker could take advantage of this by altering the ansible_facts leading to privilege escalation or code injection. The highest threat from this vulnerability are to data integrity and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Ansible: code injection when using ansible_facts as a subkey",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* Ansible Engine 2.7.16, 2.8.10, and 2.9.6 as well as previous versions are affected.\n* Ansible Tower 3.4.5, 3.5.5 and 3.6.3 as well as previous versions are affected.\n* Red Hat Gluster Storage and Red Hat Ceph Storage no longer maintains their own version of Ansible. The fix will be consumed from core Ansible. But we still ship ansible separately for ceph ubuntu.\n* Red Hat OpenStack Platform does package the affected code. However, because RHOSP does not use ansible_facts as a subkey directly, the RHOSP impact has been reduced to Moderate and no update will be provided at this time for the RHOSP ansible package.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-10684"
},
{
"category": "external",
"summary": "RHBZ#1815519",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815519"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-10684",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10684"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10684",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10684"
}
],
"release_date": "2020-03-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
},
{
"category": "workaround",
"details": "Currently, there is not a known mitigation except avoiding the functionality of using ansible_facts as a subkey.",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.9,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Ansible: code injection when using ansible_facts as a subkey"
},
{
"acknowledgments": [
{
"names": [
"Damien Aumaitre",
"Nicolas Surbayrole"
],
"organization": "Quarkslab"
}
],
"cve": "CVE-2020-10685",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"discovery_date": "2020-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1814627"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found on Ansible Engine when using modules which decrypts vault files such as assemble, script, unarchive, win_copy, aws_s3 or copy modules. The temporary directory is created in /tmp leaves the secrets unencrypted.\r\n\r\nOn Operating Systems which /tmp is not a tmpfs but part of the root partition, the directory is only cleared on boot and the decrypted data remains when the host is switched off. The system will be vulnerable when the system is not running. So decrypted data must be cleared as soon as possible and the data which normally is encrypted is sensible.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Ansible: modules which use files encrypted with vault are not properly cleaned up",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* Ansible Engine 2.7.16, 2.8.10, and 2.9.6 as well as previous versions are affected.\n\n* Ansible Tower 3.4.5, 3.5.5 and 3.6.3 as well as previous versions are affected.\n\n* In Red Hat OpenStack Platform, because the flaw has a lower impact, ansible is not directly customer exposed, and the fix would require a substantial amount of development, no update will be provided at this time for the RHOSP ansible package.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-10685"
},
{
"category": "external",
"summary": "RHBZ#1814627",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1814627"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-10685",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10685"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10685",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10685"
}
],
"release_date": "2020-03-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
},
{
"category": "workaround",
"details": "Currently, there is no mitigation for this issue except by removing manually the temporary created file after every run.",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Ansible: modules which use files encrypted with vault are not properly cleaned up"
}
]
}
rhsa-2019:2075
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for binutils is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The binutils packages provide a collection of binary utilities for the manipulation of object code in various object file formats. It includes the ar, as, gprof, ld, nm, objcopy, objdump, ranlib, readelf, size, strings, strip, and addr2line utilities.\n\nSecurity Fix(es):\n\n* binutils: integer overflow leads to heap-based buffer overflow in objdump (CVE-2018-1000876)\n\n* binutils: Stack Exhaustion in the demangling functions provided by libiberty (CVE-2018-12641)\n\n* binutils: NULL pointer dereference in work_stuff_copy_to_from in cplus-dem.c. (CVE-2018-12697)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.7 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:2075",
"url": "https://access.redhat.com/errata/RHSA-2019:2075"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.7_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.7_release_notes/index"
},
{
"category": "external",
"summary": "1594410",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1594410"
},
{
"category": "external",
"summary": "1595417",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1595417"
},
{
"category": "external",
"summary": "1624776",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1624776"
},
{
"category": "external",
"summary": "1652587",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1652587"
},
{
"category": "external",
"summary": "1664699",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1664699"
},
{
"category": "external",
"summary": "1670014",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1670014"
},
{
"category": "external",
"summary": "1699745",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1699745"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2075.json"
}
],
"title": "Red Hat Security Advisory: binutils security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T18:09:24+00:00",
"generator": {
"date": "2025-11-21T18:09:24+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2019:2075",
"initial_release_date": "2019-08-06T14:10:20+00:00",
"revision_history": [
{
"date": "2019-08-06T14:10:20+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-08-06T14:10:20+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:09:24+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-devel-0:2.27-41.base.el7.x86_64",
"product": {
"name": "binutils-devel-0:2.27-41.base.el7.x86_64",
"product_id": "binutils-devel-0:2.27-41.base.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-devel@2.27-41.base.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"product": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"product_id": "binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debuginfo@2.27-41.base.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "binutils-0:2.27-41.base.el7.x86_64",
"product": {
"name": "binutils-0:2.27-41.base.el7.x86_64",
"product_id": "binutils-0:2.27-41.base.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils@2.27-41.base.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-devel-0:2.27-41.base.el7.i686",
"product": {
"name": "binutils-devel-0:2.27-41.base.el7.i686",
"product_id": "binutils-devel-0:2.27-41.base.el7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-devel@2.27-41.base.el7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "binutils-debuginfo-0:2.27-41.base.el7.i686",
"product": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.i686",
"product_id": "binutils-debuginfo-0:2.27-41.base.el7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debuginfo@2.27-41.base.el7?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-0:2.27-41.base.el7.src",
"product": {
"name": "binutils-0:2.27-41.base.el7.src",
"product_id": "binutils-0:2.27-41.base.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils@2.27-41.base.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-devel-0:2.27-41.base.el7.ppc",
"product": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc",
"product_id": "binutils-devel-0:2.27-41.base.el7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-devel@2.27-41.base.el7?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc",
"product": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc",
"product_id": "binutils-debuginfo-0:2.27-41.base.el7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debuginfo@2.27-41.base.el7?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-devel-0:2.27-41.base.el7.ppc64",
"product": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc64",
"product_id": "binutils-devel-0:2.27-41.base.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-devel@2.27-41.base.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"product": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"product_id": "binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debuginfo@2.27-41.base.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "binutils-0:2.27-41.base.el7.ppc64",
"product": {
"name": "binutils-0:2.27-41.base.el7.ppc64",
"product_id": "binutils-0:2.27-41.base.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils@2.27-41.base.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-devel-0:2.27-41.base.el7.s390",
"product": {
"name": "binutils-devel-0:2.27-41.base.el7.s390",
"product_id": "binutils-devel-0:2.27-41.base.el7.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-devel@2.27-41.base.el7?arch=s390"
}
}
},
{
"category": "product_version",
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390",
"product": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390",
"product_id": "binutils-debuginfo-0:2.27-41.base.el7.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debuginfo@2.27-41.base.el7?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-devel-0:2.27-41.base.el7.s390x",
"product": {
"name": "binutils-devel-0:2.27-41.base.el7.s390x",
"product_id": "binutils-devel-0:2.27-41.base.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-devel@2.27-41.base.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390x",
"product": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390x",
"product_id": "binutils-debuginfo-0:2.27-41.base.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debuginfo@2.27-41.base.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "binutils-0:2.27-41.base.el7.s390x",
"product": {
"name": "binutils-0:2.27-41.base.el7.s390x",
"product_id": "binutils-0:2.27-41.base.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils@2.27-41.base.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-devel-0:2.27-41.base.el7.ppc64le",
"product": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc64le",
"product_id": "binutils-devel-0:2.27-41.base.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-devel@2.27-41.base.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"product": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"product_id": "binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debuginfo@2.27-41.base.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "binutils-0:2.27-41.base.el7.ppc64le",
"product": {
"name": "binutils-0:2.27-41.base.el7.ppc64le",
"product_id": "binutils-0:2.27-41.base.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils@2.27-41.base.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-0:2.27-41.base.el7.src"
},
"product_reference": "binutils-0:2.27-41.base.el7.src",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.i686",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.s390",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-devel-0:2.27-41.base.el7.i686"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.i686",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.s390",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-devel-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-0:2.27-41.base.el7.src"
},
"product_reference": "binutils-0:2.27-41.base.el7.src",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.i686",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.s390",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.i686",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.s390",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-0:2.27-41.base.el7.src"
},
"product_reference": "binutils-0:2.27-41.base.el7.src",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.i686",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.s390",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.i686"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.i686",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.s390",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.src"
},
"product_reference": "binutils-0:2.27-41.base.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-0:2.27-41.base.el7.src"
},
"product_reference": "binutils-0:2.27-41.base.el7.src",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.i686",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.s390",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-devel-0:2.27-41.base.el7.i686"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.i686",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.s390",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-devel-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-0:2.27-41.base.el7.src"
},
"product_reference": "binutils-0:2.27-41.base.el7.src",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.i686",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.s390",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.i686"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.i686",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.s390",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-12641",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2018-06-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1594410"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in arm_pt in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there are recursive stack frames: demangle_arm_hp_template, demangle_class_name, demangle_fund_type, do_type, do_arg, demangle_args, and demangle_nested_args. This can occur during execution of nm-new.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "binutils: Stack Exhaustion in the demangling functions provided by libiberty",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The issue is classified as low severity primarily because binutils is not typically exposed to untrusted inputs in most environments, limiting its exploitation potential. The stack overflow in demangle_class_name() only triggers during the parsing of malformed ELF files, which would require an attacker to convince a user to process a malicious file with binutils. Moreover, binutils does not handle privileged operations, meaning exploitation is unlikely to lead to system compromise or escalation of privileges. Additionally, the impact is localized to the application itself, without affecting the broader system or network security.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-0:2.27-41.base.el7.src",
"7Server-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.src",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12641"
},
{
"category": "external",
"summary": "RHBZ#1594410",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1594410"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12641",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12641"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12641",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12641"
}
],
"release_date": "2018-04-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-08-06T14:10:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-0:2.27-41.base.el7.src",
"7Server-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.src",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:2075"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-0:2.27-41.base.el7.src",
"7Server-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.src",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "binutils: Stack Exhaustion in the demangling functions provided by libiberty"
},
{
"cve": "CVE-2018-12697",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2018-06-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1595417"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference (aka SEGV on unknown address 0x000000000000) was discovered in work_stuff_copy_to_from in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. This can occur during execution of objdump.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "binutils: NULL pointer dereference in work_stuff_copy_to_from in cplus-dem.c.",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is classified with a low severity primarily because binutils is not typically exposed to untrusted inputs in most environments, limiting the possibility of exploitation. Additionally, this NULL pointer dereference is only triggered during the parsing of a specially crafted file, requiring an attacker to convince a user to process this file with objdump. Furthermore, binutils does not handle privileged operations, meaning that exploitation is unlikely to lead to system compromise or escalation of privileges. Also, the impact is limited to the application itself, without affecting the broader system or network security.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-0:2.27-41.base.el7.src",
"7Server-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.src",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12697"
},
{
"category": "external",
"summary": "RHBZ#1595417",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1595417"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12697",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12697"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12697",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12697"
}
],
"release_date": "2018-04-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-08-06T14:10:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-0:2.27-41.base.el7.src",
"7Server-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.src",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:2075"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-0:2.27-41.base.el7.src",
"7Server-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.src",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "binutils: NULL pointer dereference in work_stuff_copy_to_from in cplus-dem.c."
},
{
"cve": "CVE-2018-1000876",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2018-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1664699"
}
],
"notes": [
{
"category": "description",
"text": "binutils version 2.32 and earlier contains a Integer Overflow vulnerability in objdump, bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc that can result in Integer overflow trigger heap overflow. Successful exploitation allows execution of arbitrary code.. This attack appear to be exploitable via Local. This vulnerability appears to have been fixed in after commit 3a551c7a1b80fca579461774860574eabfd7f18f.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "binutils: integer overflow leads to heap-based buffer overflow in objdump",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The issue is classified as moderate severity primarily because of the unlikelihood of running a 32bit compiled objdump and/or having a compiled binary that uses 32bit compiled binutils libraries to analyze binaries from a not trusted source. Moreover, binutils does not handle privileged operations, meaning exploitation is unlikely to lead to system compromise or escalation of privileges. Additionally, the impact is localized to the application itself, without affecting the broader system or network security. \n\nAs per upstream binutils security policy this issue is not considered as a security flaw. Basically the key element of the policy that affects this is the understanding that analysis of untrusted binaries must always be done in a sandbox because the ELF format is open ended enough to make the analysis tools do anything, like including and processing arbitrary files. This eliminates the only possible vulnerability vector here, which is the possibility of a user being tricked into downloading and analyzing an untrusted ELF without sandboxing.\n\nSee the binutils security policy for more details:\nhttps://sourceware.org/cgit/binutils-gdb/tree/binutils/SECURITY.txt\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-190: Integer Overflow leading to a CWE-122: Heap-based Buffer Overflow vulnerability, and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token-based multi-factor authentication (MFA) and enforced through least privilege, ensuring only authorized users can execute or modify code. Red Hat also applies least functionality, enabling only essential features, services, and ports to reduce the attack surface for heap-based buffer overflow exploits. The environment uses IPS/IDS and antimalware solutions to detect and respond to threats in real time, helping prevent or limit exploitation attempts. Static code analysis and peer reviews ensure all user inputs are thoroughly validated, reducing the risk of system instability, data exposure, or privilege escalation. Finally, memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) enhance resilience against buffer overflows and denial-of-service attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-0:2.27-41.base.el7.src",
"7Server-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.src",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1000876"
},
{
"category": "external",
"summary": "RHBZ#1664699",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1664699"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000876"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000876",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000876"
}
],
"release_date": "2018-12-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-08-06T14:10:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-0:2.27-41.base.el7.src",
"7Server-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.src",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:2075"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-0:2.27-41.base.el7.src",
"7Server-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.src",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "binutils: integer overflow leads to heap-based buffer overflow in objdump"
}
]
}
RHSA-2019:2075
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for binutils is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The binutils packages provide a collection of binary utilities for the manipulation of object code in various object file formats. It includes the ar, as, gprof, ld, nm, objcopy, objdump, ranlib, readelf, size, strings, strip, and addr2line utilities.\n\nSecurity Fix(es):\n\n* binutils: integer overflow leads to heap-based buffer overflow in objdump (CVE-2018-1000876)\n\n* binutils: Stack Exhaustion in the demangling functions provided by libiberty (CVE-2018-12641)\n\n* binutils: NULL pointer dereference in work_stuff_copy_to_from in cplus-dem.c. (CVE-2018-12697)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.7 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:2075",
"url": "https://access.redhat.com/errata/RHSA-2019:2075"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.7_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.7_release_notes/index"
},
{
"category": "external",
"summary": "1594410",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1594410"
},
{
"category": "external",
"summary": "1595417",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1595417"
},
{
"category": "external",
"summary": "1624776",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1624776"
},
{
"category": "external",
"summary": "1652587",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1652587"
},
{
"category": "external",
"summary": "1664699",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1664699"
},
{
"category": "external",
"summary": "1670014",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1670014"
},
{
"category": "external",
"summary": "1699745",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1699745"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2075.json"
}
],
"title": "Red Hat Security Advisory: binutils security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T18:09:24+00:00",
"generator": {
"date": "2025-11-21T18:09:24+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2019:2075",
"initial_release_date": "2019-08-06T14:10:20+00:00",
"revision_history": [
{
"date": "2019-08-06T14:10:20+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-08-06T14:10:20+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:09:24+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-devel-0:2.27-41.base.el7.x86_64",
"product": {
"name": "binutils-devel-0:2.27-41.base.el7.x86_64",
"product_id": "binutils-devel-0:2.27-41.base.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-devel@2.27-41.base.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"product": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"product_id": "binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debuginfo@2.27-41.base.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "binutils-0:2.27-41.base.el7.x86_64",
"product": {
"name": "binutils-0:2.27-41.base.el7.x86_64",
"product_id": "binutils-0:2.27-41.base.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils@2.27-41.base.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-devel-0:2.27-41.base.el7.i686",
"product": {
"name": "binutils-devel-0:2.27-41.base.el7.i686",
"product_id": "binutils-devel-0:2.27-41.base.el7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-devel@2.27-41.base.el7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "binutils-debuginfo-0:2.27-41.base.el7.i686",
"product": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.i686",
"product_id": "binutils-debuginfo-0:2.27-41.base.el7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debuginfo@2.27-41.base.el7?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-0:2.27-41.base.el7.src",
"product": {
"name": "binutils-0:2.27-41.base.el7.src",
"product_id": "binutils-0:2.27-41.base.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils@2.27-41.base.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-devel-0:2.27-41.base.el7.ppc",
"product": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc",
"product_id": "binutils-devel-0:2.27-41.base.el7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-devel@2.27-41.base.el7?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc",
"product": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc",
"product_id": "binutils-debuginfo-0:2.27-41.base.el7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debuginfo@2.27-41.base.el7?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-devel-0:2.27-41.base.el7.ppc64",
"product": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc64",
"product_id": "binutils-devel-0:2.27-41.base.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-devel@2.27-41.base.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"product": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"product_id": "binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debuginfo@2.27-41.base.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "binutils-0:2.27-41.base.el7.ppc64",
"product": {
"name": "binutils-0:2.27-41.base.el7.ppc64",
"product_id": "binutils-0:2.27-41.base.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils@2.27-41.base.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-devel-0:2.27-41.base.el7.s390",
"product": {
"name": "binutils-devel-0:2.27-41.base.el7.s390",
"product_id": "binutils-devel-0:2.27-41.base.el7.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-devel@2.27-41.base.el7?arch=s390"
}
}
},
{
"category": "product_version",
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390",
"product": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390",
"product_id": "binutils-debuginfo-0:2.27-41.base.el7.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debuginfo@2.27-41.base.el7?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-devel-0:2.27-41.base.el7.s390x",
"product": {
"name": "binutils-devel-0:2.27-41.base.el7.s390x",
"product_id": "binutils-devel-0:2.27-41.base.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-devel@2.27-41.base.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390x",
"product": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390x",
"product_id": "binutils-debuginfo-0:2.27-41.base.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debuginfo@2.27-41.base.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "binutils-0:2.27-41.base.el7.s390x",
"product": {
"name": "binutils-0:2.27-41.base.el7.s390x",
"product_id": "binutils-0:2.27-41.base.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils@2.27-41.base.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-devel-0:2.27-41.base.el7.ppc64le",
"product": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc64le",
"product_id": "binutils-devel-0:2.27-41.base.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-devel@2.27-41.base.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"product": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"product_id": "binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debuginfo@2.27-41.base.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "binutils-0:2.27-41.base.el7.ppc64le",
"product": {
"name": "binutils-0:2.27-41.base.el7.ppc64le",
"product_id": "binutils-0:2.27-41.base.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils@2.27-41.base.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-0:2.27-41.base.el7.src"
},
"product_reference": "binutils-0:2.27-41.base.el7.src",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.i686",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.s390",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-devel-0:2.27-41.base.el7.i686"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.i686",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.s390",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-devel-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-0:2.27-41.base.el7.src"
},
"product_reference": "binutils-0:2.27-41.base.el7.src",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.i686",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.s390",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.i686",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.s390",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-0:2.27-41.base.el7.src"
},
"product_reference": "binutils-0:2.27-41.base.el7.src",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.i686",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.s390",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.i686"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.i686",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.s390",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.src"
},
"product_reference": "binutils-0:2.27-41.base.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-0:2.27-41.base.el7.src"
},
"product_reference": "binutils-0:2.27-41.base.el7.src",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.i686",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.s390",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-devel-0:2.27-41.base.el7.i686"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.i686",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.s390",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-devel-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-0:2.27-41.base.el7.src"
},
"product_reference": "binutils-0:2.27-41.base.el7.src",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.i686",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.s390",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.i686"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.i686",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.s390",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-12641",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2018-06-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1594410"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in arm_pt in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there are recursive stack frames: demangle_arm_hp_template, demangle_class_name, demangle_fund_type, do_type, do_arg, demangle_args, and demangle_nested_args. This can occur during execution of nm-new.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "binutils: Stack Exhaustion in the demangling functions provided by libiberty",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The issue is classified as low severity primarily because binutils is not typically exposed to untrusted inputs in most environments, limiting its exploitation potential. The stack overflow in demangle_class_name() only triggers during the parsing of malformed ELF files, which would require an attacker to convince a user to process a malicious file with binutils. Moreover, binutils does not handle privileged operations, meaning exploitation is unlikely to lead to system compromise or escalation of privileges. Additionally, the impact is localized to the application itself, without affecting the broader system or network security.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-0:2.27-41.base.el7.src",
"7Server-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.src",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12641"
},
{
"category": "external",
"summary": "RHBZ#1594410",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1594410"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12641",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12641"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12641",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12641"
}
],
"release_date": "2018-04-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-08-06T14:10:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-0:2.27-41.base.el7.src",
"7Server-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.src",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:2075"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-0:2.27-41.base.el7.src",
"7Server-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.src",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "binutils: Stack Exhaustion in the demangling functions provided by libiberty"
},
{
"cve": "CVE-2018-12697",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2018-06-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1595417"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference (aka SEGV on unknown address 0x000000000000) was discovered in work_stuff_copy_to_from in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. This can occur during execution of objdump.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "binutils: NULL pointer dereference in work_stuff_copy_to_from in cplus-dem.c.",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is classified with a low severity primarily because binutils is not typically exposed to untrusted inputs in most environments, limiting the possibility of exploitation. Additionally, this NULL pointer dereference is only triggered during the parsing of a specially crafted file, requiring an attacker to convince a user to process this file with objdump. Furthermore, binutils does not handle privileged operations, meaning that exploitation is unlikely to lead to system compromise or escalation of privileges. Also, the impact is limited to the application itself, without affecting the broader system or network security.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-0:2.27-41.base.el7.src",
"7Server-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.src",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12697"
},
{
"category": "external",
"summary": "RHBZ#1595417",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1595417"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12697",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12697"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12697",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12697"
}
],
"release_date": "2018-04-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-08-06T14:10:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-0:2.27-41.base.el7.src",
"7Server-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.src",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:2075"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-0:2.27-41.base.el7.src",
"7Server-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.src",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "binutils: NULL pointer dereference in work_stuff_copy_to_from in cplus-dem.c."
},
{
"cve": "CVE-2018-1000876",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2018-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1664699"
}
],
"notes": [
{
"category": "description",
"text": "binutils version 2.32 and earlier contains a Integer Overflow vulnerability in objdump, bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc that can result in Integer overflow trigger heap overflow. Successful exploitation allows execution of arbitrary code.. This attack appear to be exploitable via Local. This vulnerability appears to have been fixed in after commit 3a551c7a1b80fca579461774860574eabfd7f18f.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "binutils: integer overflow leads to heap-based buffer overflow in objdump",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The issue is classified as moderate severity primarily because of the unlikelihood of running a 32bit compiled objdump and/or having a compiled binary that uses 32bit compiled binutils libraries to analyze binaries from a not trusted source. Moreover, binutils does not handle privileged operations, meaning exploitation is unlikely to lead to system compromise or escalation of privileges. Additionally, the impact is localized to the application itself, without affecting the broader system or network security. \n\nAs per upstream binutils security policy this issue is not considered as a security flaw. Basically the key element of the policy that affects this is the understanding that analysis of untrusted binaries must always be done in a sandbox because the ELF format is open ended enough to make the analysis tools do anything, like including and processing arbitrary files. This eliminates the only possible vulnerability vector here, which is the possibility of a user being tricked into downloading and analyzing an untrusted ELF without sandboxing.\n\nSee the binutils security policy for more details:\nhttps://sourceware.org/cgit/binutils-gdb/tree/binutils/SECURITY.txt\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-190: Integer Overflow leading to a CWE-122: Heap-based Buffer Overflow vulnerability, and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token-based multi-factor authentication (MFA) and enforced through least privilege, ensuring only authorized users can execute or modify code. Red Hat also applies least functionality, enabling only essential features, services, and ports to reduce the attack surface for heap-based buffer overflow exploits. The environment uses IPS/IDS and antimalware solutions to detect and respond to threats in real time, helping prevent or limit exploitation attempts. Static code analysis and peer reviews ensure all user inputs are thoroughly validated, reducing the risk of system instability, data exposure, or privilege escalation. Finally, memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) enhance resilience against buffer overflows and denial-of-service attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-0:2.27-41.base.el7.src",
"7Server-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.src",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1000876"
},
{
"category": "external",
"summary": "RHBZ#1664699",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1664699"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000876"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000876",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000876"
}
],
"release_date": "2018-12-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-08-06T14:10:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-0:2.27-41.base.el7.src",
"7Server-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.src",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:2075"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-0:2.27-41.base.el7.src",
"7Server-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.src",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "binutils: integer overflow leads to heap-based buffer overflow in objdump"
}
]
}
rhsa-2019_2075
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for binutils is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The binutils packages provide a collection of binary utilities for the manipulation of object code in various object file formats. It includes the ar, as, gprof, ld, nm, objcopy, objdump, ranlib, readelf, size, strings, strip, and addr2line utilities.\n\nSecurity Fix(es):\n\n* binutils: integer overflow leads to heap-based buffer overflow in objdump (CVE-2018-1000876)\n\n* binutils: Stack Exhaustion in the demangling functions provided by libiberty (CVE-2018-12641)\n\n* binutils: NULL pointer dereference in work_stuff_copy_to_from in cplus-dem.c. (CVE-2018-12697)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.7 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:2075",
"url": "https://access.redhat.com/errata/RHSA-2019:2075"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.7_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.7_release_notes/index"
},
{
"category": "external",
"summary": "1594410",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1594410"
},
{
"category": "external",
"summary": "1595417",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1595417"
},
{
"category": "external",
"summary": "1624776",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1624776"
},
{
"category": "external",
"summary": "1652587",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1652587"
},
{
"category": "external",
"summary": "1664699",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1664699"
},
{
"category": "external",
"summary": "1670014",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1670014"
},
{
"category": "external",
"summary": "1699745",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1699745"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2075.json"
}
],
"title": "Red Hat Security Advisory: binutils security and bug fix update",
"tracking": {
"current_release_date": "2024-11-22T12:31:33+00:00",
"generator": {
"date": "2024-11-22T12:31:33+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2019:2075",
"initial_release_date": "2019-08-06T14:10:20+00:00",
"revision_history": [
{
"date": "2019-08-06T14:10:20+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-08-06T14:10:20+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T12:31:33+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-devel-0:2.27-41.base.el7.x86_64",
"product": {
"name": "binutils-devel-0:2.27-41.base.el7.x86_64",
"product_id": "binutils-devel-0:2.27-41.base.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-devel@2.27-41.base.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"product": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"product_id": "binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debuginfo@2.27-41.base.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "binutils-0:2.27-41.base.el7.x86_64",
"product": {
"name": "binutils-0:2.27-41.base.el7.x86_64",
"product_id": "binutils-0:2.27-41.base.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils@2.27-41.base.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-devel-0:2.27-41.base.el7.i686",
"product": {
"name": "binutils-devel-0:2.27-41.base.el7.i686",
"product_id": "binutils-devel-0:2.27-41.base.el7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-devel@2.27-41.base.el7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "binutils-debuginfo-0:2.27-41.base.el7.i686",
"product": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.i686",
"product_id": "binutils-debuginfo-0:2.27-41.base.el7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debuginfo@2.27-41.base.el7?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-0:2.27-41.base.el7.src",
"product": {
"name": "binutils-0:2.27-41.base.el7.src",
"product_id": "binutils-0:2.27-41.base.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils@2.27-41.base.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-devel-0:2.27-41.base.el7.ppc",
"product": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc",
"product_id": "binutils-devel-0:2.27-41.base.el7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-devel@2.27-41.base.el7?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc",
"product": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc",
"product_id": "binutils-debuginfo-0:2.27-41.base.el7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debuginfo@2.27-41.base.el7?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-devel-0:2.27-41.base.el7.ppc64",
"product": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc64",
"product_id": "binutils-devel-0:2.27-41.base.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-devel@2.27-41.base.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"product": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"product_id": "binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debuginfo@2.27-41.base.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "binutils-0:2.27-41.base.el7.ppc64",
"product": {
"name": "binutils-0:2.27-41.base.el7.ppc64",
"product_id": "binutils-0:2.27-41.base.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils@2.27-41.base.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-devel-0:2.27-41.base.el7.s390",
"product": {
"name": "binutils-devel-0:2.27-41.base.el7.s390",
"product_id": "binutils-devel-0:2.27-41.base.el7.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-devel@2.27-41.base.el7?arch=s390"
}
}
},
{
"category": "product_version",
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390",
"product": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390",
"product_id": "binutils-debuginfo-0:2.27-41.base.el7.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debuginfo@2.27-41.base.el7?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-devel-0:2.27-41.base.el7.s390x",
"product": {
"name": "binutils-devel-0:2.27-41.base.el7.s390x",
"product_id": "binutils-devel-0:2.27-41.base.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-devel@2.27-41.base.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390x",
"product": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390x",
"product_id": "binutils-debuginfo-0:2.27-41.base.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debuginfo@2.27-41.base.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "binutils-0:2.27-41.base.el7.s390x",
"product": {
"name": "binutils-0:2.27-41.base.el7.s390x",
"product_id": "binutils-0:2.27-41.base.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils@2.27-41.base.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-devel-0:2.27-41.base.el7.ppc64le",
"product": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc64le",
"product_id": "binutils-devel-0:2.27-41.base.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-devel@2.27-41.base.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"product": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"product_id": "binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debuginfo@2.27-41.base.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "binutils-0:2.27-41.base.el7.ppc64le",
"product": {
"name": "binutils-0:2.27-41.base.el7.ppc64le",
"product_id": "binutils-0:2.27-41.base.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils@2.27-41.base.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-0:2.27-41.base.el7.src"
},
"product_reference": "binutils-0:2.27-41.base.el7.src",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.i686",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.s390",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-devel-0:2.27-41.base.el7.i686"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.i686",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.s390",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7:binutils-devel-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7Client-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-0:2.27-41.base.el7.src"
},
"product_reference": "binutils-0:2.27-41.base.el7.src",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.i686",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.s390",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.i686",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.s390",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-0:2.27-41.base.el7.src"
},
"product_reference": "binutils-0:2.27-41.base.el7.src",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.i686",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.s390",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.i686"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.i686",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.s390",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.src"
},
"product_reference": "binutils-0:2.27-41.base.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-0:2.27-41.base.el7.src"
},
"product_reference": "binutils-0:2.27-41.base.el7.src",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.i686",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.s390",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-devel-0:2.27-41.base.el7.i686"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.i686",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.s390",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7:binutils-devel-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7Server-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-0:2.27-41.base.el7.src"
},
"product_reference": "binutils-0:2.27-41.base.el7.src",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.i686",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.s390",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.i686"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.i686",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.s390",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390x"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.27-41.base.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.x86_64"
},
"product_reference": "binutils-devel-0:2.27-41.base.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-12641",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2018-06-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1594410"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in arm_pt in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there are recursive stack frames: demangle_arm_hp_template, demangle_class_name, demangle_fund_type, do_type, do_arg, demangle_args, and demangle_nested_args. This can occur during execution of nm-new.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "binutils: Stack Exhaustion in the demangling functions provided by libiberty",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-0:2.27-41.base.el7.src",
"7Server-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.src",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12641"
},
{
"category": "external",
"summary": "RHBZ#1594410",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1594410"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12641",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12641"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12641",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12641"
}
],
"release_date": "2018-04-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-08-06T14:10:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-0:2.27-41.base.el7.src",
"7Server-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.src",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:2075"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-0:2.27-41.base.el7.src",
"7Server-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.src",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "binutils: Stack Exhaustion in the demangling functions provided by libiberty"
},
{
"cve": "CVE-2018-12697",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2018-06-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1595417"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference (aka SEGV on unknown address 0x000000000000) was discovered in work_stuff_copy_to_from in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. This can occur during execution of objdump.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "binutils: NULL pointer dereference in work_stuff_copy_to_from in cplus-dem.c.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-0:2.27-41.base.el7.src",
"7Server-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.src",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12697"
},
{
"category": "external",
"summary": "RHBZ#1595417",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1595417"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12697",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12697"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12697",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12697"
}
],
"release_date": "2018-04-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-08-06T14:10:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-0:2.27-41.base.el7.src",
"7Server-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.src",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:2075"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-0:2.27-41.base.el7.src",
"7Server-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.src",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "binutils: NULL pointer dereference in work_stuff_copy_to_from in cplus-dem.c."
},
{
"cve": "CVE-2018-1000876",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2018-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1664699"
}
],
"notes": [
{
"category": "description",
"text": "binutils version 2.32 and earlier contains a Integer Overflow vulnerability in objdump, bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc that can result in Integer overflow trigger heap overflow. Successful exploitation allows execution of arbitrary code.. This attack appear to be exploitable via Local. This vulnerability appears to have been fixed in after commit 3a551c7a1b80fca579461774860574eabfd7f18f.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "binutils: integer overflow leads to heap-based buffer overflow in objdump",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The issue is classified as moderate severity primarily because of the unlikelihood of running a 32bit compiled objdump and/or having a compiled binary that uses 32bit compiled binutils libraries to analyze binaries from a not trusted source. Moreover, binutils does not handle privileged operations, meaning exploitation is unlikely to lead to system compromise or escalation of privileges. Additionally, the impact is localized to the application itself, without affecting the broader system or network security. \n\nAs per upstream binutils security policy this issue is not considered as a security flaw. Basically the key element of the policy that affects this is the understanding that analysis of untrusted binaries must always be done in a sandbox because the ELF format is open ended enough to make the analysis tools do anything, like including and processing arbitrary files. This eliminates the only possible vulnerability vector here, which is the possibility of a user being tricked into downloading and analyzing an untrusted ELF without sandboxing.\n\nSee the binutils security policy for more details:\nhttps://sourceware.org/cgit/binutils-gdb/tree/binutils/SECURITY.txt",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-0:2.27-41.base.el7.src",
"7Server-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.src",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1000876"
},
{
"category": "external",
"summary": "RHBZ#1664699",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1664699"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000876"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000876",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000876"
}
],
"release_date": "2018-12-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-08-06T14:10:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-0:2.27-41.base.el7.src",
"7Server-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.src",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:2075"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7Client-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Client-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.src",
"7ComputeNode-optional-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7ComputeNode-optional-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-0:2.27-41.base.el7.src",
"7Server-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Server-7.7:binutils-devel-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.src",
"7Workstation-7.7:binutils-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-debuginfo-0:2.27-41.base.el7.x86_64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.i686",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.ppc64le",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.s390x",
"7Workstation-7.7:binutils-devel-0:2.27-41.base.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "binutils: integer overflow leads to heap-based buffer overflow in objdump"
}
]
}
rhba-2020_0547
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Container Image Rebuild for Ansible Tower 3.4 Dependency",
"title": "Topic"
},
{
"category": "general",
"text": "The ansible-tower-memcached container image has been updated for Red Hat Ansible Tower 3.4 for RHEL 7 to address security advisories:\n\nRHSA-2019:2030\nRHSA-2019:2118\nRHSA-2019:2136\nRHSA-2019:2197\nRHSA-2019:2237\nRHSA-2019:2304\nRHSA-2019:4190\nRHSA-2020:0227",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2020:0547",
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
},
{
"category": "external",
"summary": "https://access.redhat.com/errata/RHSA-2019:2030",
"url": "https://access.redhat.com/errata/RHSA-2019:2030"
},
{
"category": "external",
"summary": "https://access.redhat.com/errata/RHSA-2019:2118",
"url": "https://access.redhat.com/errata/RHSA-2019:2118"
},
{
"category": "external",
"summary": "https://access.redhat.com/errata/RHSA-2019:2136",
"url": "https://access.redhat.com/errata/RHSA-2019:2136"
},
{
"category": "external",
"summary": "https://access.redhat.com/errata/RHSA-2019:2197",
"url": "https://access.redhat.com/errata/RHSA-2019:2197"
},
{
"category": "external",
"summary": "https://access.redhat.com/errata/RHSA-2019:2237",
"url": "https://access.redhat.com/errata/RHSA-2019:2237"
},
{
"category": "external",
"summary": "https://access.redhat.com/errata/RHSA-2019:2304",
"url": "https://access.redhat.com/errata/RHSA-2019:2304"
},
{
"category": "external",
"summary": "https://access.redhat.com/errata/RHSA-2019:4190",
"url": "https://access.redhat.com/errata/RHSA-2019:4190"
},
{
"category": "external",
"summary": "https://access.redhat.com/errata/RHSA-2020:0227",
"url": "https://access.redhat.com/errata/RHSA-2020:0227"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhba-2020_0547.json"
}
],
"title": "Red Hat Bug Fix Advisory: Container Image Rebuild for Ansible Tower 3.4 Dependency",
"tracking": {
"current_release_date": "2024-11-22T14:26:18+00:00",
"generator": {
"date": "2024-11-22T14:26:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHBA-2020:0547",
"initial_release_date": "2020-02-18T15:13:57+00:00",
"revision_history": [
{
"date": "2020-02-18T15:13:57+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-02-18T15:13:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T14:26:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Ansible Tower 3.4 for RHEL 7 Server",
"product": {
"name": "Red Hat Ansible Tower 3.4 for RHEL 7 Server",
"product_id": "7Server-Ansible-Tower-3.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ansible_tower:3.4::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Ansible Tower"
},
{
"branches": [
{
"category": "product_version",
"name": "ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"product": {
"name": "ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"product_id": "ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c?arch=amd64\u0026repository_url=registry.redhat.io/ansible-tower-37/ansible-tower-memcached-rhel7\u0026tag=1.4.15-28"
}
}
},
{
"category": "product_version",
"name": "ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"product": {
"name": "ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"product_id": "ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c?arch=amd64\u0026repository_url=registry.redhat.io/ansible-tower-35/ansible-tower-memcached\u0026tag=1.4.15-28"
}
}
},
{
"category": "product_version",
"name": "ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"product": {
"name": "ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"product_id": "ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c?arch=amd64\u0026repository_url=registry.redhat.io/ansible-tower-34/ansible-tower-memcached\u0026tag=1.4.15-28"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64 as a component of Red Hat Ansible Tower 3.4 for RHEL 7 Server",
"product_id": "7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
},
"product_reference": "ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"relates_to_product_reference": "7Server-Ansible-Tower-3.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64 as a component of Red Hat Ansible Tower 3.4 for RHEL 7 Server",
"product_id": "7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
},
"product_reference": "ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"relates_to_product_reference": "7Server-Ansible-Tower-3.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64 as a component of Red Hat Ansible Tower 3.4 for RHEL 7 Server",
"product_id": "7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
},
"product_reference": "ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"relates_to_product_reference": "7Server-Ansible-Tower-3.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-10739",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2016-02-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1347549"
}
],
"notes": [
{
"category": "description",
"text": "In the GNU C Library (aka glibc or libc6) through 2.28, the getaddrinfo function would successfully parse a string that contained an IPv4 address followed by whitespace and arbitrary characters, which could lead applications to incorrectly assume that it had parsed a valid string, without the possibility of embedded HTTP headers or other potentially dangerous substrings.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glibc: getaddrinfo should reject IP addresses with trailing characters",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security has rated this issue as having Moderate security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-10739"
},
{
"category": "external",
"summary": "RHBZ#1347549",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1347549"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-10739",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10739"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-10739",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10739"
}
],
"release_date": "2016-04-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glibc: getaddrinfo should reject IP addresses with trailing characters"
},
{
"cve": "CVE-2018-0495",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-06-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1591163"
}
],
"notes": [
{
"category": "description",
"text": "Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Since the 5.8.3 release, Red Hat CloudForms no longer uses libtomcrypt.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-0495"
},
{
"category": "external",
"summary": "RHBZ#1591163",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591163"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-0495",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0495"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0495",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0495"
},
{
"category": "external",
"summary": "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/",
"url": "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/"
}
],
"release_date": "2018-06-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries"
},
{
"cve": "CVE-2018-0734",
"cwe": {
"id": "CWE-385",
"name": "Covert Timing Channel"
},
"discovery_date": "2018-10-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1644364"
}
],
"notes": [
{
"category": "description",
"text": "The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: timing side channel attack in the DSA signature algorithm",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-0734"
},
{
"category": "external",
"summary": "RHBZ#1644364",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644364"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-0734",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0734"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0734",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0734"
}
],
"release_date": "2018-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: timing side channel attack in the DSA signature algorithm"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Labs"
]
}
],
"cve": "CVE-2018-1122",
"cwe": {
"id": "CWE-829",
"name": "Inclusion of Functionality from Untrusted Control Sphere"
},
"discovery_date": "2018-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1575466"
}
],
"notes": [
{
"category": "description",
"text": "If the HOME environment variable is unset or empty, top will read its configuration file from the current working directory without any security check. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "procps: Local privilege escalation in top",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1122"
},
{
"category": "external",
"summary": "RHBZ#1575466",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575466"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1122"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1122",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1122"
},
{
"category": "external",
"summary": "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt",
"url": "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt"
}
],
"release_date": "2018-05-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "procps: Local privilege escalation in top"
},
{
"cve": "CVE-2018-5818",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2018-12-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1661608"
}
],
"notes": [
{
"category": "description",
"text": "An error within the \"parse_rollei()\" function (internal/dcraw_common.cpp) within LibRaw versions prior to 0.19.1 can be exploited to trigger an infinite loop.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "LibRaw: DoS in parse_rollei function in internal/dcraw_common.cpp",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-5818"
},
{
"category": "external",
"summary": "RHBZ#1661608",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661608"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-5818",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5818"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5818",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5818"
}
],
"release_date": "2018-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "LibRaw: DoS in parse_rollei function in internal/dcraw_common.cpp"
},
{
"cve": "CVE-2018-5819",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2018-12-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1661604"
}
],
"notes": [
{
"category": "description",
"text": "An error within the \"parse_sinar_ia()\" function (internal/dcraw_common.cpp) within LibRaw versions prior to 0.19.1 can be exploited to exhaust available CPU resources.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "LibRaw: DoS in parse_sinar_ia function in internal/dcraw_common.cpp",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-5819"
},
{
"category": "external",
"summary": "RHBZ#1661604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661604"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-5819",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5819"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5819",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5819"
}
],
"release_date": "2018-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "LibRaw: DoS in parse_sinar_ia function in internal/dcraw_common.cpp"
},
{
"cve": "CVE-2018-12404",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-12-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1657913"
}
],
"notes": [
{
"category": "description",
"text": "A cached side channel attack during handshakes using RSA encryption could allow for the decryption of encrypted content. This is a variant of the Adaptive Chosen Ciphertext attack (AKA Bleichenbacher attack) and affects all NSS versions prior to NSS 3.41.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nss: Cache side-channel variant of the Bleichenbacher attack",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12404"
},
{
"category": "external",
"summary": "RHBZ#1657913",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1657913"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12404",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12404"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12404",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12404"
}
],
"release_date": "2018-11-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nss: Cache side-channel variant of the Bleichenbacher attack"
},
{
"cve": "CVE-2018-12641",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2018-06-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1594410"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in arm_pt in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there are recursive stack frames: demangle_arm_hp_template, demangle_class_name, demangle_fund_type, do_type, do_arg, demangle_args, and demangle_nested_args. This can occur during execution of nm-new.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "binutils: Stack Exhaustion in the demangling functions provided by libiberty",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12641"
},
{
"category": "external",
"summary": "RHBZ#1594410",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1594410"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12641",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12641"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12641",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12641"
}
],
"release_date": "2018-04-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "binutils: Stack Exhaustion in the demangling functions provided by libiberty"
},
{
"cve": "CVE-2018-12697",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2018-06-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1595417"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference (aka SEGV on unknown address 0x000000000000) was discovered in work_stuff_copy_to_from in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. This can occur during execution of objdump.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "binutils: NULL pointer dereference in work_stuff_copy_to_from in cplus-dem.c.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12697"
},
{
"category": "external",
"summary": "RHBZ#1595417",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1595417"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12697",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12697"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12697",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12697"
}
],
"release_date": "2018-04-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "binutils: NULL pointer dereference in work_stuff_copy_to_from in cplus-dem.c."
},
{
"acknowledgments": [
{
"names": [
"the Curl project"
]
},
{
"names": [
"Zhaoyang Wu"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-14618",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2018-08-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1622707"
}
],
"notes": [
{
"category": "description",
"text": "curl before version 7.61.1 is vulnerable to a buffer overrun in the NTLM authentication code. The internal function Curl_ntlm_core_mk_nt_hash multiplies the length of the password by two (SUM) to figure out how large temporary storage area to allocate from the heap. The length value is then subsequently used to iterate over the password and generate output into the allocated storage buffer. On systems with a 32 bit size_t, the math to calculate SUM triggers an integer overflow when the password length exceeds 2GB (2^31 bytes). This integer overflow usually causes a very small buffer to actually get allocated instead of the intended very huge one, making the use of that buffer end up in a heap buffer overflow. (This bug is almost identical to CVE-2017-8816.)",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: NTLM password overflow via integer overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-14618"
},
{
"category": "external",
"summary": "RHBZ#1622707",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1622707"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-14618",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14618"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14618",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14618"
},
{
"category": "external",
"summary": "https://curl.haxx.se/docs/CVE-2018-14618.html",
"url": "https://curl.haxx.se/docs/CVE-2018-14618.html"
}
],
"release_date": "2018-09-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "curl: NTLM password overflow via integer overflow"
},
{
"acknowledgments": [
{
"names": [
"the Python Security Response Team"
]
}
],
"cve": "CVE-2018-14647",
"cwe": {
"id": "CWE-335",
"name": "Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)"
},
"discovery_date": "2018-09-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1631822"
}
],
"notes": [
{
"category": "description",
"text": "Python\u0027s elementtree C accelerator failed to initialise Expat\u0027s hash salt during initialization. This could make it easy to conduct denial of service attacks against Expat by contructing an XML document that would cause pathological hash collisions in Expat\u0027s internal data structures, consuming large amounts CPU and RAM.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: Missing salt initialization in _elementtree.c module",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-14647"
},
{
"category": "external",
"summary": "RHBZ#1631822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1631822"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-14647",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14647"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14647",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14647"
},
{
"category": "external",
"summary": "https://bugs.python.org/issue34623",
"url": "https://bugs.python.org/issue34623"
}
],
"release_date": "2018-09-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: Missing salt initialization in _elementtree.c module"
},
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ubuntu"
]
}
],
"cve": "CVE-2018-15686",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2018-10-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1639071"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered that systemd is vulnerable to a state injection attack when deserializing the state of a service. Properties longer than LINE_MAX are not correctly parsed and an attacker may abuse this flaw in particularly configured services to inject, change, or corrupt the service state.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "systemd: line splitting via fgets() allows for state injection during daemon-reexec",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-15686"
},
{
"category": "external",
"summary": "RHBZ#1639071",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1639071"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-15686",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15686"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-15686",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-15686"
}
],
"release_date": "2018-10-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.6,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "systemd: line splitting via fgets() allows for state injection during daemon-reexec"
},
{
"cve": "CVE-2018-16062",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2018-08-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1623752"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds read was discovered in elfutils in the way it reads DWARF address ranges information. Function dwarf_getaranges() in dwarf_getaranges.c does not properly check whether it reads beyond the limits of the ELF section. An attacker could use this flaw to cause a denial of service via a crafted file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "elfutils: Heap-based buffer over-read in libdw/dwarf_getaranges.c:dwarf_getaranges() via crafted file",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-16062"
},
{
"category": "external",
"summary": "RHBZ#1623752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1623752"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-16062",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16062"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16062",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16062"
}
],
"release_date": "2018-08-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "elfutils: Heap-based buffer over-read in libdw/dwarf_getaranges.c:dwarf_getaranges() via crafted file"
},
{
"cve": "CVE-2018-16402",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2018-09-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1625050"
}
],
"notes": [
{
"category": "description",
"text": "libelf/elf_end.c in elfutils 0.173 allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact because it tries to decompress twice.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "elfutils: Double-free due to double decompression of sections in crafted ELF causes crash",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-16402"
},
{
"category": "external",
"summary": "RHBZ#1625050",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1625050"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-16402",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16402"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16402",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16402"
}
],
"release_date": "2018-08-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "elfutils: Double-free due to double decompression of sections in crafted ELF causes crash"
},
{
"cve": "CVE-2018-16403",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2018-09-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1625055"
}
],
"notes": [
{
"category": "description",
"text": "libdw in elfutils 0.173 checks the end of the attributes list incorrectly in dwarf_getabbrev in dwarf_getabbrev.c and dwarf_hasattr in dwarf_hasattr.c, leading to a heap-based buffer over-read and an application crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "elfutils: Heap-based buffer over-read in libdw/dwarf_getabbrev.c and libwd/dwarf_hasattr.c causes crash",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-16403"
},
{
"category": "external",
"summary": "RHBZ#1625055",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1625055"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-16403",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16403"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16403",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16403"
}
],
"release_date": "2018-08-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "elfutils: Heap-based buffer over-read in libdw/dwarf_getabbrev.c and libwd/dwarf_hasattr.c causes crash"
},
{
"acknowledgments": [
{
"names": [
"the Curl project"
]
},
{
"names": [
"Brian Carpenter"
],
"organization": "Geeknik Labs",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-16842",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2018-10-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1644124"
}
],
"notes": [
{
"category": "description",
"text": "Curl versions 7.14.1 through 7.61.1 are vulnerable to a heap-based buffer over-read in the tool_msgs.c:voutf() function that may result in information exposure and denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: Heap-based buffer over-read in the curl tool warning formatting",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-16842"
},
{
"category": "external",
"summary": "RHBZ#1644124",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644124"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-16842",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16842"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16842",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16842"
},
{
"category": "external",
"summary": "https://curl.haxx.se/docs/CVE-2018-16842.html",
"url": "https://curl.haxx.se/docs/CVE-2018-16842.html"
}
],
"release_date": "2018-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.6,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "curl: Heap-based buffer over-read in the curl tool warning formatting"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Labs"
]
}
],
"cve": "CVE-2018-16866",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-11-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1653867"
}
],
"notes": [
{
"category": "description",
"text": "An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon \u0027:\u0027. A local attacker can use this flaw to disclose process memory data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "systemd: out-of-bounds read when parsing a crafted syslog message",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of systemd as shipped with Red Hat Enterprise Linux 7. Red Hat Product Security has rated this issue as having a security impact of Moderate. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.\n\nRed Hat Virtualization Hypervisor and Management Appliance include vulnerable versions of systemd. However, since exploitation requires local access and impact is restricted to information disclosure, this flaw is rated as having a security issue of Low. Future updates may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-16866"
},
{
"category": "external",
"summary": "RHBZ#1653867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1653867"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-16866",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16866"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16866",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16866"
},
{
"category": "external",
"summary": "https://www.qualys.com/2019/01/09/system-down/system-down.txt",
"url": "https://www.qualys.com/2019/01/09/system-down/system-down.txt"
}
],
"release_date": "2019-01-09T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "systemd: out-of-bounds read when parsing a crafted syslog message"
},
{
"cve": "CVE-2018-16888",
"cwe": {
"id": "CWE-250",
"name": "Execution with Unnecessary Privileges"
},
"discovery_date": "2019-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1662867"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered systemd does not correctly check the content of PIDFile files before using it to kill processes. When a service is run from an unprivileged user (e.g. User field set in the service file), a local attacker who is able to write to the PIDFile of the mentioned service may use this flaw to trick systemd into killing other services and/or privileged processes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "systemd: kills privileged process if unprivileged PIDFile was tampered",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-16888"
},
{
"category": "external",
"summary": "RHBZ#1662867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1662867"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-16888",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16888"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16888",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16888"
}
],
"release_date": "2017-08-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "systemd: kills privileged process if unprivileged PIDFile was tampered"
},
{
"cve": "CVE-2018-18310",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2018-10-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1642604"
}
],
"notes": [
{
"category": "description",
"text": "An invalid memory address dereference was discovered in dwfl_segment_report_module.c in libdwfl in elfutils through v0.174. The vulnerability allows attackers to cause a denial of service (application crash) with a crafted ELF file, as demonstrated by consider_notes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "elfutils: invalid memory address dereference was discovered in dwfl_segment_report_module.c in libdwfl",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of elfutils as shipped with Red Hat Enterprise Linux 5, 6, and 7.\n\nRed Hat Enterprise Linux 5 is now in Extended Life Phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nRed Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Low, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-18310"
},
{
"category": "external",
"summary": "RHBZ#1642604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1642604"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-18310",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18310"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-18310",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-18310"
}
],
"release_date": "2018-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "elfutils: invalid memory address dereference was discovered in dwfl_segment_report_module.c in libdwfl"
},
{
"cve": "CVE-2018-18520",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2018-10-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646477"
}
],
"notes": [
{
"category": "description",
"text": "An Invalid Memory Address Dereference exists in the function elf_end in libelf in elfutils through v0.174. Although eu-size is intended to support ar files inside ar files, handle_ar in size.c closes the outer ar file before handling all inner entries. The vulnerability allows attackers to cause a denial of service (application crash) with a crafted ELF file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "elfutils: eu-size cannot handle recursive ar files",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of elfutils as shipped with Red Hat Enterprise Linux 5, 6, and 7.\n\nRed Hat Enterprise Linux 5 is now in Extended Life Phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nRed Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Low, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-18520"
},
{
"category": "external",
"summary": "RHBZ#1646477",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646477"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-18520",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18520"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-18520",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-18520"
}
],
"release_date": "2018-10-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "elfutils: eu-size cannot handle recursive ar files"
},
{
"cve": "CVE-2018-18521",
"cwe": {
"id": "CWE-369",
"name": "Divide By Zero"
},
"discovery_date": "2018-10-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646482"
}
],
"notes": [
{
"category": "description",
"text": "Divide-by-zero vulnerabilities in the function arlib_add_symbols() in arlib.c in elfutils 0.174 allow remote attackers to cause a denial of service (application crash) with a crafted ELF file, as demonstrated by eu-ranlib, because a zero sh_entsize is mishandled.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "elfutils: Divide-by-zero in arlib_add_symbols function in arlib.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of elfutils as shipped with Red Hat Enterprise Linux 5, 6, and 7.\n\nRed Hat Enterprise Linux 5 is now in Extended Life Phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nRed Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Low, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-18521"
},
{
"category": "external",
"summary": "RHBZ#1646482",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646482"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-18521",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18521"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-18521",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-18521"
}
],
"release_date": "2018-10-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "elfutils: Divide-by-zero in arlib_add_symbols function in arlib.c"
},
{
"cve": "CVE-2018-20217",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"discovery_date": "2018-12-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1665296"
}
],
"notes": [
{
"category": "description",
"text": "A Reachable Assertion issue was discovered in the KDC in MIT Kerberos 5 (aka krb5) before 1.17. If an attacker can obtain a krbtgt ticket using an older encryption type (single-DES, triple-DES, or RC4), the attacker can crash the KDC by making an S4U2Self request.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: Reachable assertion in the KDC using S4U2Self requests",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-20217"
},
{
"category": "external",
"summary": "RHBZ#1665296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1665296"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-20217",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20217"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-20217",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20217"
}
],
"release_date": "2018-12-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "krb5: Reachable assertion in the KDC using S4U2Self requests"
},
{
"cve": "CVE-2018-1000876",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2018-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1664699"
}
],
"notes": [
{
"category": "description",
"text": "binutils version 2.32 and earlier contains a Integer Overflow vulnerability in objdump, bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc that can result in Integer overflow trigger heap overflow. Successful exploitation allows execution of arbitrary code.. This attack appear to be exploitable via Local. This vulnerability appears to have been fixed in after commit 3a551c7a1b80fca579461774860574eabfd7f18f.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "binutils: integer overflow leads to heap-based buffer overflow in objdump",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The issue is classified as moderate severity primarily because of the unlikelihood of running a 32bit compiled objdump and/or having a compiled binary that uses 32bit compiled binutils libraries to analyze binaries from a not trusted source. Moreover, binutils does not handle privileged operations, meaning exploitation is unlikely to lead to system compromise or escalation of privileges. Additionally, the impact is localized to the application itself, without affecting the broader system or network security. \n\nAs per upstream binutils security policy this issue is not considered as a security flaw. Basically the key element of the policy that affects this is the understanding that analysis of untrusted binaries must always be done in a sandbox because the ELF format is open ended enough to make the analysis tools do anything, like including and processing arbitrary files. This eliminates the only possible vulnerability vector here, which is the possibility of a user being tricked into downloading and analyzing an untrusted ELF without sandboxing.\n\nSee the binutils security policy for more details:\nhttps://sourceware.org/cgit/binutils-gdb/tree/binutils/SECURITY.txt",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1000876"
},
{
"category": "external",
"summary": "RHBZ#1664699",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1664699"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000876"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000876",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000876"
}
],
"release_date": "2018-12-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "binutils: integer overflow leads to heap-based buffer overflow in objdump"
},
{
"cve": "CVE-2019-1559",
"cwe": {
"id": "CWE-325",
"name": "Missing Cryptographic Step"
},
"discovery_date": "2019-02-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1683804"
}
],
"notes": [
{
"category": "description",
"text": "If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt data. In order for this to be exploitable \"non-stitched\" ciphersuites must be in use. Stitched ciphersuites are optimised implementations of certain commonly used ciphersuites. Also the application must call SSL_shutdown() twice even if a protocol error has occurred (applications should not do this but some do anyway). Fixed in OpenSSL 1.0.2r (Affected 1.0.2-1.0.2q).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: 0-byte record padding oracle",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "1 For this issue to be exploitable, the (server) application using the OpenSSL library needs to use it incorrectly.\n2. There are multiple other requirements for the attack to succeed: \n - The ciphersuite used must be obsolete CBC cipher without a stitched implementation (or the system be in FIPS mode)\n - the attacker has to be a MITM\n - the attacker has to be able to control the client side to send requests to the buggy server on demand",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-1559"
},
{
"category": "external",
"summary": "RHBZ#1683804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1683804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-1559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1559"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-1559",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1559"
},
{
"category": "external",
"summary": "https://github.com/RUB-NDS/TLS-Padding-Oracles",
"url": "https://github.com/RUB-NDS/TLS-Padding-Oracles"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20190226.txt",
"url": "https://www.openssl.org/news/secadv/20190226.txt"
}
],
"release_date": "2019-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
},
{
"category": "workaround",
"details": "As a workaround you can disable SHA384 if applications (compiled with OpenSSL) allow for adjustment of the ciphersuite string configuration.",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: 0-byte record padding oracle"
},
{
"acknowledgments": [
{
"names": [
"the libssh2 project"
]
},
{
"names": [
"Chris Coulson"
],
"organization": "Canonical Ltd.",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2019-3858",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2019-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1687306"
}
],
"notes": [
{
"category": "description",
"text": "An out of bounds read flaw was discovered in libssh2 when a specially crafted SFTP packet is received from the server. A remote attacker who compromises a SSH server may be able to cause a denial of service or read data in the client memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libssh2: Zero-byte allocation with a specially crafted SFTP packed leading to an out-of-bounds read",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw was present in libssh2 packages included in Red Hat Virtualization Hypervisor and Management Appliance, however libssh2 in these hosts is never exposed to malicious clients or servers.\n\nlibssh2 is no longer included in the virt module since Red Hat Enterprise Linux 8.1.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-3858"
},
{
"category": "external",
"summary": "RHBZ#1687306",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1687306"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-3858",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3858"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3858",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3858"
},
{
"category": "external",
"summary": "https://www.libssh2.org/CVE-2019-3858.html",
"url": "https://www.libssh2.org/CVE-2019-3858.html"
}
],
"release_date": "2019-03-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libssh2: Zero-byte allocation with a specially crafted SFTP packed leading to an out-of-bounds read"
},
{
"acknowledgments": [
{
"names": [
"the libssh2 project"
]
},
{
"names": [
"Chris Coulson"
],
"organization": "Canonical Ltd.",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2019-3861",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2019-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1687311"
}
],
"notes": [
{
"category": "description",
"text": "An out of bounds read flaw was discovered in libssh2 in the way SSH packets with a padding length value greater than the packet length are parsed. A remote attacker who compromises a SSH server may be able to cause a denial of service or read data in the client memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libssh2: Out-of-bounds reads with specially crafted SSH packets",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw was present in libssh2 packages included in Red Hat Virtualization Hypervisor and Management Appliance, however libssh2 in these hosts is never exposed to malicious clients or servers.\n\nlibssh2 is no longer included in the virt module since Red Hat Enterprise Linux 8.1.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-3861"
},
{
"category": "external",
"summary": "RHBZ#1687311",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1687311"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-3861",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3861"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3861",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3861"
},
{
"category": "external",
"summary": "https://www.libssh2.org/CVE-2019-3861.html",
"url": "https://www.libssh2.org/CVE-2019-3861.html"
}
],
"release_date": "2019-03-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libssh2: Out-of-bounds reads with specially crafted SSH packets"
},
{
"acknowledgments": [
{
"names": [
"the libssh2 project"
]
},
{
"names": [
"Chris Coulson"
],
"organization": "Canonical Ltd.",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2019-3862",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"discovery_date": "2019-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1687312"
}
],
"notes": [
{
"category": "description",
"text": "An out of bounds read flaw was discovered in libssh2 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit status message and no payload are parsed. A remote attacker who compromises a SSH server may be able to cause a denial of service or read data in the client memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libssh2: Out-of-bounds memory comparison with specially crafted message channel request",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw was present in libssh2 packages included in Red Hat Virtualization Hypervisor and Management Appliance, however libssh2 in these hosts is never exposed to malicious clients or servers.\n\nlibssh2 is no longer included in the virt module since Red Hat Enterprise Linux 8.1.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-3862"
},
{
"category": "external",
"summary": "RHBZ#1687312",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1687312"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-3862",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3862"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3862",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3862"
},
{
"category": "external",
"summary": "https://www.libssh2.org/CVE-2019-3862.html",
"url": "https://www.libssh2.org/CVE-2019-3862.html"
}
],
"release_date": "2019-03-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libssh2: Out-of-bounds memory comparison with specially crafted message channel request"
},
{
"cve": "CVE-2019-5010",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2019-01-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1666519"
}
],
"notes": [
{
"category": "description",
"text": "A null pointer dereference vulnerability was found in the certificate parsing code in Python. This causes a denial of service to applications when parsing specially crafted certificates. This vulnerability is unlikely to be triggered if application enables SSL/TLS certificate validation and accepts certificates only from trusted root certificate authorities.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: NULL pointer dereference using a specially crafted X509 certificate",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of python as shipped with Red Hat Enterprise Linux 5 and 6.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-5010"
},
{
"category": "external",
"summary": "RHBZ#1666519",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666519"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-5010",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5010"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5010",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5010"
},
{
"category": "external",
"summary": "https://python-security.readthedocs.io/vuln/ssl-crl-dps-dos.html",
"url": "https://python-security.readthedocs.io/vuln/ssl-crl-dps-dos.html"
}
],
"release_date": "2019-01-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: NULL pointer dereference using a specially crafted X509 certificate"
},
{
"cve": "CVE-2019-7149",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2019-01-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1671443"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer over-read was discovered in the function read_srclines in dwarf_getsrclines.c in libdw in elfutils 0.175. A crafted input can cause segmentation faults, leading to denial-of-service, as demonstrated by eu-nm.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "elfutils: heap-based buffer over-read in read_srclines in dwarf_getsrclines.c in libdw",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-7149"
},
{
"category": "external",
"summary": "RHBZ#1671443",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671443"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-7149",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7149"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-7149",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-7149"
}
],
"release_date": "2019-01-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "elfutils: heap-based buffer over-read in read_srclines in dwarf_getsrclines.c in libdw"
},
{
"cve": "CVE-2019-7150",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2019-01-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1671446"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in elfutils 0.175. A segmentation fault can occur in the function elf64_xlatetom in libelf/elf32_xlatetom.c, due to dwfl_segment_report_module not checking whether the dyn data read from a core file is truncated. A crafted input can cause a program crash, leading to denial-of-service, as demonstrated by eu-stack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "elfutils: segmentation fault in elf64_xlatetom in libelf/elf32_xlatetom.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-7150"
},
{
"category": "external",
"summary": "RHBZ#1671446",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671446"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-7150",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7150"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-7150",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-7150"
}
],
"release_date": "2018-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "elfutils: segmentation fault in elf64_xlatetom in libelf/elf32_xlatetom.c"
},
{
"cve": "CVE-2019-7664",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2019-02-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1677536"
}
],
"notes": [
{
"category": "description",
"text": "In elfutils 0.175, a negative-sized memcpy is attempted in elf_cvt_note in libelf/note_xlate.h because of an incorrect overflow check. Crafted elf input causes a segmentation fault, leading to denial of service (program crash).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "elfutils: out of bound write in elf_cvt_note in libelf/note_xlate.h",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-7664"
},
{
"category": "external",
"summary": "RHBZ#1677536",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1677536"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-7664",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7664"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-7664",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-7664"
}
],
"release_date": "2019-01-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "elfutils: out of bound write in elf_cvt_note in libelf/note_xlate.h"
},
{
"cve": "CVE-2019-7665",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2019-02-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1677538"
}
],
"notes": [
{
"category": "description",
"text": "In elfutils 0.175, a heap-based buffer over-read was discovered in the function elf32_xlatetom in elf32_xlatetom.c in libelf. A crafted ELF input can cause a segmentation fault leading to denial of service (program crash) because ebl_core_note does not reject malformed core file notes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "elfutils: heap-based buffer over-read in function elf32_xlatetom in elf32_xlatetom.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-7665"
},
{
"category": "external",
"summary": "RHBZ#1677538",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1677538"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-7665",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7665"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-7665",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-7665"
}
],
"release_date": "2019-01-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "elfutils: heap-based buffer over-read in function elf32_xlatetom in elf32_xlatetom.c"
},
{
"cve": "CVE-2019-9740",
"cwe": {
"id": "CWE-113",
"name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
},
"discovery_date": "2019-03-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1688169"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the query string after a ? character) followed by an HTTP header or a Redis command. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: CRLF injection via the query part of the url passed to urlopen()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects:\n* All current versions of Red Hat OpenStack Platform. However, version 8 is due to retire on the 20th of April 2019, there are no more planned releases prior to this date.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-9740"
},
{
"category": "external",
"summary": "RHBZ#1688169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1688169"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-9740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9740"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9740",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9740"
}
],
"release_date": "2019-03-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: CRLF injection via the query part of the url passed to urlopen()"
},
{
"cve": "CVE-2019-9947",
"cwe": {
"id": "CWE-113",
"name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
},
"discovery_date": "2019-03-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1695572"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: CRLF injection via the path part of the url passed to urlopen()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-9947"
},
{
"category": "external",
"summary": "RHBZ#1695572",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695572"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-9947",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9947"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9947",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9947"
}
],
"release_date": "2019-03-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: CRLF injection via the path part of the url passed to urlopen()"
},
{
"cve": "CVE-2019-9948",
"cwe": {
"id": "CWE-749",
"name": "Exposed Dangerous Method or Function"
},
"discovery_date": "2019-03-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1695570"
}
],
"notes": [
{
"category": "description",
"text": "urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen(\u0027local_file:///etc/passwd\u0027) call.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-9948"
},
{
"category": "external",
"summary": "RHBZ#1695570",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695570"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-9948",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9948"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9948",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9948"
}
],
"release_date": "2019-03-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
},
{
"category": "workaround",
"details": "If your application uses a blacklist to prevent \"file://\" schema from being used, consider using a whitelist approach to just allow the schemas you want or add \"local_file://\" schema to your blacklist.",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms"
},
{
"acknowledgments": [
{
"names": [
"the Mozilla project"
]
},
{
"names": [
"Jonas Allmann"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2019-11729",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2019-07-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1728437"
}
],
"notes": [
{
"category": "description",
"text": "Empty or malformed p256-ECDH public keys may trigger a segmentation fault due values being improperly sanitized before being copied into memory and used. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nss: Empty or malformed p256-ECDH public keys may trigger a segmentation fault",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Firefox on Red Hat Enterprise Linux is built against the system nss library.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11729"
},
{
"category": "external",
"summary": "RHBZ#1728437",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728437"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11729",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11729"
},
{
"category": "external",
"summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11729",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11729"
}
],
"release_date": "2019-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nss: Empty or malformed p256-ECDH public keys may trigger a segmentation fault"
},
{
"acknowledgments": [
{
"names": [
"the Mozilla Project"
]
}
],
"cve": "CVE-2019-11745",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2019-11-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1774831"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow was found in the NSC_EncryptUpdate() function in Mozilla nss. A remote attacker could trigger this flaw via SRTP encrypt or decrypt operations, to execute arbitrary code with the permissions of the user running the application (compiled with nss). While the attack complexity is high, the impact to confidentiality, integrity, and availability are high as well.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nss: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Firefox and Thunderbird on Red Hat Enterprise Linux are built against the system nss library.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11745"
},
{
"category": "external",
"summary": "RHBZ#1774831",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774831"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11745",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11745"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11745",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11745"
},
{
"category": "external",
"summary": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.44.3_release_notes",
"url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.44.3_release_notes"
},
{
"category": "external",
"summary": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47.1_release_notes",
"url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47.1_release_notes"
}
],
"release_date": "2019-11-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "nss: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate"
},
{
"cve": "CVE-2019-13734",
"discovery_date": "2019-12-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1781980"
}
],
"notes": [
{
"category": "description",
"text": "Out of bounds write in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "sqlite: fts3: improve shadow table corruption detection",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-13734"
},
{
"category": "external",
"summary": "RHBZ#1781980",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781980"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-13734",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13734"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-13734",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13734"
},
{
"category": "external",
"summary": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html",
"url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html"
}
],
"release_date": "2019-12-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "sqlite: fts3: improve shadow table corruption detection"
},
{
"acknowledgments": [
{
"names": [
"Damien Aumaitre",
"Nicolas Surbayrole"
],
"organization": "Quarkslab"
}
],
"cve": "CVE-2020-1734",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"discovery_date": "2019-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1801804"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the pipe lookup plugin of ansible. Arbitrary commands can be run, when the pipe lookup plugin uses subprocess.Popen() with shell=True, by overwriting ansible facts and the variable is not escaped by quote plugin. An attacker could take advantage and run arbitrary commands by overwriting the ansible facts.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ansible: shell enabled by default in a pipe lookup plugin subprocess",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Ansible Engine 2.7.16, 2.8.10, and 2.9.6 as well as previous versions are affected.\n\nAnsible Tower 3.4.5, 3.5.5 and 3.6.3 as well as previous versions are affected.\n\nIn Red Hat OpenStack Platform, because the flaw has a lower impact, ansible is not directly customer exposed, and the fix would require a substantial amount of development, no update will be provided at this time for the RHOSP ansible package.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1734"
},
{
"category": "external",
"summary": "RHBZ#1801804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1801804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1734",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1734"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1734",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1734"
}
],
"release_date": "2020-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
},
{
"category": "workaround",
"details": "This issue can be avoided by escaping variables which are used in the lookup.",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ansible: shell enabled by default in a pipe lookup plugin subprocess"
},
{
"acknowledgments": [
{
"names": [
"Damien Aumaitre",
"Nicolas Surbayrole"
],
"organization": "Quarkslab"
}
],
"cve": "CVE-2020-1735",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2020-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1802085"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Ansible Engine when the fetch module is used. An attacker could intercept the module, inject a new path, and then choose a new destination path on the controller node.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ansible: path injection on dest parameter in fetch module",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Ansible Engine 2.7.16, 2.8.10, and 2.9.6 as well as previous versions are affected.\n\nAnsible Tower 3.4.5, 3.5.5 and 3.6.3 as well as previous versions are affected.\n\nIn Red Hat OpenStack Platform, because the flaw has a lower impact, ansible is not directly customer exposed, and the fix would require a substantial amount of development, no update will be provided at this time for the RHOSP ansible package.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1735"
},
{
"category": "external",
"summary": "RHBZ#1802085",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802085"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1735",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1735"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1735",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1735"
}
],
"release_date": "2020-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
},
{
"category": "workaround",
"details": "Currently, there is no mitigation for this issue except avoid using the affected fetch module when possible.",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ansible: path injection on dest parameter in fetch module"
},
{
"acknowledgments": [
{
"names": [
"Damien Aumaitre",
"Nicolas Surbayrole"
],
"organization": "Quarkslab"
}
],
"cve": "CVE-2020-1736",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"discovery_date": "2020-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1802124"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Ansible Engine when a file is moved using atomic_move primitive as the file mode cannot be specified. This sets the destination files world-readable if the destination file does not exist and if the file exists, the file could be changed to have less restrictive permissions before the move. This issue affects only the newly created files and not existing ones. If the file already exists at the final destination, those permissions are retained. This could lead to the disclosure of sensitive data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ansible: atomic_move primitive sets permissive permissions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Ansible Engine 2.8.14 and 2.9.12 as well as previous versions and all 2.7.x versions are affected.\n\nAnsible Tower 3.6.5 and 3.7.2 as well as previous versions are affected.\n\nIn Red Hat OpenStack Platform, because the flaw has a lower impact, ansible is not directly customer exposed, and the fix would require a substantial amount of development, no update will be provided at this time for the RHOSP ansible package.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1736"
},
{
"category": "external",
"summary": "RHBZ#1802124",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802124"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1736",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1736"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1736",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1736"
}
],
"release_date": "2020-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
},
{
"category": "workaround",
"details": "This issue can be mitigated by specifying the \"mode\" on the task. That just leaves a race condition in place where newly created files that specify a mode in the task briefly go from 666 - umask to the final mode. An alternative workaround if many new files are created and to avoid setting a specific mode for each file would be to set the \"mode\" to \"preserve\" value. That will maintain the permissions of the source file on the controller in the final file on the managed host.",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 2.2,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ansible: atomic_move primitive sets permissive permissions"
},
{
"acknowledgments": [
{
"names": [
"Damien Aumaitre",
"Nicolas Surbayrole"
],
"organization": "Quarkslab"
}
],
"cve": "CVE-2020-1737",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2020-02-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1802154"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Ansible Engine when using the Extract-Zip function from the win_unzip module as the extracted file(s) are not checked if they belong to the destination folder. An attacker could take advantage of this flaw by crafting an archive anywhere in the file system, using a path traversal.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ansible: Extract-Zip function in win_unzip module does not check extracted path",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Ansible Engine 2.7.16, 2.8.10, and 2.9.6 as well as previous versions are affected.\n\nAnsible Tower 3.4.5, 3.5.5 and 3.6.3 as well as previous versions are affected.\n\nIn Red Hat OpenStack Platform, because the flaw has a lower impact, ansible is not directly customer exposed, and the fix would require a substantial amount of development, no update will be provided at this time for the RHOSP ansible package.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1737"
},
{
"category": "external",
"summary": "RHBZ#1802154",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802154"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1737"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1737",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1737"
}
],
"release_date": "2020-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
},
{
"category": "workaround",
"details": "Currently, there is no mitigation for this issue except avoid using the affected win_unzip module when possible.",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ansible: Extract-Zip function in win_unzip module does not check extracted path"
},
{
"acknowledgments": [
{
"names": [
"Damien Aumaitre",
"Nicolas Surbayrole"
],
"organization": "Quarkslab"
}
],
"cve": "CVE-2020-1738",
"cwe": {
"id": "CWE-88",
"name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)"
},
"discovery_date": "2020-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1802164"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Ansible Engine when the module package or service is used and the parameter \u0027use\u0027 is not specified. If a previous task is executed with a malicious user, the module sent can be selected by the attacker using the ansible facts file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ansible: module package can be selected by the ansible facts",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Ansible Engine 2.7.16, 2.8.10, and 2.9.6 as well as previous versions are affected.\n\nAnsible Tower 3.4.5, 3.5.5 and 3.6.3 as well as previous versions are affected.\n\nIn Red Hat OpenStack Platform, because the flaw has a lower impact, ansible is not directly customer exposed, and the fix would require a substantial amount of development, no update will be provided at this time for the RHOSP ansible package.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1738"
},
{
"category": "external",
"summary": "RHBZ#1802164",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802164"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1738",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1738"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1738",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1738"
}
],
"release_date": "2020-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
},
{
"category": "workaround",
"details": "Specify the parameter \u0027use\u0027 when possible on the package and service modules. Avoid using Ansible Collections on Ansible 2.8.9 or 2.7.16 (and any of the previous versions) as they are not rejecting python with no path (already fixed in 2.9.x).",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.9,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ansible: module package can be selected by the ansible facts"
},
{
"acknowledgments": [
{
"names": [
"Damien Aumaitre",
"Nicolas Surbayrole"
],
"organization": "Quarkslab"
}
],
"cve": "CVE-2020-1739",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2020-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1802178"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Ansible Engine. When a password is set with the argument \"password\" of svn module, it is used on svn command line, disclosing to other users within the same node. An attacker could take advantage by reading the cmdline file from that particular PID on the procfs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ansible: svn module leaks password when specified as a parameter",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Ansible Engine 2.7.16, 2.8.10, and 2.9.6 as well as previous versions are affected.\n\nAnsible Tower 3.4.5, 3.5.5 and 3.6.3 as well as previous versions are affected.\n\nIn Red Hat OpenStack Platform, because the flaw has a lower impact, ansible is not directly customer exposed, and the fix would require a substantial amount of development, no update will be provided at this time for the RHOSP ansible package.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1739"
},
{
"category": "external",
"summary": "RHBZ#1802178",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802178"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1739",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1739"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1739",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1739"
}
],
"release_date": "2020-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
},
{
"category": "workaround",
"details": "Instead of using the parameter \u0027password\u0027 of the subversion module, provide the password with stdin.",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.9,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ansible: svn module leaks password when specified as a parameter"
},
{
"acknowledgments": [
{
"names": [
"Damien Aumaitre",
"Nicolas Surbayrole"
],
"organization": "Quarkslab"
}
],
"cve": "CVE-2020-1740",
"cwe": {
"id": "CWE-377",
"name": "Insecure Temporary File"
},
"discovery_date": "2020-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1802193"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Ansible Engine when using Ansible Vault for editing encrypted files. When a user executes \"ansible-vault edit\", another user on the same computer can read the old and new secret, as it is created in a temporary file with mkstemp and the returned file descriptor is closed and the method write_data is called to write the existing secret in the file. This method will delete the file before recreating it insecurely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ansible: secrets readable after ansible-vault edit",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Ansible Engine 2.7.16, 2.8.10, and 2.9.6 as well as previous versions are affected.\n\nAnsible Tower 3.4.5, 3.5.5 and 3.6.3 as well as previous versions are affected.\n\nIn Red Hat OpenStack Platform, because the flaw has a lower impact, ansible is not directly customer exposed, and the fix would require a substantial amount of development, no update will be provided at this time for the RHOSP ansible package.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1740"
},
{
"category": "external",
"summary": "RHBZ#1802193",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802193"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1740",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1740"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1740",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1740"
}
],
"release_date": "2020-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
},
{
"category": "workaround",
"details": "Currently, there is no mitigation for this issue except avoid using the \u0027edit\u0027 option from \u0027ansible-vault\u0027 command line tool.",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.9,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ansible: secrets readable after ansible-vault edit"
},
{
"acknowledgments": [
{
"names": [
"Felix Fountein"
]
}
],
"cve": "CVE-2020-1746",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2019-12-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1805491"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Ansible Engine when the ldap_attr and ldap_entry community modules are used. The issue discloses the LDAP bind password to stdout or a log file if a playbook task is written using the bind_pw in the parameters field. The highest threat from this vulnerability is data confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ansible: Information disclosure issue in ldap_attr and ldap_entry modules",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* Ansible Engine 2.7.16, 2.8.10, and 2.9.6 as well as previous versions are affected.\n\n* Ansible Tower 3.4.5, 3.5.5 and 3.6.3 as well as previous versions are affected.\n\n* Red Hat Gluster Storage and Red Hat Ceph Storage no longer maintains their own version of Ansible. The fix will be provided from core Ansible. But we still ship ansible separately for ceph ubuntu.\n\n* In Red Hat OpenStack Platform, because the flaw has a lower impact, ansible is not directly customer exposed, and the fix would require a substantial amount of development, no update will be provided at this time for the RHOSP ansible package.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1746"
},
{
"category": "external",
"summary": "RHBZ#1805491",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1805491"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1746",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1746"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1746",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1746"
}
],
"release_date": "2020-02-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
},
{
"category": "workaround",
"details": "Using args keyword and embedding the ldap_auth variable instead of using bind_pw parameter would mitigate this issue.",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ansible: Information disclosure issue in ldap_attr and ldap_entry modules"
},
{
"acknowledgments": [
{
"names": [
"Abhijeet Kasurde"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2020-1753",
"cwe": {
"id": "CWE-532",
"name": "Insertion of Sensitive Information into Log File"
},
"discovery_date": "2020-03-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1811008"
}
],
"notes": [
{
"category": "description",
"text": "A security flaw was found in the Ansible Engine when managing Kubernetes using the k8s connection plugin. Sensitive parameters such as passwords and tokens are passed to the kubectl command line instead of using environment variables or an input configuration file, which is safer. This flaw discloses passwords and tokens from the process list, and the no_log directive from the debug module would not be reflected in the underlying command-line tools options, displaying passwords and tokens on stdout and log files.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Ansible: kubectl connection plugin leaks sensitive information",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Ansible Engine 2.7.17, 2.8.10, and 2.9.6 as well as previous versions are affected.\n\nAnsible Tower 3.4.5, 3.5.5 and 3.6.3 as well as previous versions are affected.\n\nIn Red Hat OpenStack Platform, because the flaw has a lower impact, ansible is not directly customer exposed, and the fix would require a substantial amount of development, no update will be provided at this time for the RHOSP ansible package.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1753"
},
{
"category": "external",
"summary": "RHBZ#1811008",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1811008"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1753",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1753"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1753",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1753"
}
],
"release_date": "2020-03-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
},
{
"category": "workaround",
"details": "Currently, there is no mitigation for this issue.",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Ansible: kubectl connection plugin leaks sensitive information"
},
{
"acknowledgments": [
{
"names": [
"Damien Aumaitre",
"Nicolas Surbayrole"
],
"organization": "Quarkslab"
}
],
"cve": "CVE-2020-10684",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2020-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1815519"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Ansible Engine. When using ansible_facts as a subkey of itself, and promoting it to a variable when injecting is enabled, overwriting the ansible_facts after the clean, an attacker could take advantage of this by altering the ansible_facts leading to privilege escalation or code injection. The highest threat from this vulnerability are to data integrity and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Ansible: code injection when using ansible_facts as a subkey",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* Ansible Engine 2.7.16, 2.8.10, and 2.9.6 as well as previous versions are affected.\n* Ansible Tower 3.4.5, 3.5.5 and 3.6.3 as well as previous versions are affected.\n* Red Hat Gluster Storage and Red Hat Ceph Storage no longer maintains their own version of Ansible. The fix will be consumed from core Ansible. But we still ship ansible separately for ceph ubuntu.\n* Red Hat OpenStack Platform does package the affected code. However, because RHOSP does not use ansible_facts as a subkey directly, the RHOSP impact has been reduced to Moderate and no update will be provided at this time for the RHOSP ansible package.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-10684"
},
{
"category": "external",
"summary": "RHBZ#1815519",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815519"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-10684",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10684"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10684",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10684"
}
],
"release_date": "2020-03-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
},
{
"category": "workaround",
"details": "Currently, there is not a known mitigation except avoiding the functionality of using ansible_facts as a subkey.",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.9,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Ansible: code injection when using ansible_facts as a subkey"
},
{
"acknowledgments": [
{
"names": [
"Damien Aumaitre",
"Nicolas Surbayrole"
],
"organization": "Quarkslab"
}
],
"cve": "CVE-2020-10685",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"discovery_date": "2020-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1814627"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found on Ansible Engine when using modules which decrypts vault files such as assemble, script, unarchive, win_copy, aws_s3 or copy modules. The temporary directory is created in /tmp leaves the secrets unencrypted.\r\n\r\nOn Operating Systems which /tmp is not a tmpfs but part of the root partition, the directory is only cleared on boot and the decrypted data remains when the host is switched off. The system will be vulnerable when the system is not running. So decrypted data must be cleared as soon as possible and the data which normally is encrypted is sensible.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Ansible: modules which use files encrypted with vault are not properly cleaned up",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* Ansible Engine 2.7.16, 2.8.10, and 2.9.6 as well as previous versions are affected.\n\n* Ansible Tower 3.4.5, 3.5.5 and 3.6.3 as well as previous versions are affected.\n\n* In Red Hat OpenStack Platform, because the flaw has a lower impact, ansible is not directly customer exposed, and the fix would require a substantial amount of development, no update will be provided at this time for the RHOSP ansible package.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-10685"
},
{
"category": "external",
"summary": "RHBZ#1814627",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1814627"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-10685",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10685"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10685",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10685"
}
],
"release_date": "2020-03-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-02-18T15:13:57+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:0547"
},
{
"category": "workaround",
"details": "Currently, there is no mitigation for this issue except by removing manually the temporary created file after every run.",
"product_ids": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-Ansible-Tower-3.4:ansible-tower-34/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-35/ansible-tower-memcached@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64",
"7Server-Ansible-Tower-3.4:ansible-tower-37/ansible-tower-memcached-rhel7@sha256:25003890d7f04dbc7741c78a9977f0b5071d2c6653a6fc5baff23abe7d71403c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Ansible: modules which use files encrypted with vault are not properly cleaned up"
}
]
}
suse-su-2019:2650-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for binutils",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for binutils fixes the following issues:\n\nbinutils was updated to current 2.32 branch @7b468db3 [jsc#ECO-368]:\n\nIncludes the following security fixes:\n\n- CVE-2018-17358: Fixed invalid memory access in _bfd_stab_section_find_nearest_line in syms.c (bsc#1109412)\n- CVE-2018-17359: Fixed invalid memory access exists in bfd_zalloc in opncls.c (bsc#1109413)\n- CVE-2018-17360: Fixed heap-based buffer over-read in bfd_getl32 in libbfd.c (bsc#1109414)\n- CVE-2018-17985: Fixed a stack consumption problem caused by the cplus_demangle_type (bsc#1116827)\n- CVE-2018-18309: Fixed an invalid memory address dereference was discovered in read_reloc in reloc.c (bsc#1111996)\n- CVE-2018-18483: Fixed get_count function provided by libiberty that allowed attackers to cause a denial of service or other unspecified impact (bsc#1112535)\n- CVE-2018-18484: Fixed stack exhaustion in the C++ demangling functions provided by libiberty, caused by recursive stack frames (bsc#1112534)\n- CVE-2018-18605: Fixed a heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup causing a denial of service (bsc#1113255)\n- CVE-2018-18606: Fixed a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments, causing denial of service (bsc#1113252)\n- CVE-2018-18607: Fixed a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section, causing denial of service (bsc#1113247)\n- CVE-2018-19931: Fixed a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h (bsc#1118831)\n- CVE-2018-19932: Fixed an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA (bsc#1118830)\n- CVE-2018-20623: Fixed a use-after-free in the error function in elfcomm.c (bsc#1121035)\n- CVE-2018-20651: Fixed a denial of service via a NULL pointer dereference in elf_link_add_object_symbols in elflink.c (bsc#1121034)\n- CVE-2018-20671: Fixed an integer overflow that can trigger a heap-based buffer overflow in load_specific_debug_section in objdump.c (bsc#1121056)\n- CVE-2018-1000876: Fixed integer overflow in bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc in objdump (bsc#1120640)\n- CVE-2019-1010180: Fixed an out of bound memory access that could lead to crashes (bsc#1142772)\n\n- Enable xtensa architecture (Tensilica lc6 and related)\n- Use -ffat-lto-objects in order to provide assembly for static libs\n (bsc#1141913).\n- Fixed some LTO problems (bsc#1133131 bsc#1133232).\n- riscv: Don\u0027t check ABI flags if no code section\n\nUpdate to binutils 2.32:\n\n* The binutils now support for the C-SKY processor series.\n* The x86 assembler now supports a -mvexwig=[0|1] option to control\n encoding of VEX.W-ignored (WIG) VEX instructions.\n It also has a new -mx86-used-note=[yes|no] option to generate (or\n not) x86 GNU property notes.\n* The MIPS assembler now supports the Loongson EXTensions R2 (EXT2),\n the Loongson EXTensions (EXT) instructions, the Loongson Content\n Address Memory (CAM) ASE and the Loongson MultiMedia extensions\n Instructions (MMI) ASE.\n* The addr2line, c++filt, nm and objdump tools now have a default\n limit on the maximum amount of recursion that is allowed whilst\n demangling strings. This limit can be disabled if necessary.\n* Objdump\u0027s --disassemble option can now take a parameter,\n specifying the starting symbol for disassembly. Disassembly will\n continue from this symbol up to the next symbol or the end of the\n function.\n* The BFD linker will now report property change in linker map file\n when merging GNU properties.\n* The BFD linker\u0027s -t option now doesn\u0027t report members within\n archives, unless -t is given twice. This makes it more useful\n when generating a list of files that should be packaged for a\n linker bug report.\n* The GOLD linker has improved warning messages for relocations that\n refer to discarded sections.\n\n- Improve relro support on s390 [fate#326356]\n- Handle ELF compressed header alignment correctly.\n\n ",
"title": "Description of the patch"
},
{
"category": "details",
"text": "HPE-Helion-OpenStack-8-2019-2650,SUSE-2019-2650,SUSE-OpenStack-Cloud-7-2019-2650,SUSE-OpenStack-Cloud-8-2019-2650,SUSE-OpenStack-Cloud-Crowbar-8-2019-2650,SUSE-SLE-DESKTOP-12-SP4-2019-2650,SUSE-SLE-DESKTOP-12-SP5-2019-2650,SUSE-SLE-SAP-12-SP1-2019-2650,SUSE-SLE-SAP-12-SP2-2019-2650,SUSE-SLE-SAP-12-SP3-2019-2650,SUSE-SLE-SDK-12-SP4-2019-2650,SUSE-SLE-SDK-12-SP5-2019-2650,SUSE-SLE-SERVER-12-SP1-2019-2650,SUSE-SLE-SERVER-12-SP2-2019-2650,SUSE-SLE-SERVER-12-SP2-BCL-2019-2650,SUSE-SLE-SERVER-12-SP3-2019-2650,SUSE-SLE-SERVER-12-SP3-BCL-2019-2650,SUSE-SLE-SERVER-12-SP4-2019-2650,SUSE-SLE-SERVER-12-SP5-2019-2650,SUSE-Storage-4-2019-2650,SUSE-Storage-5-2019-2650",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2650-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:2650-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:2650-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html"
},
{
"category": "self",
"summary": "SUSE Bug 1109412",
"url": "https://bugzilla.suse.com/1109412"
},
{
"category": "self",
"summary": "SUSE Bug 1109413",
"url": "https://bugzilla.suse.com/1109413"
},
{
"category": "self",
"summary": "SUSE Bug 1109414",
"url": "https://bugzilla.suse.com/1109414"
},
{
"category": "self",
"summary": "SUSE Bug 1111996",
"url": "https://bugzilla.suse.com/1111996"
},
{
"category": "self",
"summary": "SUSE Bug 1112534",
"url": "https://bugzilla.suse.com/1112534"
},
{
"category": "self",
"summary": "SUSE Bug 1112535",
"url": "https://bugzilla.suse.com/1112535"
},
{
"category": "self",
"summary": "SUSE Bug 1113247",
"url": "https://bugzilla.suse.com/1113247"
},
{
"category": "self",
"summary": "SUSE Bug 1113252",
"url": "https://bugzilla.suse.com/1113252"
},
{
"category": "self",
"summary": "SUSE Bug 1113255",
"url": "https://bugzilla.suse.com/1113255"
},
{
"category": "self",
"summary": "SUSE Bug 1116827",
"url": "https://bugzilla.suse.com/1116827"
},
{
"category": "self",
"summary": "SUSE Bug 1118830",
"url": "https://bugzilla.suse.com/1118830"
},
{
"category": "self",
"summary": "SUSE Bug 1118831",
"url": "https://bugzilla.suse.com/1118831"
},
{
"category": "self",
"summary": "SUSE Bug 1120640",
"url": "https://bugzilla.suse.com/1120640"
},
{
"category": "self",
"summary": "SUSE Bug 1121034",
"url": "https://bugzilla.suse.com/1121034"
},
{
"category": "self",
"summary": "SUSE Bug 1121035",
"url": "https://bugzilla.suse.com/1121035"
},
{
"category": "self",
"summary": "SUSE Bug 1121056",
"url": "https://bugzilla.suse.com/1121056"
},
{
"category": "self",
"summary": "SUSE Bug 1133131",
"url": "https://bugzilla.suse.com/1133131"
},
{
"category": "self",
"summary": "SUSE Bug 1133232",
"url": "https://bugzilla.suse.com/1133232"
},
{
"category": "self",
"summary": "SUSE Bug 1141913",
"url": "https://bugzilla.suse.com/1141913"
},
{
"category": "self",
"summary": "SUSE Bug 1142772",
"url": "https://bugzilla.suse.com/1142772"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000876 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000876/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-17358 page",
"url": "https://www.suse.com/security/cve/CVE-2018-17358/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-17359 page",
"url": "https://www.suse.com/security/cve/CVE-2018-17359/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-17360 page",
"url": "https://www.suse.com/security/cve/CVE-2018-17360/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-17985 page",
"url": "https://www.suse.com/security/cve/CVE-2018-17985/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18309 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18309/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18483 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18483/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18484 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18484/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18605 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18605/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18606 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18606/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18607 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18607/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-19931 page",
"url": "https://www.suse.com/security/cve/CVE-2018-19931/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-19932 page",
"url": "https://www.suse.com/security/cve/CVE-2018-19932/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20623 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20623/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20651 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20651/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20671 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20671/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-1010180 page",
"url": "https://www.suse.com/security/cve/CVE-2019-1010180/"
},
{
"category": "self",
"summary": "SUSE Bug ECO-368",
"url": "https://bugzilla.suse.com/ECO-368"
},
{
"category": "self",
"summary": "SUSE Bug SLE-6206",
"url": "https://bugzilla.suse.com/SLE-6206"
}
],
"title": "Security update for binutils",
"tracking": {
"current_release_date": "2019-10-14T08:53:28Z",
"generator": {
"date": "2019-10-14T08:53:28Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:2650-1",
"initial_release_date": "2019-10-14T08:53:28Z",
"revision_history": [
{
"date": "2019-10-14T08:53:28Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "binutils-2.32-9.33.1.aarch64",
"product": {
"name": "binutils-2.32-9.33.1.aarch64",
"product_id": "binutils-2.32-9.33.1.aarch64"
}
},
{
"category": "product_version",
"name": "binutils-devel-2.32-9.33.1.aarch64",
"product": {
"name": "binutils-devel-2.32-9.33.1.aarch64",
"product_id": "binutils-devel-2.32-9.33.1.aarch64"
}
},
{
"category": "product_version",
"name": "binutils-gold-2.32-9.33.1.aarch64",
"product": {
"name": "binutils-gold-2.32-9.33.1.aarch64",
"product_id": "binutils-gold-2.32-9.33.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-arm-binutils-2.32-9.33.1.aarch64",
"product": {
"name": "cross-arm-binutils-2.32-9.33.1.aarch64",
"product_id": "cross-arm-binutils-2.32-9.33.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-avr-binutils-2.32-9.33.1.aarch64",
"product": {
"name": "cross-avr-binutils-2.32-9.33.1.aarch64",
"product_id": "cross-avr-binutils-2.32-9.33.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-hppa-binutils-2.32-9.33.1.aarch64",
"product": {
"name": "cross-hppa-binutils-2.32-9.33.1.aarch64",
"product_id": "cross-hppa-binutils-2.32-9.33.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-hppa64-binutils-2.32-9.33.1.aarch64",
"product": {
"name": "cross-hppa64-binutils-2.32-9.33.1.aarch64",
"product_id": "cross-hppa64-binutils-2.32-9.33.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-i386-binutils-2.32-9.33.1.aarch64",
"product": {
"name": "cross-i386-binutils-2.32-9.33.1.aarch64",
"product_id": "cross-i386-binutils-2.32-9.33.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-ia64-binutils-2.32-9.33.1.aarch64",
"product": {
"name": "cross-ia64-binutils-2.32-9.33.1.aarch64",
"product_id": "cross-ia64-binutils-2.32-9.33.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-m68k-binutils-2.32-9.33.1.aarch64",
"product": {
"name": "cross-m68k-binutils-2.32-9.33.1.aarch64",
"product_id": "cross-m68k-binutils-2.32-9.33.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-mips-binutils-2.32-9.33.1.aarch64",
"product": {
"name": "cross-mips-binutils-2.32-9.33.1.aarch64",
"product_id": "cross-mips-binutils-2.32-9.33.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-ppc-binutils-2.32-9.33.1.aarch64",
"product": {
"name": "cross-ppc-binutils-2.32-9.33.1.aarch64",
"product_id": "cross-ppc-binutils-2.32-9.33.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-ppc64-binutils-2.32-9.33.1.aarch64",
"product": {
"name": "cross-ppc64-binutils-2.32-9.33.1.aarch64",
"product_id": "cross-ppc64-binutils-2.32-9.33.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-ppc64le-binutils-2.32-9.33.1.aarch64",
"product": {
"name": "cross-ppc64le-binutils-2.32-9.33.1.aarch64",
"product_id": "cross-ppc64le-binutils-2.32-9.33.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-s390-binutils-2.32-9.33.1.aarch64",
"product": {
"name": "cross-s390-binutils-2.32-9.33.1.aarch64",
"product_id": "cross-s390-binutils-2.32-9.33.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-s390x-binutils-2.32-9.33.1.aarch64",
"product": {
"name": "cross-s390x-binutils-2.32-9.33.1.aarch64",
"product_id": "cross-s390x-binutils-2.32-9.33.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-sparc-binutils-2.32-9.33.1.aarch64",
"product": {
"name": "cross-sparc-binutils-2.32-9.33.1.aarch64",
"product_id": "cross-sparc-binutils-2.32-9.33.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-sparc64-binutils-2.32-9.33.1.aarch64",
"product": {
"name": "cross-sparc64-binutils-2.32-9.33.1.aarch64",
"product_id": "cross-sparc64-binutils-2.32-9.33.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-spu-binutils-2.32-9.33.1.aarch64",
"product": {
"name": "cross-spu-binutils-2.32-9.33.1.aarch64",
"product_id": "cross-spu-binutils-2.32-9.33.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-x86_64-binutils-2.32-9.33.1.aarch64",
"product": {
"name": "cross-x86_64-binutils-2.32-9.33.1.aarch64",
"product_id": "cross-x86_64-binutils-2.32-9.33.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-devel-64bit-2.32-9.33.1.aarch64_ilp32",
"product": {
"name": "binutils-devel-64bit-2.32-9.33.1.aarch64_ilp32",
"product_id": "binutils-devel-64bit-2.32-9.33.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-2.32-9.33.1.i586",
"product": {
"name": "binutils-2.32-9.33.1.i586",
"product_id": "binutils-2.32-9.33.1.i586"
}
},
{
"category": "product_version",
"name": "binutils-devel-2.32-9.33.1.i586",
"product": {
"name": "binutils-devel-2.32-9.33.1.i586",
"product_id": "binutils-devel-2.32-9.33.1.i586"
}
},
{
"category": "product_version",
"name": "binutils-gold-2.32-9.33.1.i586",
"product": {
"name": "binutils-gold-2.32-9.33.1.i586",
"product_id": "binutils-gold-2.32-9.33.1.i586"
}
},
{
"category": "product_version",
"name": "cross-aarch64-binutils-2.32-9.33.1.i586",
"product": {
"name": "cross-aarch64-binutils-2.32-9.33.1.i586",
"product_id": "cross-aarch64-binutils-2.32-9.33.1.i586"
}
},
{
"category": "product_version",
"name": "cross-arm-binutils-2.32-9.33.1.i586",
"product": {
"name": "cross-arm-binutils-2.32-9.33.1.i586",
"product_id": "cross-arm-binutils-2.32-9.33.1.i586"
}
},
{
"category": "product_version",
"name": "cross-avr-binutils-2.32-9.33.1.i586",
"product": {
"name": "cross-avr-binutils-2.32-9.33.1.i586",
"product_id": "cross-avr-binutils-2.32-9.33.1.i586"
}
},
{
"category": "product_version",
"name": "cross-hppa-binutils-2.32-9.33.1.i586",
"product": {
"name": "cross-hppa-binutils-2.32-9.33.1.i586",
"product_id": "cross-hppa-binutils-2.32-9.33.1.i586"
}
},
{
"category": "product_version",
"name": "cross-hppa64-binutils-2.32-9.33.1.i586",
"product": {
"name": "cross-hppa64-binutils-2.32-9.33.1.i586",
"product_id": "cross-hppa64-binutils-2.32-9.33.1.i586"
}
},
{
"category": "product_version",
"name": "cross-ia64-binutils-2.32-9.33.1.i586",
"product": {
"name": "cross-ia64-binutils-2.32-9.33.1.i586",
"product_id": "cross-ia64-binutils-2.32-9.33.1.i586"
}
},
{
"category": "product_version",
"name": "cross-m68k-binutils-2.32-9.33.1.i586",
"product": {
"name": "cross-m68k-binutils-2.32-9.33.1.i586",
"product_id": "cross-m68k-binutils-2.32-9.33.1.i586"
}
},
{
"category": "product_version",
"name": "cross-mips-binutils-2.32-9.33.1.i586",
"product": {
"name": "cross-mips-binutils-2.32-9.33.1.i586",
"product_id": "cross-mips-binutils-2.32-9.33.1.i586"
}
},
{
"category": "product_version",
"name": "cross-ppc-binutils-2.32-9.33.1.i586",
"product": {
"name": "cross-ppc-binutils-2.32-9.33.1.i586",
"product_id": "cross-ppc-binutils-2.32-9.33.1.i586"
}
},
{
"category": "product_version",
"name": "cross-ppc64-binutils-2.32-9.33.1.i586",
"product": {
"name": "cross-ppc64-binutils-2.32-9.33.1.i586",
"product_id": "cross-ppc64-binutils-2.32-9.33.1.i586"
}
},
{
"category": "product_version",
"name": "cross-ppc64le-binutils-2.32-9.33.1.i586",
"product": {
"name": "cross-ppc64le-binutils-2.32-9.33.1.i586",
"product_id": "cross-ppc64le-binutils-2.32-9.33.1.i586"
}
},
{
"category": "product_version",
"name": "cross-s390-binutils-2.32-9.33.1.i586",
"product": {
"name": "cross-s390-binutils-2.32-9.33.1.i586",
"product_id": "cross-s390-binutils-2.32-9.33.1.i586"
}
},
{
"category": "product_version",
"name": "cross-s390x-binutils-2.32-9.33.1.i586",
"product": {
"name": "cross-s390x-binutils-2.32-9.33.1.i586",
"product_id": "cross-s390x-binutils-2.32-9.33.1.i586"
}
},
{
"category": "product_version",
"name": "cross-sparc-binutils-2.32-9.33.1.i586",
"product": {
"name": "cross-sparc-binutils-2.32-9.33.1.i586",
"product_id": "cross-sparc-binutils-2.32-9.33.1.i586"
}
},
{
"category": "product_version",
"name": "cross-sparc64-binutils-2.32-9.33.1.i586",
"product": {
"name": "cross-sparc64-binutils-2.32-9.33.1.i586",
"product_id": "cross-sparc64-binutils-2.32-9.33.1.i586"
}
},
{
"category": "product_version",
"name": "cross-spu-binutils-2.32-9.33.1.i586",
"product": {
"name": "cross-spu-binutils-2.32-9.33.1.i586",
"product_id": "cross-spu-binutils-2.32-9.33.1.i586"
}
},
{
"category": "product_version",
"name": "cross-x86_64-binutils-2.32-9.33.1.i586",
"product": {
"name": "cross-x86_64-binutils-2.32-9.33.1.i586",
"product_id": "cross-x86_64-binutils-2.32-9.33.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-2.32-9.33.1.ppc64le",
"product": {
"name": "binutils-2.32-9.33.1.ppc64le",
"product_id": "binutils-2.32-9.33.1.ppc64le"
}
},
{
"category": "product_version",
"name": "binutils-devel-2.32-9.33.1.ppc64le",
"product": {
"name": "binutils-devel-2.32-9.33.1.ppc64le",
"product_id": "binutils-devel-2.32-9.33.1.ppc64le"
}
},
{
"category": "product_version",
"name": "binutils-gold-2.32-9.33.1.ppc64le",
"product": {
"name": "binutils-gold-2.32-9.33.1.ppc64le",
"product_id": "binutils-gold-2.32-9.33.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-aarch64-binutils-2.32-9.33.1.ppc64le",
"product": {
"name": "cross-aarch64-binutils-2.32-9.33.1.ppc64le",
"product_id": "cross-aarch64-binutils-2.32-9.33.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-arm-binutils-2.32-9.33.1.ppc64le",
"product": {
"name": "cross-arm-binutils-2.32-9.33.1.ppc64le",
"product_id": "cross-arm-binutils-2.32-9.33.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-avr-binutils-2.32-9.33.1.ppc64le",
"product": {
"name": "cross-avr-binutils-2.32-9.33.1.ppc64le",
"product_id": "cross-avr-binutils-2.32-9.33.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-hppa-binutils-2.32-9.33.1.ppc64le",
"product": {
"name": "cross-hppa-binutils-2.32-9.33.1.ppc64le",
"product_id": "cross-hppa-binutils-2.32-9.33.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-hppa64-binutils-2.32-9.33.1.ppc64le",
"product": {
"name": "cross-hppa64-binutils-2.32-9.33.1.ppc64le",
"product_id": "cross-hppa64-binutils-2.32-9.33.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-i386-binutils-2.32-9.33.1.ppc64le",
"product": {
"name": "cross-i386-binutils-2.32-9.33.1.ppc64le",
"product_id": "cross-i386-binutils-2.32-9.33.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-ia64-binutils-2.32-9.33.1.ppc64le",
"product": {
"name": "cross-ia64-binutils-2.32-9.33.1.ppc64le",
"product_id": "cross-ia64-binutils-2.32-9.33.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-m68k-binutils-2.32-9.33.1.ppc64le",
"product": {
"name": "cross-m68k-binutils-2.32-9.33.1.ppc64le",
"product_id": "cross-m68k-binutils-2.32-9.33.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-mips-binutils-2.32-9.33.1.ppc64le",
"product": {
"name": "cross-mips-binutils-2.32-9.33.1.ppc64le",
"product_id": "cross-mips-binutils-2.32-9.33.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-ppc-binutils-2.32-9.33.1.ppc64le",
"product": {
"name": "cross-ppc-binutils-2.32-9.33.1.ppc64le",
"product_id": "cross-ppc-binutils-2.32-9.33.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-ppc64-binutils-2.32-9.33.1.ppc64le",
"product": {
"name": "cross-ppc64-binutils-2.32-9.33.1.ppc64le",
"product_id": "cross-ppc64-binutils-2.32-9.33.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-s390-binutils-2.32-9.33.1.ppc64le",
"product": {
"name": "cross-s390-binutils-2.32-9.33.1.ppc64le",
"product_id": "cross-s390-binutils-2.32-9.33.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-s390x-binutils-2.32-9.33.1.ppc64le",
"product": {
"name": "cross-s390x-binutils-2.32-9.33.1.ppc64le",
"product_id": "cross-s390x-binutils-2.32-9.33.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-sparc-binutils-2.32-9.33.1.ppc64le",
"product": {
"name": "cross-sparc-binutils-2.32-9.33.1.ppc64le",
"product_id": "cross-sparc-binutils-2.32-9.33.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-sparc64-binutils-2.32-9.33.1.ppc64le",
"product": {
"name": "cross-sparc64-binutils-2.32-9.33.1.ppc64le",
"product_id": "cross-sparc64-binutils-2.32-9.33.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-spu-binutils-2.32-9.33.1.ppc64le",
"product": {
"name": "cross-spu-binutils-2.32-9.33.1.ppc64le",
"product_id": "cross-spu-binutils-2.32-9.33.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-x86_64-binutils-2.32-9.33.1.ppc64le",
"product": {
"name": "cross-x86_64-binutils-2.32-9.33.1.ppc64le",
"product_id": "cross-x86_64-binutils-2.32-9.33.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-2.32-9.33.1.s390",
"product": {
"name": "binutils-2.32-9.33.1.s390",
"product_id": "binutils-2.32-9.33.1.s390"
}
},
{
"category": "product_version",
"name": "binutils-devel-2.32-9.33.1.s390",
"product": {
"name": "binutils-devel-2.32-9.33.1.s390",
"product_id": "binutils-devel-2.32-9.33.1.s390"
}
},
{
"category": "product_version",
"name": "cross-aarch64-binutils-2.32-9.33.1.s390",
"product": {
"name": "cross-aarch64-binutils-2.32-9.33.1.s390",
"product_id": "cross-aarch64-binutils-2.32-9.33.1.s390"
}
},
{
"category": "product_version",
"name": "cross-arm-binutils-2.32-9.33.1.s390",
"product": {
"name": "cross-arm-binutils-2.32-9.33.1.s390",
"product_id": "cross-arm-binutils-2.32-9.33.1.s390"
}
},
{
"category": "product_version",
"name": "cross-avr-binutils-2.32-9.33.1.s390",
"product": {
"name": "cross-avr-binutils-2.32-9.33.1.s390",
"product_id": "cross-avr-binutils-2.32-9.33.1.s390"
}
},
{
"category": "product_version",
"name": "cross-hppa-binutils-2.32-9.33.1.s390",
"product": {
"name": "cross-hppa-binutils-2.32-9.33.1.s390",
"product_id": "cross-hppa-binutils-2.32-9.33.1.s390"
}
},
{
"category": "product_version",
"name": "cross-hppa64-binutils-2.32-9.33.1.s390",
"product": {
"name": "cross-hppa64-binutils-2.32-9.33.1.s390",
"product_id": "cross-hppa64-binutils-2.32-9.33.1.s390"
}
},
{
"category": "product_version",
"name": "cross-i386-binutils-2.32-9.33.1.s390",
"product": {
"name": "cross-i386-binutils-2.32-9.33.1.s390",
"product_id": "cross-i386-binutils-2.32-9.33.1.s390"
}
},
{
"category": "product_version",
"name": "cross-ia64-binutils-2.32-9.33.1.s390",
"product": {
"name": "cross-ia64-binutils-2.32-9.33.1.s390",
"product_id": "cross-ia64-binutils-2.32-9.33.1.s390"
}
},
{
"category": "product_version",
"name": "cross-m68k-binutils-2.32-9.33.1.s390",
"product": {
"name": "cross-m68k-binutils-2.32-9.33.1.s390",
"product_id": "cross-m68k-binutils-2.32-9.33.1.s390"
}
},
{
"category": "product_version",
"name": "cross-mips-binutils-2.32-9.33.1.s390",
"product": {
"name": "cross-mips-binutils-2.32-9.33.1.s390",
"product_id": "cross-mips-binutils-2.32-9.33.1.s390"
}
},
{
"category": "product_version",
"name": "cross-ppc-binutils-2.32-9.33.1.s390",
"product": {
"name": "cross-ppc-binutils-2.32-9.33.1.s390",
"product_id": "cross-ppc-binutils-2.32-9.33.1.s390"
}
},
{
"category": "product_version",
"name": "cross-ppc64-binutils-2.32-9.33.1.s390",
"product": {
"name": "cross-ppc64-binutils-2.32-9.33.1.s390",
"product_id": "cross-ppc64-binutils-2.32-9.33.1.s390"
}
},
{
"category": "product_version",
"name": "cross-ppc64le-binutils-2.32-9.33.1.s390",
"product": {
"name": "cross-ppc64le-binutils-2.32-9.33.1.s390",
"product_id": "cross-ppc64le-binutils-2.32-9.33.1.s390"
}
},
{
"category": "product_version",
"name": "cross-s390x-binutils-2.32-9.33.1.s390",
"product": {
"name": "cross-s390x-binutils-2.32-9.33.1.s390",
"product_id": "cross-s390x-binutils-2.32-9.33.1.s390"
}
},
{
"category": "product_version",
"name": "cross-sparc-binutils-2.32-9.33.1.s390",
"product": {
"name": "cross-sparc-binutils-2.32-9.33.1.s390",
"product_id": "cross-sparc-binutils-2.32-9.33.1.s390"
}
},
{
"category": "product_version",
"name": "cross-sparc64-binutils-2.32-9.33.1.s390",
"product": {
"name": "cross-sparc64-binutils-2.32-9.33.1.s390",
"product_id": "cross-sparc64-binutils-2.32-9.33.1.s390"
}
},
{
"category": "product_version",
"name": "cross-spu-binutils-2.32-9.33.1.s390",
"product": {
"name": "cross-spu-binutils-2.32-9.33.1.s390",
"product_id": "cross-spu-binutils-2.32-9.33.1.s390"
}
},
{
"category": "product_version",
"name": "cross-x86_64-binutils-2.32-9.33.1.s390",
"product": {
"name": "cross-x86_64-binutils-2.32-9.33.1.s390",
"product_id": "cross-x86_64-binutils-2.32-9.33.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-2.32-9.33.1.s390x",
"product": {
"name": "binutils-2.32-9.33.1.s390x",
"product_id": "binutils-2.32-9.33.1.s390x"
}
},
{
"category": "product_version",
"name": "binutils-devel-2.32-9.33.1.s390x",
"product": {
"name": "binutils-devel-2.32-9.33.1.s390x",
"product_id": "binutils-devel-2.32-9.33.1.s390x"
}
},
{
"category": "product_version",
"name": "binutils-devel-32bit-2.32-9.33.1.s390x",
"product": {
"name": "binutils-devel-32bit-2.32-9.33.1.s390x",
"product_id": "binutils-devel-32bit-2.32-9.33.1.s390x"
}
},
{
"category": "product_version",
"name": "binutils-gold-2.32-9.33.1.s390x",
"product": {
"name": "binutils-gold-2.32-9.33.1.s390x",
"product_id": "binutils-gold-2.32-9.33.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-aarch64-binutils-2.32-9.33.1.s390x",
"product": {
"name": "cross-aarch64-binutils-2.32-9.33.1.s390x",
"product_id": "cross-aarch64-binutils-2.32-9.33.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-arm-binutils-2.32-9.33.1.s390x",
"product": {
"name": "cross-arm-binutils-2.32-9.33.1.s390x",
"product_id": "cross-arm-binutils-2.32-9.33.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-avr-binutils-2.32-9.33.1.s390x",
"product": {
"name": "cross-avr-binutils-2.32-9.33.1.s390x",
"product_id": "cross-avr-binutils-2.32-9.33.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-hppa-binutils-2.32-9.33.1.s390x",
"product": {
"name": "cross-hppa-binutils-2.32-9.33.1.s390x",
"product_id": "cross-hppa-binutils-2.32-9.33.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-hppa64-binutils-2.32-9.33.1.s390x",
"product": {
"name": "cross-hppa64-binutils-2.32-9.33.1.s390x",
"product_id": "cross-hppa64-binutils-2.32-9.33.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-i386-binutils-2.32-9.33.1.s390x",
"product": {
"name": "cross-i386-binutils-2.32-9.33.1.s390x",
"product_id": "cross-i386-binutils-2.32-9.33.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-ia64-binutils-2.32-9.33.1.s390x",
"product": {
"name": "cross-ia64-binutils-2.32-9.33.1.s390x",
"product_id": "cross-ia64-binutils-2.32-9.33.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-m68k-binutils-2.32-9.33.1.s390x",
"product": {
"name": "cross-m68k-binutils-2.32-9.33.1.s390x",
"product_id": "cross-m68k-binutils-2.32-9.33.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-mips-binutils-2.32-9.33.1.s390x",
"product": {
"name": "cross-mips-binutils-2.32-9.33.1.s390x",
"product_id": "cross-mips-binutils-2.32-9.33.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-ppc-binutils-2.32-9.33.1.s390x",
"product": {
"name": "cross-ppc-binutils-2.32-9.33.1.s390x",
"product_id": "cross-ppc-binutils-2.32-9.33.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-ppc64-binutils-2.32-9.33.1.s390x",
"product": {
"name": "cross-ppc64-binutils-2.32-9.33.1.s390x",
"product_id": "cross-ppc64-binutils-2.32-9.33.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-ppc64le-binutils-2.32-9.33.1.s390x",
"product": {
"name": "cross-ppc64le-binutils-2.32-9.33.1.s390x",
"product_id": "cross-ppc64le-binutils-2.32-9.33.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-s390-binutils-2.32-9.33.1.s390x",
"product": {
"name": "cross-s390-binutils-2.32-9.33.1.s390x",
"product_id": "cross-s390-binutils-2.32-9.33.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-sparc-binutils-2.32-9.33.1.s390x",
"product": {
"name": "cross-sparc-binutils-2.32-9.33.1.s390x",
"product_id": "cross-sparc-binutils-2.32-9.33.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-sparc64-binutils-2.32-9.33.1.s390x",
"product": {
"name": "cross-sparc64-binutils-2.32-9.33.1.s390x",
"product_id": "cross-sparc64-binutils-2.32-9.33.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-spu-binutils-2.32-9.33.1.s390x",
"product": {
"name": "cross-spu-binutils-2.32-9.33.1.s390x",
"product_id": "cross-spu-binutils-2.32-9.33.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-x86_64-binutils-2.32-9.33.1.s390x",
"product": {
"name": "cross-x86_64-binutils-2.32-9.33.1.s390x",
"product_id": "cross-x86_64-binutils-2.32-9.33.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-2.32-9.33.1.x86_64",
"product": {
"name": "binutils-2.32-9.33.1.x86_64",
"product_id": "binutils-2.32-9.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "binutils-devel-2.32-9.33.1.x86_64",
"product": {
"name": "binutils-devel-2.32-9.33.1.x86_64",
"product_id": "binutils-devel-2.32-9.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "binutils-devel-32bit-2.32-9.33.1.x86_64",
"product": {
"name": "binutils-devel-32bit-2.32-9.33.1.x86_64",
"product_id": "binutils-devel-32bit-2.32-9.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "binutils-gold-2.32-9.33.1.x86_64",
"product": {
"name": "binutils-gold-2.32-9.33.1.x86_64",
"product_id": "binutils-gold-2.32-9.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-aarch64-binutils-2.32-9.33.1.x86_64",
"product": {
"name": "cross-aarch64-binutils-2.32-9.33.1.x86_64",
"product_id": "cross-aarch64-binutils-2.32-9.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-arm-binutils-2.32-9.33.1.x86_64",
"product": {
"name": "cross-arm-binutils-2.32-9.33.1.x86_64",
"product_id": "cross-arm-binutils-2.32-9.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-avr-binutils-2.32-9.33.1.x86_64",
"product": {
"name": "cross-avr-binutils-2.32-9.33.1.x86_64",
"product_id": "cross-avr-binutils-2.32-9.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-hppa-binutils-2.32-9.33.1.x86_64",
"product": {
"name": "cross-hppa-binutils-2.32-9.33.1.x86_64",
"product_id": "cross-hppa-binutils-2.32-9.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-hppa64-binutils-2.32-9.33.1.x86_64",
"product": {
"name": "cross-hppa64-binutils-2.32-9.33.1.x86_64",
"product_id": "cross-hppa64-binutils-2.32-9.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-i386-binutils-2.32-9.33.1.x86_64",
"product": {
"name": "cross-i386-binutils-2.32-9.33.1.x86_64",
"product_id": "cross-i386-binutils-2.32-9.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-ia64-binutils-2.32-9.33.1.x86_64",
"product": {
"name": "cross-ia64-binutils-2.32-9.33.1.x86_64",
"product_id": "cross-ia64-binutils-2.32-9.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-m68k-binutils-2.32-9.33.1.x86_64",
"product": {
"name": "cross-m68k-binutils-2.32-9.33.1.x86_64",
"product_id": "cross-m68k-binutils-2.32-9.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-mips-binutils-2.32-9.33.1.x86_64",
"product": {
"name": "cross-mips-binutils-2.32-9.33.1.x86_64",
"product_id": "cross-mips-binutils-2.32-9.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-ppc-binutils-2.32-9.33.1.x86_64",
"product": {
"name": "cross-ppc-binutils-2.32-9.33.1.x86_64",
"product_id": "cross-ppc-binutils-2.32-9.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-ppc64-binutils-2.32-9.33.1.x86_64",
"product": {
"name": "cross-ppc64-binutils-2.32-9.33.1.x86_64",
"product_id": "cross-ppc64-binutils-2.32-9.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-ppc64le-binutils-2.32-9.33.1.x86_64",
"product": {
"name": "cross-ppc64le-binutils-2.32-9.33.1.x86_64",
"product_id": "cross-ppc64le-binutils-2.32-9.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-s390-binutils-2.32-9.33.1.x86_64",
"product": {
"name": "cross-s390-binutils-2.32-9.33.1.x86_64",
"product_id": "cross-s390-binutils-2.32-9.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-s390x-binutils-2.32-9.33.1.x86_64",
"product": {
"name": "cross-s390x-binutils-2.32-9.33.1.x86_64",
"product_id": "cross-s390x-binutils-2.32-9.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-sparc-binutils-2.32-9.33.1.x86_64",
"product": {
"name": "cross-sparc-binutils-2.32-9.33.1.x86_64",
"product_id": "cross-sparc-binutils-2.32-9.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-sparc64-binutils-2.32-9.33.1.x86_64",
"product": {
"name": "cross-sparc64-binutils-2.32-9.33.1.x86_64",
"product_id": "cross-sparc64-binutils-2.32-9.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-spu-binutils-2.32-9.33.1.x86_64",
"product": {
"name": "cross-spu-binutils-2.32-9.33.1.x86_64",
"product_id": "cross-spu-binutils-2.32-9.33.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "HPE Helion OpenStack 8",
"product": {
"name": "HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8",
"product_identification_helper": {
"cpe": "cpe:/o:suse:hpe-helion-openstack:8"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 7",
"product": {
"name": "SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:7"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 8",
"product": {
"name": "SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:8"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud Crowbar 8",
"product": {
"name": "SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:8"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 4",
"product": {
"name": "SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:4"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 5",
"product": {
"name": "SUSE Enterprise Storage 5",
"product_id": "SUSE Enterprise Storage 5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-9.33.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64"
},
"product_reference": "binutils-2.32-9.33.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-9.33.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x"
},
"product_reference": "binutils-2.32-9.33.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-9.33.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64"
},
"product_reference": "binutils-2.32-9.33.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.32-9.33.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x"
},
"product_reference": "binutils-devel-2.32-9.33.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.32-9.33.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64"
},
"product_reference": "binutils-devel-2.32-9.33.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-9.33.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64"
},
"product_reference": "binutils-2.32-9.33.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-9.33.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
},
"product_reference": "binutils-2.32-9.33.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64"
},
"product_reference": "binutils-2.32-9.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64"
},
"product_reference": "binutils-2.32-9.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64"
},
"product_reference": "binutils-devel-2.32-9.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-9.33.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le"
},
"product_reference": "binutils-2.32-9.33.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64"
},
"product_reference": "binutils-2.32-9.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.32-9.33.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le"
},
"product_reference": "binutils-devel-2.32-9.33.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64"
},
"product_reference": "binutils-devel-2.32-9.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-9.33.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le"
},
"product_reference": "binutils-2.32-9.33.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64"
},
"product_reference": "binutils-2.32-9.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.32-9.33.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64"
},
"product_reference": "binutils-devel-2.32-9.33.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.32-9.33.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le"
},
"product_reference": "binutils-devel-2.32-9.33.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.32-9.33.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x"
},
"product_reference": "binutils-devel-2.32-9.33.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64"
},
"product_reference": "binutils-devel-2.32-9.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-gold-2.32-9.33.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64"
},
"product_reference": "binutils-gold-2.32-9.33.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-gold-2.32-9.33.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le"
},
"product_reference": "binutils-gold-2.32-9.33.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-gold-2.32-9.33.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x"
},
"product_reference": "binutils-gold-2.32-9.33.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-gold-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64"
},
"product_reference": "binutils-gold-2.32-9.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-ppc-binutils-2.32-9.33.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64"
},
"product_reference": "cross-ppc-binutils-2.32-9.33.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-ppc-binutils-2.32-9.33.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le"
},
"product_reference": "cross-ppc-binutils-2.32-9.33.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-ppc-binutils-2.32-9.33.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x"
},
"product_reference": "cross-ppc-binutils-2.32-9.33.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-ppc-binutils-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64"
},
"product_reference": "cross-ppc-binutils-2.32-9.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-spu-binutils-2.32-9.33.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64"
},
"product_reference": "cross-spu-binutils-2.32-9.33.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-spu-binutils-2.32-9.33.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le"
},
"product_reference": "cross-spu-binutils-2.32-9.33.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-spu-binutils-2.32-9.33.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x"
},
"product_reference": "cross-spu-binutils-2.32-9.33.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-spu-binutils-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64"
},
"product_reference": "cross-spu-binutils-2.32-9.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.32-9.33.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64"
},
"product_reference": "binutils-devel-2.32-9.33.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.32-9.33.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le"
},
"product_reference": "binutils-devel-2.32-9.33.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.32-9.33.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x"
},
"product_reference": "binutils-devel-2.32-9.33.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64"
},
"product_reference": "binutils-devel-2.32-9.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-gold-2.32-9.33.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64"
},
"product_reference": "binutils-gold-2.32-9.33.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-gold-2.32-9.33.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le"
},
"product_reference": "binutils-gold-2.32-9.33.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-gold-2.32-9.33.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x"
},
"product_reference": "binutils-gold-2.32-9.33.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-gold-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64"
},
"product_reference": "binutils-gold-2.32-9.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-ppc-binutils-2.32-9.33.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64"
},
"product_reference": "cross-ppc-binutils-2.32-9.33.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-ppc-binutils-2.32-9.33.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le"
},
"product_reference": "cross-ppc-binutils-2.32-9.33.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-ppc-binutils-2.32-9.33.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x"
},
"product_reference": "cross-ppc-binutils-2.32-9.33.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-ppc-binutils-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64"
},
"product_reference": "cross-ppc-binutils-2.32-9.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-spu-binutils-2.32-9.33.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64"
},
"product_reference": "cross-spu-binutils-2.32-9.33.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-spu-binutils-2.32-9.33.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le"
},
"product_reference": "cross-spu-binutils-2.32-9.33.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-spu-binutils-2.32-9.33.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x"
},
"product_reference": "cross-spu-binutils-2.32-9.33.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-spu-binutils-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64"
},
"product_reference": "cross-spu-binutils-2.32-9.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-9.33.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le"
},
"product_reference": "binutils-2.32-9.33.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-9.33.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x"
},
"product_reference": "binutils-2.32-9.33.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64"
},
"product_reference": "binutils-2.32-9.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.32-9.33.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le"
},
"product_reference": "binutils-devel-2.32-9.33.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.32-9.33.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x"
},
"product_reference": "binutils-devel-2.32-9.33.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64"
},
"product_reference": "binutils-devel-2.32-9.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-9.33.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le"
},
"product_reference": "binutils-2.32-9.33.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-9.33.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x"
},
"product_reference": "binutils-2.32-9.33.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64"
},
"product_reference": "binutils-2.32-9.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.32-9.33.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le"
},
"product_reference": "binutils-devel-2.32-9.33.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.32-9.33.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x"
},
"product_reference": "binutils-devel-2.32-9.33.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64"
},
"product_reference": "binutils-devel-2.32-9.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64"
},
"product_reference": "binutils-2.32-9.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-9.33.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64"
},
"product_reference": "binutils-2.32-9.33.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-9.33.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le"
},
"product_reference": "binutils-2.32-9.33.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-9.33.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x"
},
"product_reference": "binutils-2.32-9.33.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64"
},
"product_reference": "binutils-2.32-9.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64"
},
"product_reference": "binutils-2.32-9.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-9.33.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64"
},
"product_reference": "binutils-2.32-9.33.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-9.33.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le"
},
"product_reference": "binutils-2.32-9.33.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-9.33.1.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x"
},
"product_reference": "binutils-2.32-9.33.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64"
},
"product_reference": "binutils-2.32-9.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-9.33.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64"
},
"product_reference": "binutils-2.32-9.33.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-9.33.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le"
},
"product_reference": "binutils-2.32-9.33.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-9.33.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x"
},
"product_reference": "binutils-2.32-9.33.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64"
},
"product_reference": "binutils-2.32-9.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-9.33.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64"
},
"product_reference": "binutils-2.32-9.33.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-9.33.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le"
},
"product_reference": "binutils-2.32-9.33.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-9.33.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x"
},
"product_reference": "binutils-2.32-9.33.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64"
},
"product_reference": "binutils-2.32-9.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-9.33.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64"
},
"product_reference": "binutils-2.32-9.33.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-9.33.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le"
},
"product_reference": "binutils-2.32-9.33.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-9.33.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x"
},
"product_reference": "binutils-2.32-9.33.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64"
},
"product_reference": "binutils-2.32-9.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-9.33.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64"
},
"product_reference": "binutils-2.32-9.33.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.32-9.33.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64"
},
"product_reference": "binutils-devel-2.32-9.33.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-9.33.1.aarch64 as component of SUSE Enterprise Storage 5",
"product_id": "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64"
},
"product_reference": "binutils-2.32-9.33.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-9.33.1.x86_64 as component of SUSE Enterprise Storage 5",
"product_id": "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64"
},
"product_reference": "binutils-2.32-9.33.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-1000876",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000876"
}
],
"notes": [
{
"category": "general",
"text": "binutils version 2.32 and earlier contains a Integer Overflow vulnerability in objdump, bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc that can result in Integer overflow trigger heap overflow. Successful exploitation allows execution of arbitrary code.. This attack appear to be exploitable via Local. This vulnerability appears to have been fixed in after commit 3a551c7a1b80fca579461774860574eabfd7f18f.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000876",
"url": "https://www.suse.com/security/cve/CVE-2018-1000876"
},
{
"category": "external",
"summary": "SUSE Bug 1120640 for CVE-2018-1000876",
"url": "https://bugzilla.suse.com/1120640"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T08:53:28Z",
"details": "moderate"
}
],
"title": "CVE-2018-1000876"
},
{
"cve": "CVE-2018-17358",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-17358"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory access exists in _bfd_stab_section_find_nearest_line in syms.c. Attackers could leverage this vulnerability to cause a denial of service (application crash) via a crafted ELF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-17358",
"url": "https://www.suse.com/security/cve/CVE-2018-17358"
},
{
"category": "external",
"summary": "SUSE Bug 1109412 for CVE-2018-17358",
"url": "https://bugzilla.suse.com/1109412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T08:53:28Z",
"details": "low"
}
],
"title": "CVE-2018-17358"
},
{
"cve": "CVE-2018-17359",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-17359"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory access exists in bfd_zalloc in opncls.c. Attackers could leverage this vulnerability to cause a denial of service (application crash) via a crafted ELF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-17359",
"url": "https://www.suse.com/security/cve/CVE-2018-17359"
},
{
"category": "external",
"summary": "SUSE Bug 1109413 for CVE-2018-17359",
"url": "https://bugzilla.suse.com/1109413"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T08:53:28Z",
"details": "low"
}
],
"title": "CVE-2018-17359"
},
{
"cve": "CVE-2018-17360",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-17360"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. a heap-based buffer over-read in bfd_getl32 in libbfd.c allows an attacker to cause a denial of service through a crafted PE file. This vulnerability can be triggered by the executable objdump.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-17360",
"url": "https://www.suse.com/security/cve/CVE-2018-17360"
},
{
"category": "external",
"summary": "SUSE Bug 1109414 for CVE-2018-17360",
"url": "https://bugzilla.suse.com/1109414"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T08:53:28Z",
"details": "low"
}
],
"title": "CVE-2018-17360"
},
{
"cve": "CVE-2018-17985",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-17985"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. There is a stack consumption problem caused by the cplus_demangle_type function making recursive calls to itself in certain scenarios involving many \u0027P\u0027 characters.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-17985",
"url": "https://www.suse.com/security/cve/CVE-2018-17985"
},
{
"category": "external",
"summary": "SUSE Bug 1116827 for CVE-2018-17985",
"url": "https://bugzilla.suse.com/1116827"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T08:53:28Z",
"details": "moderate"
}
],
"title": "CVE-2018-17985"
},
{
"cve": "CVE-2018-18309",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18309"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory address dereference was discovered in read_reloc in reloc.c. The vulnerability causes a segmentation fault and application crash, which leads to denial of service, as demonstrated by objdump, because of missing _bfd_clear_contents bounds checking.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18309",
"url": "https://www.suse.com/security/cve/CVE-2018-18309"
},
{
"category": "external",
"summary": "SUSE Bug 1111996 for CVE-2018-18309",
"url": "https://bugzilla.suse.com/1111996"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T08:53:28Z",
"details": "low"
}
],
"title": "CVE-2018-18309"
},
{
"cve": "CVE-2018-18483",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18483"
}
],
"notes": [
{
"category": "general",
"text": "The get_count function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31, allows remote attackers to cause a denial of service (malloc called with the result of an integer-overflowing calculation) or possibly have unspecified other impact via a crafted string, as demonstrated by c++filt.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18483",
"url": "https://www.suse.com/security/cve/CVE-2018-18483"
},
{
"category": "external",
"summary": "SUSE Bug 1112535 for CVE-2018-18483",
"url": "https://bugzilla.suse.com/1112535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T08:53:28Z",
"details": "moderate"
}
],
"title": "CVE-2018-18483"
},
{
"cve": "CVE-2018-18484",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18484"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there is a stack consumption problem caused by recursive stack frames: cplus_demangle_type, d_bare_function_type, d_function_type.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18484",
"url": "https://www.suse.com/security/cve/CVE-2018-18484"
},
{
"category": "external",
"summary": "SUSE Bug 1112534 for CVE-2018-18484",
"url": "https://bugzilla.suse.com/1112534"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T08:53:28Z",
"details": "moderate"
}
],
"title": "CVE-2018-18484"
},
{
"cve": "CVE-2018-18605",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18605"
}
],
"notes": [
{
"category": "general",
"text": "A heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup in merge.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31, because _bfd_add_merge_section mishandles section merges when size is not a multiple of entsize. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18605",
"url": "https://www.suse.com/security/cve/CVE-2018-18605"
},
{
"category": "external",
"summary": "SUSE Bug 1113255 for CVE-2018-18605",
"url": "https://bugzilla.suse.com/1113255"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T08:53:28Z",
"details": "moderate"
}
],
"title": "CVE-2018-18605"
},
{
"cve": "CVE-2018-18606",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18606"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the merge_strings function in merge.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18606",
"url": "https://www.suse.com/security/cve/CVE-2018-18606"
},
{
"category": "external",
"summary": "SUSE Bug 1113252 for CVE-2018-18606",
"url": "https://bugzilla.suse.com/1113252"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T08:53:28Z",
"details": "low"
}
],
"title": "CVE-2018-18606"
},
{
"cve": "CVE-2018-18607",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18607"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in elf_link_input_bfd in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18607",
"url": "https://www.suse.com/security/cve/CVE-2018-18607"
},
{
"category": "external",
"summary": "SUSE Bug 1113247 for CVE-2018-18607",
"url": "https://bugzilla.suse.com/1113247"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T08:53:28Z",
"details": "low"
}
],
"title": "CVE-2018-18607"
},
{
"cve": "CVE-2018-19931",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-19931"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h because the number of program headers is not restricted.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-19931",
"url": "https://www.suse.com/security/cve/CVE-2018-19931"
},
{
"category": "external",
"summary": "SUSE Bug 1118830 for CVE-2018-19931",
"url": "https://bugzilla.suse.com/1118830"
},
{
"category": "external",
"summary": "SUSE Bug 1118831 for CVE-2018-19931",
"url": "https://bugzilla.suse.com/1118831"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T08:53:28Z",
"details": "low"
}
],
"title": "CVE-2018-19931"
},
{
"cve": "CVE-2018-19932",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-19932"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA macro in elf.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-19932",
"url": "https://www.suse.com/security/cve/CVE-2018-19932"
},
{
"category": "external",
"summary": "SUSE Bug 1118830 for CVE-2018-19932",
"url": "https://bugzilla.suse.com/1118830"
},
{
"category": "external",
"summary": "SUSE Bug 1118831 for CVE-2018-19932",
"url": "https://bugzilla.suse.com/1118831"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T08:53:28Z",
"details": "low"
}
],
"title": "CVE-2018-19932"
},
{
"cve": "CVE-2018-20623",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20623"
}
],
"notes": [
{
"category": "general",
"text": "In GNU Binutils 2.31.1, there is a use-after-free in the error function in elfcomm.c when called from the process_archive function in readelf.c via a crafted ELF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20623",
"url": "https://www.suse.com/security/cve/CVE-2018-20623"
},
{
"category": "external",
"summary": "SUSE Bug 1121035 for CVE-2018-20623",
"url": "https://bugzilla.suse.com/1121035"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T08:53:28Z",
"details": "moderate"
}
],
"title": "CVE-2018-20623"
},
{
"cve": "CVE-2018-20651",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20651"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference was discovered in elf_link_add_object_symbols in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31.1. This occurs for a crafted ET_DYN with no program headers. A specially crafted ELF file allows remote attackers to cause a denial of service, as demonstrated by ld.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20651",
"url": "https://www.suse.com/security/cve/CVE-2018-20651"
},
{
"category": "external",
"summary": "SUSE Bug 1121034 for CVE-2018-20651",
"url": "https://bugzilla.suse.com/1121034"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T08:53:28Z",
"details": "low"
}
],
"title": "CVE-2018-20651"
},
{
"cve": "CVE-2018-20671",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20671"
}
],
"notes": [
{
"category": "general",
"text": "load_specific_debug_section in objdump.c in GNU Binutils through 2.31.1 contains an integer overflow vulnerability that can trigger a heap-based buffer overflow via a crafted section size.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20671",
"url": "https://www.suse.com/security/cve/CVE-2018-20671"
},
{
"category": "external",
"summary": "SUSE Bug 1121056 for CVE-2018-20671",
"url": "https://bugzilla.suse.com/1121056"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T08:53:28Z",
"details": "low"
}
],
"title": "CVE-2018-20671"
},
{
"cve": "CVE-2019-1010180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-1010180"
}
],
"notes": [
{
"category": "general",
"text": "GNU gdb All versions is affected by: Buffer Overflow - Out of bound memory access. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. The component is: The main gdb module. The attack vector is: Open an ELF for debugging. The fixed version is: Not fixed yet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-1010180",
"url": "https://www.suse.com/security/cve/CVE-2019-1010180"
},
{
"category": "external",
"summary": "SUSE Bug 1142772 for CVE-2019-1010180",
"url": "https://bugzilla.suse.com/1142772"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64",
"SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x",
"SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T08:53:28Z",
"details": "important"
}
],
"title": "CVE-2019-1010180"
}
]
}
suse-su-2019:2779-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for binutils",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for binutils fixes the following issues:\n\nbinutils was updated to current 2.32 branch [jsc#ECO-368].\n\nIncludes following security fixes:\n\n- CVE-2018-17358: Fixed invalid memory access in _bfd_stab_section_find_nearest_line in syms.c (bsc#1109412)\n- CVE-2018-17359: Fixed invalid memory access exists in bfd_zalloc in opncls.c (bsc#1109413)\n- CVE-2018-17360: Fixed heap-based buffer over-read in bfd_getl32 in libbfd.c (bsc#1109414)\n- CVE-2018-17985: Fixed a stack consumption problem caused by the cplus_demangle_type (bsc#1116827)\n- CVE-2018-18309: Fixed an invalid memory address dereference was discovered in read_reloc in reloc.c (bsc#1111996)\n- CVE-2018-18483: Fixed get_count function provided by libiberty that allowed attackers to cause a denial of service or other unspecified impact (bsc#1112535)\n- CVE-2018-18484: Fixed stack exhaustion in the C++ demangling functions provided by libiberty, caused by recursive stack frames (bsc#1112534)\n- CVE-2018-18605: Fixed a heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup causing a denial of service (bsc#1113255)\n- CVE-2018-18606: Fixed a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments, causing denial of service (bsc#1113252)\n- CVE-2018-18607: Fixed a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section, causing denial of service (bsc#1113247)\n- CVE-2018-19931: Fixed a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h (bsc#1118831)\n- CVE-2018-19932: Fixed an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA (bsc#1118830)\n- CVE-2018-20623: Fixed a use-after-free in the error function in elfcomm.c (bsc#1121035)\n- CVE-2018-20651: Fixed a denial of service via a NULL pointer dereference in elf_link_add_object_symbols in elflink.c (bsc#1121034)\n- CVE-2018-20671: Fixed an integer overflow that can trigger a heap-based buffer overflow in load_specific_debug_section in objdump.c (bsc#1121056)\n- CVE-2018-1000876: Fixed integer overflow in bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc in objdump (bsc#1120640)\n- CVE-2019-1010180: Fixed an out of bound memory access that could lead to crashes (bsc#1142772)\n\n- enable xtensa architecture (Tensilica lc6 and related)\n- Use -ffat-lto-objects in order to provide assembly for static libs\n (bsc#1141913).\n- Fixed some LTO build issues (bsc#1133131 bsc#1133232).\n- riscv: Don\u0027t check ABI flags if no code section\n- Fixed a segfault in ld when building some versions of pacemaker (bsc#1154025, bsc#1154016).\n- Add avr, epiphany and rx to target_list so that the common binutils can handle all objects we can create with crosses (bsc#1152590).\n\nUpdate to binutils 2.32:\n\n* The binutils now support for the C-SKY processor series.\n* The x86 assembler now supports a -mvexwig=[0|1] option to control\n encoding of VEX.W-ignored (WIG) VEX instructions.\n It also has a new -mx86-used-note=[yes|no] option to generate (or\n not) x86 GNU property notes. \n* The MIPS assembler now supports the Loongson EXTensions R2 (EXT2),\n the Loongson EXTensions (EXT) instructions, the Loongson Content\n Address Memory (CAM) ASE and the Loongson MultiMedia extensions\n Instructions (MMI) ASE.\n* The addr2line, c++filt, nm and objdump tools now have a default\n limit on the maximum amount of recursion that is allowed whilst\n demangling strings. This limit can be disabled if necessary.\n* Objdump\u0027s --disassemble option can now take a parameter,\n specifying the starting symbol for disassembly. Disassembly will\n continue from this symbol up to the next symbol or the end of the\n function.\n* The BFD linker will now report property change in linker map file\n when merging GNU properties.\n* The BFD linker\u0027s -t option now doesn\u0027t report members within\n archives, unless -t is given twice. This makes it more useful\n when generating a list of files that should be packaged for a\n linker bug report.\n* The GOLD linker has improved warning messages for relocations that\n refer to discarded sections.\n\n- Improve relro support on s390 [fate#326356]\n- Fix broken debug symbols (bsc#1118644)\n- Handle ELF compressed header alignment correctly.\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-2779,SUSE-SLE-Module-Basesystem-15-SP1-2019-2779,SUSE-SLE-Module-Development-Tools-15-SP1-2019-2779,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2779,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2019-2779",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2779-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:2779-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192779-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:2779-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html"
},
{
"category": "self",
"summary": "SUSE Bug 1109412",
"url": "https://bugzilla.suse.com/1109412"
},
{
"category": "self",
"summary": "SUSE Bug 1109413",
"url": "https://bugzilla.suse.com/1109413"
},
{
"category": "self",
"summary": "SUSE Bug 1109414",
"url": "https://bugzilla.suse.com/1109414"
},
{
"category": "self",
"summary": "SUSE Bug 1111996",
"url": "https://bugzilla.suse.com/1111996"
},
{
"category": "self",
"summary": "SUSE Bug 1112534",
"url": "https://bugzilla.suse.com/1112534"
},
{
"category": "self",
"summary": "SUSE Bug 1112535",
"url": "https://bugzilla.suse.com/1112535"
},
{
"category": "self",
"summary": "SUSE Bug 1113247",
"url": "https://bugzilla.suse.com/1113247"
},
{
"category": "self",
"summary": "SUSE Bug 1113252",
"url": "https://bugzilla.suse.com/1113252"
},
{
"category": "self",
"summary": "SUSE Bug 1113255",
"url": "https://bugzilla.suse.com/1113255"
},
{
"category": "self",
"summary": "SUSE Bug 1116827",
"url": "https://bugzilla.suse.com/1116827"
},
{
"category": "self",
"summary": "SUSE Bug 1118644",
"url": "https://bugzilla.suse.com/1118644"
},
{
"category": "self",
"summary": "SUSE Bug 1118830",
"url": "https://bugzilla.suse.com/1118830"
},
{
"category": "self",
"summary": "SUSE Bug 1118831",
"url": "https://bugzilla.suse.com/1118831"
},
{
"category": "self",
"summary": "SUSE Bug 1120640",
"url": "https://bugzilla.suse.com/1120640"
},
{
"category": "self",
"summary": "SUSE Bug 1121034",
"url": "https://bugzilla.suse.com/1121034"
},
{
"category": "self",
"summary": "SUSE Bug 1121035",
"url": "https://bugzilla.suse.com/1121035"
},
{
"category": "self",
"summary": "SUSE Bug 1121056",
"url": "https://bugzilla.suse.com/1121056"
},
{
"category": "self",
"summary": "SUSE Bug 1133131",
"url": "https://bugzilla.suse.com/1133131"
},
{
"category": "self",
"summary": "SUSE Bug 1133232",
"url": "https://bugzilla.suse.com/1133232"
},
{
"category": "self",
"summary": "SUSE Bug 1141913",
"url": "https://bugzilla.suse.com/1141913"
},
{
"category": "self",
"summary": "SUSE Bug 1142772",
"url": "https://bugzilla.suse.com/1142772"
},
{
"category": "self",
"summary": "SUSE Bug 1152590",
"url": "https://bugzilla.suse.com/1152590"
},
{
"category": "self",
"summary": "SUSE Bug 1154016",
"url": "https://bugzilla.suse.com/1154016"
},
{
"category": "self",
"summary": "SUSE Bug 1154025",
"url": "https://bugzilla.suse.com/1154025"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000876 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000876/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-17358 page",
"url": "https://www.suse.com/security/cve/CVE-2018-17358/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-17359 page",
"url": "https://www.suse.com/security/cve/CVE-2018-17359/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-17360 page",
"url": "https://www.suse.com/security/cve/CVE-2018-17360/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-17985 page",
"url": "https://www.suse.com/security/cve/CVE-2018-17985/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18309 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18309/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18483 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18483/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18484 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18484/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18605 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18605/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18606 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18606/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18607 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18607/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-19931 page",
"url": "https://www.suse.com/security/cve/CVE-2018-19931/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-19932 page",
"url": "https://www.suse.com/security/cve/CVE-2018-19932/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20623 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20623/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20651 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20651/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20671 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20671/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-6323 page",
"url": "https://www.suse.com/security/cve/CVE-2018-6323/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-6543 page",
"url": "https://www.suse.com/security/cve/CVE-2018-6543/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-6759 page",
"url": "https://www.suse.com/security/cve/CVE-2018-6759/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-6872 page",
"url": "https://www.suse.com/security/cve/CVE-2018-6872/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7208 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7208/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7568 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7568/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7569 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7570 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7570/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7642 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7642/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7643 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7643/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-8945 page",
"url": "https://www.suse.com/security/cve/CVE-2018-8945/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-1010180 page",
"url": "https://www.suse.com/security/cve/CVE-2019-1010180/"
},
{
"category": "self",
"summary": "SUSE Bug ECO-368",
"url": "https://bugzilla.suse.com/ECO-368"
},
{
"category": "self",
"summary": "SUSE Bug SLE-6206",
"url": "https://bugzilla.suse.com/SLE-6206"
}
],
"title": "Security update for binutils",
"tracking": {
"current_release_date": "2019-10-24T14:57:52Z",
"generator": {
"date": "2019-10-24T14:57:52Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:2779-1",
"initial_release_date": "2019-10-24T14:57:52Z",
"revision_history": [
{
"date": "2019-10-24T14:57:52Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "binutils-2.32-7.5.1.aarch64",
"product": {
"name": "binutils-2.32-7.5.1.aarch64",
"product_id": "binutils-2.32-7.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "binutils-devel-2.32-7.5.1.aarch64",
"product": {
"name": "binutils-devel-2.32-7.5.1.aarch64",
"product_id": "binutils-devel-2.32-7.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "binutils-gold-2.32-7.5.1.aarch64",
"product": {
"name": "binutils-gold-2.32-7.5.1.aarch64",
"product_id": "binutils-gold-2.32-7.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-arm-binutils-2.32-7.5.1.aarch64",
"product": {
"name": "cross-arm-binutils-2.32-7.5.1.aarch64",
"product_id": "cross-arm-binutils-2.32-7.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-avr-binutils-2.32-7.5.1.aarch64",
"product": {
"name": "cross-avr-binutils-2.32-7.5.1.aarch64",
"product_id": "cross-avr-binutils-2.32-7.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-epiphany-binutils-2.32-7.5.1.aarch64",
"product": {
"name": "cross-epiphany-binutils-2.32-7.5.1.aarch64",
"product_id": "cross-epiphany-binutils-2.32-7.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-hppa-binutils-2.32-7.5.1.aarch64",
"product": {
"name": "cross-hppa-binutils-2.32-7.5.1.aarch64",
"product_id": "cross-hppa-binutils-2.32-7.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-hppa64-binutils-2.32-7.5.1.aarch64",
"product": {
"name": "cross-hppa64-binutils-2.32-7.5.1.aarch64",
"product_id": "cross-hppa64-binutils-2.32-7.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-i386-binutils-2.32-7.5.1.aarch64",
"product": {
"name": "cross-i386-binutils-2.32-7.5.1.aarch64",
"product_id": "cross-i386-binutils-2.32-7.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-ia64-binutils-2.32-7.5.1.aarch64",
"product": {
"name": "cross-ia64-binutils-2.32-7.5.1.aarch64",
"product_id": "cross-ia64-binutils-2.32-7.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-m68k-binutils-2.32-7.5.1.aarch64",
"product": {
"name": "cross-m68k-binutils-2.32-7.5.1.aarch64",
"product_id": "cross-m68k-binutils-2.32-7.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-mips-binutils-2.32-7.5.1.aarch64",
"product": {
"name": "cross-mips-binutils-2.32-7.5.1.aarch64",
"product_id": "cross-mips-binutils-2.32-7.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-ppc-binutils-2.32-7.5.1.aarch64",
"product": {
"name": "cross-ppc-binutils-2.32-7.5.1.aarch64",
"product_id": "cross-ppc-binutils-2.32-7.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-ppc64-binutils-2.32-7.5.1.aarch64",
"product": {
"name": "cross-ppc64-binutils-2.32-7.5.1.aarch64",
"product_id": "cross-ppc64-binutils-2.32-7.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-ppc64le-binutils-2.32-7.5.1.aarch64",
"product": {
"name": "cross-ppc64le-binutils-2.32-7.5.1.aarch64",
"product_id": "cross-ppc64le-binutils-2.32-7.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-riscv64-binutils-2.32-7.5.1.aarch64",
"product": {
"name": "cross-riscv64-binutils-2.32-7.5.1.aarch64",
"product_id": "cross-riscv64-binutils-2.32-7.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-rx-binutils-2.32-7.5.1.aarch64",
"product": {
"name": "cross-rx-binutils-2.32-7.5.1.aarch64",
"product_id": "cross-rx-binutils-2.32-7.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-s390-binutils-2.32-7.5.1.aarch64",
"product": {
"name": "cross-s390-binutils-2.32-7.5.1.aarch64",
"product_id": "cross-s390-binutils-2.32-7.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-s390x-binutils-2.32-7.5.1.aarch64",
"product": {
"name": "cross-s390x-binutils-2.32-7.5.1.aarch64",
"product_id": "cross-s390x-binutils-2.32-7.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-sparc-binutils-2.32-7.5.1.aarch64",
"product": {
"name": "cross-sparc-binutils-2.32-7.5.1.aarch64",
"product_id": "cross-sparc-binutils-2.32-7.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-sparc64-binutils-2.32-7.5.1.aarch64",
"product": {
"name": "cross-sparc64-binutils-2.32-7.5.1.aarch64",
"product_id": "cross-sparc64-binutils-2.32-7.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-spu-binutils-2.32-7.5.1.aarch64",
"product": {
"name": "cross-spu-binutils-2.32-7.5.1.aarch64",
"product_id": "cross-spu-binutils-2.32-7.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-x86_64-binutils-2.32-7.5.1.aarch64",
"product": {
"name": "cross-x86_64-binutils-2.32-7.5.1.aarch64",
"product_id": "cross-x86_64-binutils-2.32-7.5.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-devel-64bit-2.32-7.5.1.aarch64_ilp32",
"product": {
"name": "binutils-devel-64bit-2.32-7.5.1.aarch64_ilp32",
"product_id": "binutils-devel-64bit-2.32-7.5.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-2.32-7.5.1.i586",
"product": {
"name": "binutils-2.32-7.5.1.i586",
"product_id": "binutils-2.32-7.5.1.i586"
}
},
{
"category": "product_version",
"name": "binutils-devel-2.32-7.5.1.i586",
"product": {
"name": "binutils-devel-2.32-7.5.1.i586",
"product_id": "binutils-devel-2.32-7.5.1.i586"
}
},
{
"category": "product_version",
"name": "binutils-gold-2.32-7.5.1.i586",
"product": {
"name": "binutils-gold-2.32-7.5.1.i586",
"product_id": "binutils-gold-2.32-7.5.1.i586"
}
},
{
"category": "product_version",
"name": "cross-aarch64-binutils-2.32-7.5.1.i586",
"product": {
"name": "cross-aarch64-binutils-2.32-7.5.1.i586",
"product_id": "cross-aarch64-binutils-2.32-7.5.1.i586"
}
},
{
"category": "product_version",
"name": "cross-arm-binutils-2.32-7.5.1.i586",
"product": {
"name": "cross-arm-binutils-2.32-7.5.1.i586",
"product_id": "cross-arm-binutils-2.32-7.5.1.i586"
}
},
{
"category": "product_version",
"name": "cross-avr-binutils-2.32-7.5.1.i586",
"product": {
"name": "cross-avr-binutils-2.32-7.5.1.i586",
"product_id": "cross-avr-binutils-2.32-7.5.1.i586"
}
},
{
"category": "product_version",
"name": "cross-epiphany-binutils-2.32-7.5.1.i586",
"product": {
"name": "cross-epiphany-binutils-2.32-7.5.1.i586",
"product_id": "cross-epiphany-binutils-2.32-7.5.1.i586"
}
},
{
"category": "product_version",
"name": "cross-hppa-binutils-2.32-7.5.1.i586",
"product": {
"name": "cross-hppa-binutils-2.32-7.5.1.i586",
"product_id": "cross-hppa-binutils-2.32-7.5.1.i586"
}
},
{
"category": "product_version",
"name": "cross-hppa64-binutils-2.32-7.5.1.i586",
"product": {
"name": "cross-hppa64-binutils-2.32-7.5.1.i586",
"product_id": "cross-hppa64-binutils-2.32-7.5.1.i586"
}
},
{
"category": "product_version",
"name": "cross-ia64-binutils-2.32-7.5.1.i586",
"product": {
"name": "cross-ia64-binutils-2.32-7.5.1.i586",
"product_id": "cross-ia64-binutils-2.32-7.5.1.i586"
}
},
{
"category": "product_version",
"name": "cross-m68k-binutils-2.32-7.5.1.i586",
"product": {
"name": "cross-m68k-binutils-2.32-7.5.1.i586",
"product_id": "cross-m68k-binutils-2.32-7.5.1.i586"
}
},
{
"category": "product_version",
"name": "cross-mips-binutils-2.32-7.5.1.i586",
"product": {
"name": "cross-mips-binutils-2.32-7.5.1.i586",
"product_id": "cross-mips-binutils-2.32-7.5.1.i586"
}
},
{
"category": "product_version",
"name": "cross-ppc-binutils-2.32-7.5.1.i586",
"product": {
"name": "cross-ppc-binutils-2.32-7.5.1.i586",
"product_id": "cross-ppc-binutils-2.32-7.5.1.i586"
}
},
{
"category": "product_version",
"name": "cross-ppc64-binutils-2.32-7.5.1.i586",
"product": {
"name": "cross-ppc64-binutils-2.32-7.5.1.i586",
"product_id": "cross-ppc64-binutils-2.32-7.5.1.i586"
}
},
{
"category": "product_version",
"name": "cross-ppc64le-binutils-2.32-7.5.1.i586",
"product": {
"name": "cross-ppc64le-binutils-2.32-7.5.1.i586",
"product_id": "cross-ppc64le-binutils-2.32-7.5.1.i586"
}
},
{
"category": "product_version",
"name": "cross-riscv64-binutils-2.32-7.5.1.i586",
"product": {
"name": "cross-riscv64-binutils-2.32-7.5.1.i586",
"product_id": "cross-riscv64-binutils-2.32-7.5.1.i586"
}
},
{
"category": "product_version",
"name": "cross-rx-binutils-2.32-7.5.1.i586",
"product": {
"name": "cross-rx-binutils-2.32-7.5.1.i586",
"product_id": "cross-rx-binutils-2.32-7.5.1.i586"
}
},
{
"category": "product_version",
"name": "cross-s390-binutils-2.32-7.5.1.i586",
"product": {
"name": "cross-s390-binutils-2.32-7.5.1.i586",
"product_id": "cross-s390-binutils-2.32-7.5.1.i586"
}
},
{
"category": "product_version",
"name": "cross-s390x-binutils-2.32-7.5.1.i586",
"product": {
"name": "cross-s390x-binutils-2.32-7.5.1.i586",
"product_id": "cross-s390x-binutils-2.32-7.5.1.i586"
}
},
{
"category": "product_version",
"name": "cross-sparc-binutils-2.32-7.5.1.i586",
"product": {
"name": "cross-sparc-binutils-2.32-7.5.1.i586",
"product_id": "cross-sparc-binutils-2.32-7.5.1.i586"
}
},
{
"category": "product_version",
"name": "cross-sparc64-binutils-2.32-7.5.1.i586",
"product": {
"name": "cross-sparc64-binutils-2.32-7.5.1.i586",
"product_id": "cross-sparc64-binutils-2.32-7.5.1.i586"
}
},
{
"category": "product_version",
"name": "cross-spu-binutils-2.32-7.5.1.i586",
"product": {
"name": "cross-spu-binutils-2.32-7.5.1.i586",
"product_id": "cross-spu-binutils-2.32-7.5.1.i586"
}
},
{
"category": "product_version",
"name": "cross-x86_64-binutils-2.32-7.5.1.i586",
"product": {
"name": "cross-x86_64-binutils-2.32-7.5.1.i586",
"product_id": "cross-x86_64-binutils-2.32-7.5.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-2.32-7.5.1.ppc64le",
"product": {
"name": "binutils-2.32-7.5.1.ppc64le",
"product_id": "binutils-2.32-7.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "binutils-devel-2.32-7.5.1.ppc64le",
"product": {
"name": "binutils-devel-2.32-7.5.1.ppc64le",
"product_id": "binutils-devel-2.32-7.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "binutils-gold-2.32-7.5.1.ppc64le",
"product": {
"name": "binutils-gold-2.32-7.5.1.ppc64le",
"product_id": "binutils-gold-2.32-7.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-aarch64-binutils-2.32-7.5.1.ppc64le",
"product": {
"name": "cross-aarch64-binutils-2.32-7.5.1.ppc64le",
"product_id": "cross-aarch64-binutils-2.32-7.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-arm-binutils-2.32-7.5.1.ppc64le",
"product": {
"name": "cross-arm-binutils-2.32-7.5.1.ppc64le",
"product_id": "cross-arm-binutils-2.32-7.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-avr-binutils-2.32-7.5.1.ppc64le",
"product": {
"name": "cross-avr-binutils-2.32-7.5.1.ppc64le",
"product_id": "cross-avr-binutils-2.32-7.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-epiphany-binutils-2.32-7.5.1.ppc64le",
"product": {
"name": "cross-epiphany-binutils-2.32-7.5.1.ppc64le",
"product_id": "cross-epiphany-binutils-2.32-7.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-hppa-binutils-2.32-7.5.1.ppc64le",
"product": {
"name": "cross-hppa-binutils-2.32-7.5.1.ppc64le",
"product_id": "cross-hppa-binutils-2.32-7.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-hppa64-binutils-2.32-7.5.1.ppc64le",
"product": {
"name": "cross-hppa64-binutils-2.32-7.5.1.ppc64le",
"product_id": "cross-hppa64-binutils-2.32-7.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-i386-binutils-2.32-7.5.1.ppc64le",
"product": {
"name": "cross-i386-binutils-2.32-7.5.1.ppc64le",
"product_id": "cross-i386-binutils-2.32-7.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-ia64-binutils-2.32-7.5.1.ppc64le",
"product": {
"name": "cross-ia64-binutils-2.32-7.5.1.ppc64le",
"product_id": "cross-ia64-binutils-2.32-7.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-m68k-binutils-2.32-7.5.1.ppc64le",
"product": {
"name": "cross-m68k-binutils-2.32-7.5.1.ppc64le",
"product_id": "cross-m68k-binutils-2.32-7.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-mips-binutils-2.32-7.5.1.ppc64le",
"product": {
"name": "cross-mips-binutils-2.32-7.5.1.ppc64le",
"product_id": "cross-mips-binutils-2.32-7.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-ppc-binutils-2.32-7.5.1.ppc64le",
"product": {
"name": "cross-ppc-binutils-2.32-7.5.1.ppc64le",
"product_id": "cross-ppc-binutils-2.32-7.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-ppc64-binutils-2.32-7.5.1.ppc64le",
"product": {
"name": "cross-ppc64-binutils-2.32-7.5.1.ppc64le",
"product_id": "cross-ppc64-binutils-2.32-7.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-riscv64-binutils-2.32-7.5.1.ppc64le",
"product": {
"name": "cross-riscv64-binutils-2.32-7.5.1.ppc64le",
"product_id": "cross-riscv64-binutils-2.32-7.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-rx-binutils-2.32-7.5.1.ppc64le",
"product": {
"name": "cross-rx-binutils-2.32-7.5.1.ppc64le",
"product_id": "cross-rx-binutils-2.32-7.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-s390-binutils-2.32-7.5.1.ppc64le",
"product": {
"name": "cross-s390-binutils-2.32-7.5.1.ppc64le",
"product_id": "cross-s390-binutils-2.32-7.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-s390x-binutils-2.32-7.5.1.ppc64le",
"product": {
"name": "cross-s390x-binutils-2.32-7.5.1.ppc64le",
"product_id": "cross-s390x-binutils-2.32-7.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-sparc-binutils-2.32-7.5.1.ppc64le",
"product": {
"name": "cross-sparc-binutils-2.32-7.5.1.ppc64le",
"product_id": "cross-sparc-binutils-2.32-7.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-sparc64-binutils-2.32-7.5.1.ppc64le",
"product": {
"name": "cross-sparc64-binutils-2.32-7.5.1.ppc64le",
"product_id": "cross-sparc64-binutils-2.32-7.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-spu-binutils-2.32-7.5.1.ppc64le",
"product": {
"name": "cross-spu-binutils-2.32-7.5.1.ppc64le",
"product_id": "cross-spu-binutils-2.32-7.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-x86_64-binutils-2.32-7.5.1.ppc64le",
"product": {
"name": "cross-x86_64-binutils-2.32-7.5.1.ppc64le",
"product_id": "cross-x86_64-binutils-2.32-7.5.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-2.32-7.5.1.s390x",
"product": {
"name": "binutils-2.32-7.5.1.s390x",
"product_id": "binutils-2.32-7.5.1.s390x"
}
},
{
"category": "product_version",
"name": "binutils-devel-2.32-7.5.1.s390x",
"product": {
"name": "binutils-devel-2.32-7.5.1.s390x",
"product_id": "binutils-devel-2.32-7.5.1.s390x"
}
},
{
"category": "product_version",
"name": "binutils-gold-2.32-7.5.1.s390x",
"product": {
"name": "binutils-gold-2.32-7.5.1.s390x",
"product_id": "binutils-gold-2.32-7.5.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-aarch64-binutils-2.32-7.5.1.s390x",
"product": {
"name": "cross-aarch64-binutils-2.32-7.5.1.s390x",
"product_id": "cross-aarch64-binutils-2.32-7.5.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-arm-binutils-2.32-7.5.1.s390x",
"product": {
"name": "cross-arm-binutils-2.32-7.5.1.s390x",
"product_id": "cross-arm-binutils-2.32-7.5.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-avr-binutils-2.32-7.5.1.s390x",
"product": {
"name": "cross-avr-binutils-2.32-7.5.1.s390x",
"product_id": "cross-avr-binutils-2.32-7.5.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-epiphany-binutils-2.32-7.5.1.s390x",
"product": {
"name": "cross-epiphany-binutils-2.32-7.5.1.s390x",
"product_id": "cross-epiphany-binutils-2.32-7.5.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-hppa-binutils-2.32-7.5.1.s390x",
"product": {
"name": "cross-hppa-binutils-2.32-7.5.1.s390x",
"product_id": "cross-hppa-binutils-2.32-7.5.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-hppa64-binutils-2.32-7.5.1.s390x",
"product": {
"name": "cross-hppa64-binutils-2.32-7.5.1.s390x",
"product_id": "cross-hppa64-binutils-2.32-7.5.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-i386-binutils-2.32-7.5.1.s390x",
"product": {
"name": "cross-i386-binutils-2.32-7.5.1.s390x",
"product_id": "cross-i386-binutils-2.32-7.5.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-ia64-binutils-2.32-7.5.1.s390x",
"product": {
"name": "cross-ia64-binutils-2.32-7.5.1.s390x",
"product_id": "cross-ia64-binutils-2.32-7.5.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-m68k-binutils-2.32-7.5.1.s390x",
"product": {
"name": "cross-m68k-binutils-2.32-7.5.1.s390x",
"product_id": "cross-m68k-binutils-2.32-7.5.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-mips-binutils-2.32-7.5.1.s390x",
"product": {
"name": "cross-mips-binutils-2.32-7.5.1.s390x",
"product_id": "cross-mips-binutils-2.32-7.5.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-ppc-binutils-2.32-7.5.1.s390x",
"product": {
"name": "cross-ppc-binutils-2.32-7.5.1.s390x",
"product_id": "cross-ppc-binutils-2.32-7.5.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-ppc64-binutils-2.32-7.5.1.s390x",
"product": {
"name": "cross-ppc64-binutils-2.32-7.5.1.s390x",
"product_id": "cross-ppc64-binutils-2.32-7.5.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-ppc64le-binutils-2.32-7.5.1.s390x",
"product": {
"name": "cross-ppc64le-binutils-2.32-7.5.1.s390x",
"product_id": "cross-ppc64le-binutils-2.32-7.5.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-riscv64-binutils-2.32-7.5.1.s390x",
"product": {
"name": "cross-riscv64-binutils-2.32-7.5.1.s390x",
"product_id": "cross-riscv64-binutils-2.32-7.5.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-rx-binutils-2.32-7.5.1.s390x",
"product": {
"name": "cross-rx-binutils-2.32-7.5.1.s390x",
"product_id": "cross-rx-binutils-2.32-7.5.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-s390-binutils-2.32-7.5.1.s390x",
"product": {
"name": "cross-s390-binutils-2.32-7.5.1.s390x",
"product_id": "cross-s390-binutils-2.32-7.5.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-sparc-binutils-2.32-7.5.1.s390x",
"product": {
"name": "cross-sparc-binutils-2.32-7.5.1.s390x",
"product_id": "cross-sparc-binutils-2.32-7.5.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-sparc64-binutils-2.32-7.5.1.s390x",
"product": {
"name": "cross-sparc64-binutils-2.32-7.5.1.s390x",
"product_id": "cross-sparc64-binutils-2.32-7.5.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-spu-binutils-2.32-7.5.1.s390x",
"product": {
"name": "cross-spu-binutils-2.32-7.5.1.s390x",
"product_id": "cross-spu-binutils-2.32-7.5.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-x86_64-binutils-2.32-7.5.1.s390x",
"product": {
"name": "cross-x86_64-binutils-2.32-7.5.1.s390x",
"product_id": "cross-x86_64-binutils-2.32-7.5.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-2.32-7.5.1.x86_64",
"product": {
"name": "binutils-2.32-7.5.1.x86_64",
"product_id": "binutils-2.32-7.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "binutils-devel-2.32-7.5.1.x86_64",
"product": {
"name": "binutils-devel-2.32-7.5.1.x86_64",
"product_id": "binutils-devel-2.32-7.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "binutils-devel-32bit-2.32-7.5.1.x86_64",
"product": {
"name": "binutils-devel-32bit-2.32-7.5.1.x86_64",
"product_id": "binutils-devel-32bit-2.32-7.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "binutils-gold-2.32-7.5.1.x86_64",
"product": {
"name": "binutils-gold-2.32-7.5.1.x86_64",
"product_id": "binutils-gold-2.32-7.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-aarch64-binutils-2.32-7.5.1.x86_64",
"product": {
"name": "cross-aarch64-binutils-2.32-7.5.1.x86_64",
"product_id": "cross-aarch64-binutils-2.32-7.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-arm-binutils-2.32-7.5.1.x86_64",
"product": {
"name": "cross-arm-binutils-2.32-7.5.1.x86_64",
"product_id": "cross-arm-binutils-2.32-7.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-avr-binutils-2.32-7.5.1.x86_64",
"product": {
"name": "cross-avr-binutils-2.32-7.5.1.x86_64",
"product_id": "cross-avr-binutils-2.32-7.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-epiphany-binutils-2.32-7.5.1.x86_64",
"product": {
"name": "cross-epiphany-binutils-2.32-7.5.1.x86_64",
"product_id": "cross-epiphany-binutils-2.32-7.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-hppa-binutils-2.32-7.5.1.x86_64",
"product": {
"name": "cross-hppa-binutils-2.32-7.5.1.x86_64",
"product_id": "cross-hppa-binutils-2.32-7.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-hppa64-binutils-2.32-7.5.1.x86_64",
"product": {
"name": "cross-hppa64-binutils-2.32-7.5.1.x86_64",
"product_id": "cross-hppa64-binutils-2.32-7.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-i386-binutils-2.32-7.5.1.x86_64",
"product": {
"name": "cross-i386-binutils-2.32-7.5.1.x86_64",
"product_id": "cross-i386-binutils-2.32-7.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-ia64-binutils-2.32-7.5.1.x86_64",
"product": {
"name": "cross-ia64-binutils-2.32-7.5.1.x86_64",
"product_id": "cross-ia64-binutils-2.32-7.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-m68k-binutils-2.32-7.5.1.x86_64",
"product": {
"name": "cross-m68k-binutils-2.32-7.5.1.x86_64",
"product_id": "cross-m68k-binutils-2.32-7.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-mips-binutils-2.32-7.5.1.x86_64",
"product": {
"name": "cross-mips-binutils-2.32-7.5.1.x86_64",
"product_id": "cross-mips-binutils-2.32-7.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-ppc-binutils-2.32-7.5.1.x86_64",
"product": {
"name": "cross-ppc-binutils-2.32-7.5.1.x86_64",
"product_id": "cross-ppc-binutils-2.32-7.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-ppc64-binutils-2.32-7.5.1.x86_64",
"product": {
"name": "cross-ppc64-binutils-2.32-7.5.1.x86_64",
"product_id": "cross-ppc64-binutils-2.32-7.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-ppc64le-binutils-2.32-7.5.1.x86_64",
"product": {
"name": "cross-ppc64le-binutils-2.32-7.5.1.x86_64",
"product_id": "cross-ppc64le-binutils-2.32-7.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-riscv64-binutils-2.32-7.5.1.x86_64",
"product": {
"name": "cross-riscv64-binutils-2.32-7.5.1.x86_64",
"product_id": "cross-riscv64-binutils-2.32-7.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-rx-binutils-2.32-7.5.1.x86_64",
"product": {
"name": "cross-rx-binutils-2.32-7.5.1.x86_64",
"product_id": "cross-rx-binutils-2.32-7.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-s390-binutils-2.32-7.5.1.x86_64",
"product": {
"name": "cross-s390-binutils-2.32-7.5.1.x86_64",
"product_id": "cross-s390-binutils-2.32-7.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-s390x-binutils-2.32-7.5.1.x86_64",
"product": {
"name": "cross-s390x-binutils-2.32-7.5.1.x86_64",
"product_id": "cross-s390x-binutils-2.32-7.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-sparc-binutils-2.32-7.5.1.x86_64",
"product": {
"name": "cross-sparc-binutils-2.32-7.5.1.x86_64",
"product_id": "cross-sparc-binutils-2.32-7.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-sparc64-binutils-2.32-7.5.1.x86_64",
"product": {
"name": "cross-sparc64-binutils-2.32-7.5.1.x86_64",
"product_id": "cross-sparc64-binutils-2.32-7.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-spu-binutils-2.32-7.5.1.x86_64",
"product": {
"name": "cross-spu-binutils-2.32-7.5.1.x86_64",
"product_id": "cross-spu-binutils-2.32-7.5.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:packagehub:15:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-7.5.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64"
},
"product_reference": "binutils-2.32-7.5.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-7.5.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le"
},
"product_reference": "binutils-2.32-7.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-7.5.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x"
},
"product_reference": "binutils-2.32-7.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-7.5.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64"
},
"product_reference": "binutils-2.32-7.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.32-7.5.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64"
},
"product_reference": "binutils-devel-2.32-7.5.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.32-7.5.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le"
},
"product_reference": "binutils-devel-2.32-7.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.32-7.5.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x"
},
"product_reference": "binutils-devel-2.32-7.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.32-7.5.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64"
},
"product_reference": "binutils-devel-2.32-7.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-32bit-2.32-7.5.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64"
},
"product_reference": "binutils-devel-32bit-2.32-7.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-gold-2.32-7.5.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64"
},
"product_reference": "binutils-gold-2.32-7.5.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-gold-2.32-7.5.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le"
},
"product_reference": "binutils-gold-2.32-7.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-gold-2.32-7.5.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x"
},
"product_reference": "binutils-gold-2.32-7.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-gold-2.32-7.5.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
},
"product_reference": "binutils-gold-2.32-7.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-1000876",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000876"
}
],
"notes": [
{
"category": "general",
"text": "binutils version 2.32 and earlier contains a Integer Overflow vulnerability in objdump, bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc that can result in Integer overflow trigger heap overflow. Successful exploitation allows execution of arbitrary code.. This attack appear to be exploitable via Local. This vulnerability appears to have been fixed in after commit 3a551c7a1b80fca579461774860574eabfd7f18f.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000876",
"url": "https://www.suse.com/security/cve/CVE-2018-1000876"
},
{
"category": "external",
"summary": "SUSE Bug 1120640 for CVE-2018-1000876",
"url": "https://bugzilla.suse.com/1120640"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-24T14:57:52Z",
"details": "moderate"
}
],
"title": "CVE-2018-1000876"
},
{
"cve": "CVE-2018-17358",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-17358"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory access exists in _bfd_stab_section_find_nearest_line in syms.c. Attackers could leverage this vulnerability to cause a denial of service (application crash) via a crafted ELF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-17358",
"url": "https://www.suse.com/security/cve/CVE-2018-17358"
},
{
"category": "external",
"summary": "SUSE Bug 1109412 for CVE-2018-17358",
"url": "https://bugzilla.suse.com/1109412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-24T14:57:52Z",
"details": "low"
}
],
"title": "CVE-2018-17358"
},
{
"cve": "CVE-2018-17359",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-17359"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory access exists in bfd_zalloc in opncls.c. Attackers could leverage this vulnerability to cause a denial of service (application crash) via a crafted ELF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-17359",
"url": "https://www.suse.com/security/cve/CVE-2018-17359"
},
{
"category": "external",
"summary": "SUSE Bug 1109413 for CVE-2018-17359",
"url": "https://bugzilla.suse.com/1109413"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-24T14:57:52Z",
"details": "low"
}
],
"title": "CVE-2018-17359"
},
{
"cve": "CVE-2018-17360",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-17360"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. a heap-based buffer over-read in bfd_getl32 in libbfd.c allows an attacker to cause a denial of service through a crafted PE file. This vulnerability can be triggered by the executable objdump.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-17360",
"url": "https://www.suse.com/security/cve/CVE-2018-17360"
},
{
"category": "external",
"summary": "SUSE Bug 1109414 for CVE-2018-17360",
"url": "https://bugzilla.suse.com/1109414"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-24T14:57:52Z",
"details": "low"
}
],
"title": "CVE-2018-17360"
},
{
"cve": "CVE-2018-17985",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-17985"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. There is a stack consumption problem caused by the cplus_demangle_type function making recursive calls to itself in certain scenarios involving many \u0027P\u0027 characters.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-17985",
"url": "https://www.suse.com/security/cve/CVE-2018-17985"
},
{
"category": "external",
"summary": "SUSE Bug 1116827 for CVE-2018-17985",
"url": "https://bugzilla.suse.com/1116827"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-24T14:57:52Z",
"details": "moderate"
}
],
"title": "CVE-2018-17985"
},
{
"cve": "CVE-2018-18309",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18309"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory address dereference was discovered in read_reloc in reloc.c. The vulnerability causes a segmentation fault and application crash, which leads to denial of service, as demonstrated by objdump, because of missing _bfd_clear_contents bounds checking.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18309",
"url": "https://www.suse.com/security/cve/CVE-2018-18309"
},
{
"category": "external",
"summary": "SUSE Bug 1111996 for CVE-2018-18309",
"url": "https://bugzilla.suse.com/1111996"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-24T14:57:52Z",
"details": "low"
}
],
"title": "CVE-2018-18309"
},
{
"cve": "CVE-2018-18483",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18483"
}
],
"notes": [
{
"category": "general",
"text": "The get_count function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31, allows remote attackers to cause a denial of service (malloc called with the result of an integer-overflowing calculation) or possibly have unspecified other impact via a crafted string, as demonstrated by c++filt.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18483",
"url": "https://www.suse.com/security/cve/CVE-2018-18483"
},
{
"category": "external",
"summary": "SUSE Bug 1112535 for CVE-2018-18483",
"url": "https://bugzilla.suse.com/1112535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-24T14:57:52Z",
"details": "moderate"
}
],
"title": "CVE-2018-18483"
},
{
"cve": "CVE-2018-18484",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18484"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there is a stack consumption problem caused by recursive stack frames: cplus_demangle_type, d_bare_function_type, d_function_type.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18484",
"url": "https://www.suse.com/security/cve/CVE-2018-18484"
},
{
"category": "external",
"summary": "SUSE Bug 1112534 for CVE-2018-18484",
"url": "https://bugzilla.suse.com/1112534"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-24T14:57:52Z",
"details": "moderate"
}
],
"title": "CVE-2018-18484"
},
{
"cve": "CVE-2018-18605",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18605"
}
],
"notes": [
{
"category": "general",
"text": "A heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup in merge.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31, because _bfd_add_merge_section mishandles section merges when size is not a multiple of entsize. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18605",
"url": "https://www.suse.com/security/cve/CVE-2018-18605"
},
{
"category": "external",
"summary": "SUSE Bug 1113255 for CVE-2018-18605",
"url": "https://bugzilla.suse.com/1113255"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-24T14:57:52Z",
"details": "moderate"
}
],
"title": "CVE-2018-18605"
},
{
"cve": "CVE-2018-18606",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18606"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the merge_strings function in merge.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18606",
"url": "https://www.suse.com/security/cve/CVE-2018-18606"
},
{
"category": "external",
"summary": "SUSE Bug 1113252 for CVE-2018-18606",
"url": "https://bugzilla.suse.com/1113252"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-24T14:57:52Z",
"details": "low"
}
],
"title": "CVE-2018-18606"
},
{
"cve": "CVE-2018-18607",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18607"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in elf_link_input_bfd in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18607",
"url": "https://www.suse.com/security/cve/CVE-2018-18607"
},
{
"category": "external",
"summary": "SUSE Bug 1113247 for CVE-2018-18607",
"url": "https://bugzilla.suse.com/1113247"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-24T14:57:52Z",
"details": "low"
}
],
"title": "CVE-2018-18607"
},
{
"cve": "CVE-2018-19931",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-19931"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h because the number of program headers is not restricted.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-19931",
"url": "https://www.suse.com/security/cve/CVE-2018-19931"
},
{
"category": "external",
"summary": "SUSE Bug 1118830 for CVE-2018-19931",
"url": "https://bugzilla.suse.com/1118830"
},
{
"category": "external",
"summary": "SUSE Bug 1118831 for CVE-2018-19931",
"url": "https://bugzilla.suse.com/1118831"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-24T14:57:52Z",
"details": "low"
}
],
"title": "CVE-2018-19931"
},
{
"cve": "CVE-2018-19932",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-19932"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA macro in elf.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-19932",
"url": "https://www.suse.com/security/cve/CVE-2018-19932"
},
{
"category": "external",
"summary": "SUSE Bug 1118830 for CVE-2018-19932",
"url": "https://bugzilla.suse.com/1118830"
},
{
"category": "external",
"summary": "SUSE Bug 1118831 for CVE-2018-19932",
"url": "https://bugzilla.suse.com/1118831"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-24T14:57:52Z",
"details": "low"
}
],
"title": "CVE-2018-19932"
},
{
"cve": "CVE-2018-20623",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20623"
}
],
"notes": [
{
"category": "general",
"text": "In GNU Binutils 2.31.1, there is a use-after-free in the error function in elfcomm.c when called from the process_archive function in readelf.c via a crafted ELF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20623",
"url": "https://www.suse.com/security/cve/CVE-2018-20623"
},
{
"category": "external",
"summary": "SUSE Bug 1121035 for CVE-2018-20623",
"url": "https://bugzilla.suse.com/1121035"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-24T14:57:52Z",
"details": "moderate"
}
],
"title": "CVE-2018-20623"
},
{
"cve": "CVE-2018-20651",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20651"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference was discovered in elf_link_add_object_symbols in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31.1. This occurs for a crafted ET_DYN with no program headers. A specially crafted ELF file allows remote attackers to cause a denial of service, as demonstrated by ld.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20651",
"url": "https://www.suse.com/security/cve/CVE-2018-20651"
},
{
"category": "external",
"summary": "SUSE Bug 1121034 for CVE-2018-20651",
"url": "https://bugzilla.suse.com/1121034"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-24T14:57:52Z",
"details": "low"
}
],
"title": "CVE-2018-20651"
},
{
"cve": "CVE-2018-20671",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20671"
}
],
"notes": [
{
"category": "general",
"text": "load_specific_debug_section in objdump.c in GNU Binutils through 2.31.1 contains an integer overflow vulnerability that can trigger a heap-based buffer overflow via a crafted section size.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20671",
"url": "https://www.suse.com/security/cve/CVE-2018-20671"
},
{
"category": "external",
"summary": "SUSE Bug 1121056 for CVE-2018-20671",
"url": "https://bugzilla.suse.com/1121056"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-24T14:57:52Z",
"details": "low"
}
],
"title": "CVE-2018-20671"
},
{
"cve": "CVE-2018-6323",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-6323"
}
],
"notes": [
{
"category": "general",
"text": "The elf_object_p function in elfcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, has an unsigned integer overflow because bfd_size_type multiplication is not used. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-6323",
"url": "https://www.suse.com/security/cve/CVE-2018-6323"
},
{
"category": "external",
"summary": "SUSE Bug 1077745 for CVE-2018-6323",
"url": "https://bugzilla.suse.com/1077745"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-24T14:57:52Z",
"details": "low"
}
],
"title": "CVE-2018-6323"
},
{
"cve": "CVE-2018-6543",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-6543"
}
],
"notes": [
{
"category": "general",
"text": "In GNU Binutils 2.30, there\u0027s an integer overflow in the function load_specific_debug_section() in objdump.c, which results in `malloc()` with 0 size. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-6543",
"url": "https://www.suse.com/security/cve/CVE-2018-6543"
},
{
"category": "external",
"summary": "SUSE Bug 1079103 for CVE-2018-6543",
"url": "https://bugzilla.suse.com/1079103"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-24T14:57:52Z",
"details": "moderate"
}
],
"title": "CVE-2018-6543"
},
{
"cve": "CVE-2018-6759",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-6759"
}
],
"notes": [
{
"category": "general",
"text": "The bfd_get_debug_link_info_1 function in opncls.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, has an unchecked strnlen operation. Remote attackers could leverage this vulnerability to cause a denial of service (segmentation fault) via a crafted ELF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-6759",
"url": "https://www.suse.com/security/cve/CVE-2018-6759"
},
{
"category": "external",
"summary": "SUSE Bug 1079741 for CVE-2018-6759",
"url": "https://bugzilla.suse.com/1079741"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-24T14:57:52Z",
"details": "moderate"
}
],
"title": "CVE-2018-6759"
},
{
"cve": "CVE-2018-6872",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-6872"
}
],
"notes": [
{
"category": "general",
"text": "The elf_parse_notes function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (out-of-bounds read and segmentation violation) via a note with a large alignment.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-6872",
"url": "https://www.suse.com/security/cve/CVE-2018-6872"
},
{
"category": "external",
"summary": "SUSE Bug 1080556 for CVE-2018-6872",
"url": "https://bugzilla.suse.com/1080556"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-24T14:57:52Z",
"details": "moderate"
}
],
"title": "CVE-2018-6872"
},
{
"cve": "CVE-2018-7208",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7208"
}
],
"notes": [
{
"category": "general",
"text": "In the coff_pointerize_aux function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, an index is not validated, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted file, as demonstrated by objcopy of a COFF object.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7208",
"url": "https://www.suse.com/security/cve/CVE-2018-7208"
},
{
"category": "external",
"summary": "SUSE Bug 1081527 for CVE-2018-7208",
"url": "https://bugzilla.suse.com/1081527"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-24T14:57:52Z",
"details": "low"
}
],
"title": "CVE-2018-7208"
},
{
"cve": "CVE-2018-7568",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7568"
}
],
"notes": [
{
"category": "general",
"text": "The parse_die function in dwarf1.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer overflow and application crash) via an ELF file with corrupt dwarf1 debug information, as demonstrated by nm.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7568",
"url": "https://www.suse.com/security/cve/CVE-2018-7568"
},
{
"category": "external",
"summary": "SUSE Bug 1086788 for CVE-2018-7568",
"url": "https://bugzilla.suse.com/1086788"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-24T14:57:52Z",
"details": "low"
}
],
"title": "CVE-2018-7568"
},
{
"cve": "CVE-2018-7569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7569"
}
],
"notes": [
{
"category": "general",
"text": "dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer underflow or overflow, and application crash) via an ELF file with a corrupt DWARF FORM block, as demonstrated by nm.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7569",
"url": "https://www.suse.com/security/cve/CVE-2018-7569"
},
{
"category": "external",
"summary": "SUSE Bug 1083532 for CVE-2018-7569",
"url": "https://bugzilla.suse.com/1083532"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-24T14:57:52Z",
"details": "low"
}
],
"title": "CVE-2018-7569"
},
{
"cve": "CVE-2018-7570",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7570"
}
],
"notes": [
{
"category": "general",
"text": "The assign_file_positions_for_non_load_sections function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an ELF file with a RELRO segment that lacks a matching LOAD segment, as demonstrated by objcopy.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7570",
"url": "https://www.suse.com/security/cve/CVE-2018-7570"
},
{
"category": "external",
"summary": "SUSE Bug 1083528 for CVE-2018-7570",
"url": "https://bugzilla.suse.com/1083528"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-24T14:57:52Z",
"details": "low"
}
],
"title": "CVE-2018-7570"
},
{
"cve": "CVE-2018-7642",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7642"
}
],
"notes": [
{
"category": "general",
"text": "The swap_std_reloc_in function in aoutx.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (aout_32_swap_std_reloc_out NULL pointer dereference and application crash) via a crafted ELF file, as demonstrated by objcopy.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7642",
"url": "https://www.suse.com/security/cve/CVE-2018-7642"
},
{
"category": "external",
"summary": "SUSE Bug 1086786 for CVE-2018-7642",
"url": "https://bugzilla.suse.com/1086786"
},
{
"category": "external",
"summary": "SUSE Bug 1128518 for CVE-2018-7642",
"url": "https://bugzilla.suse.com/1128518"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-24T14:57:52Z",
"details": "low"
}
],
"title": "CVE-2018-7642"
},
{
"cve": "CVE-2018-7643",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7643"
}
],
"notes": [
{
"category": "general",
"text": "The display_debug_ranges function in dwarf.c in GNU Binutils 2.30 allows remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, as demonstrated by objdump.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7643",
"url": "https://www.suse.com/security/cve/CVE-2018-7643"
},
{
"category": "external",
"summary": "SUSE Bug 1086784 for CVE-2018-7643",
"url": "https://bugzilla.suse.com/1086784"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-24T14:57:52Z",
"details": "moderate"
}
],
"title": "CVE-2018-7643"
},
{
"cve": "CVE-2018-8945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-8945"
}
],
"notes": [
{
"category": "general",
"text": "The bfd_section_from_shdr function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (segmentation fault) via a large attribute section.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-8945",
"url": "https://www.suse.com/security/cve/CVE-2018-8945"
},
{
"category": "external",
"summary": "SUSE Bug 1086608 for CVE-2018-8945",
"url": "https://bugzilla.suse.com/1086608"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-24T14:57:52Z",
"details": "low"
}
],
"title": "CVE-2018-8945"
},
{
"cve": "CVE-2019-1010180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-1010180"
}
],
"notes": [
{
"category": "general",
"text": "GNU gdb All versions is affected by: Buffer Overflow - Out of bound memory access. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. The component is: The main gdb module. The attack vector is: Open an ELF for debugging. The fixed version is: Not fixed yet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-1010180",
"url": "https://www.suse.com/security/cve/CVE-2019-1010180"
},
{
"category": "external",
"summary": "SUSE Bug 1142772 for CVE-2019-1010180",
"url": "https://bugzilla.suse.com/1142772"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-24T14:57:52Z",
"details": "important"
}
],
"title": "CVE-2019-1010180"
}
]
}
suse-su-2019:2780-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for binutils",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for binutils fixes the following issues:\n\nbinutils was updated to current 2.32 branch [jsc#ECO-368].\n\nIncludes following security fixes:\n\n- CVE-2018-17358: Fixed invalid memory access in _bfd_stab_section_find_nearest_line in syms.c (bsc#1109412)\n- CVE-2018-17359: Fixed invalid memory access exists in bfd_zalloc in opncls.c (bsc#1109413)\n- CVE-2018-17360: Fixed heap-based buffer over-read in bfd_getl32 in libbfd.c (bsc#1109414)\n- CVE-2018-17985: Fixed a stack consumption problem caused by the cplus_demangle_type (bsc#1116827)\n- CVE-2018-18309: Fixed an invalid memory address dereference was discovered in read_reloc in reloc.c (bsc#1111996)\n- CVE-2018-18483: Fixed get_count function provided by libiberty that allowed attackers to cause a denial of service or other unspecified impact (bsc#1112535)\n- CVE-2018-18484: Fixed stack exhaustion in the C++ demangling functions provided by libiberty, caused by recursive stack frames (bsc#1112534)\n- CVE-2018-18605: Fixed a heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup causing a denial of service (bsc#1113255)\n- CVE-2018-18606: Fixed a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments, causing denial of service (bsc#1113252)\n- CVE-2018-18607: Fixed a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section, causing denial of service (bsc#1113247)\n- CVE-2018-19931: Fixed a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h (bsc#1118831)\n- CVE-2018-19932: Fixed an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA (bsc#1118830)\n- CVE-2018-20623: Fixed a use-after-free in the error function in elfcomm.c (bsc#1121035)\n- CVE-2018-20651: Fixed a denial of service via a NULL pointer dereference in elf_link_add_object_symbols in elflink.c (bsc#1121034)\n- CVE-2018-20671: Fixed an integer overflow that can trigger a heap-based buffer overflow in load_specific_debug_section in objdump.c (bsc#1121056)\n- CVE-2018-1000876: Fixed integer overflow in bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc in objdump (bsc#1120640)\n- CVE-2019-1010180: Fixed an out of bound memory access that could lead to crashes (bsc#1142772)\n\n- enable xtensa architecture (Tensilica lc6 and related)\n- Use -ffat-lto-objects in order to provide assembly for static libs\n (bsc#1141913).\n- Fixed some LTO build issues (bsc#1133131 bsc#1133232).\n- riscv: Don\u0027t check ABI flags if no code section\n- Fixed a segfault in ld when building some versions of pacemaker (bsc#1154025, bsc#1154016).\n- Add avr, epiphany and rx to target_list so that the common binutils can handle all objects we can create with crosses (bsc#1152590).\n\nUpdate to binutils 2.32:\n\n* The binutils now support for the C-SKY processor series.\n* The x86 assembler now supports a -mvexwig=[0|1] option to control\n encoding of VEX.W-ignored (WIG) VEX instructions.\n It also has a new -mx86-used-note=[yes|no] option to generate (or\n not) x86 GNU property notes. \n* The MIPS assembler now supports the Loongson EXTensions R2 (EXT2),\n the Loongson EXTensions (EXT) instructions, the Loongson Content\n Address Memory (CAM) ASE and the Loongson MultiMedia extensions\n Instructions (MMI) ASE.\n* The addr2line, c++filt, nm and objdump tools now have a default\n limit on the maximum amount of recursion that is allowed whilst\n demangling strings. This limit can be disabled if necessary.\n* Objdump\u0027s --disassemble option can now take a parameter,\n specifying the starting symbol for disassembly. Disassembly will\n continue from this symbol up to the next symbol or the end of the\n function.\n* The BFD linker will now report property change in linker map file\n when merging GNU properties.\n* The BFD linker\u0027s -t option now doesn\u0027t report members within\n archives, unless -t is given twice. This makes it more useful\n when generating a list of files that should be packaged for a\n linker bug report.\n* The GOLD linker has improved warning messages for relocations that\n refer to discarded sections.\n\n- Improve relro support on s390 [fate#326356]\n- Fix broken debug symbols (bsc#1118644)\n- Handle ELF compressed header alignment correctly.\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-2780,SUSE-SLE-Module-Basesystem-15-2019-2780,SUSE-SLE-Module-Development-Tools-15-2019-2780,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2780,SUSE-SLE-Module-Packagehub-Subpackages-15-2019-2780",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2780-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:2780-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:2780-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html"
},
{
"category": "self",
"summary": "SUSE Bug 1109412",
"url": "https://bugzilla.suse.com/1109412"
},
{
"category": "self",
"summary": "SUSE Bug 1109413",
"url": "https://bugzilla.suse.com/1109413"
},
{
"category": "self",
"summary": "SUSE Bug 1109414",
"url": "https://bugzilla.suse.com/1109414"
},
{
"category": "self",
"summary": "SUSE Bug 1111996",
"url": "https://bugzilla.suse.com/1111996"
},
{
"category": "self",
"summary": "SUSE Bug 1112534",
"url": "https://bugzilla.suse.com/1112534"
},
{
"category": "self",
"summary": "SUSE Bug 1112535",
"url": "https://bugzilla.suse.com/1112535"
},
{
"category": "self",
"summary": "SUSE Bug 1113247",
"url": "https://bugzilla.suse.com/1113247"
},
{
"category": "self",
"summary": "SUSE Bug 1113252",
"url": "https://bugzilla.suse.com/1113252"
},
{
"category": "self",
"summary": "SUSE Bug 1113255",
"url": "https://bugzilla.suse.com/1113255"
},
{
"category": "self",
"summary": "SUSE Bug 1116827",
"url": "https://bugzilla.suse.com/1116827"
},
{
"category": "self",
"summary": "SUSE Bug 1118644",
"url": "https://bugzilla.suse.com/1118644"
},
{
"category": "self",
"summary": "SUSE Bug 1118830",
"url": "https://bugzilla.suse.com/1118830"
},
{
"category": "self",
"summary": "SUSE Bug 1118831",
"url": "https://bugzilla.suse.com/1118831"
},
{
"category": "self",
"summary": "SUSE Bug 1120640",
"url": "https://bugzilla.suse.com/1120640"
},
{
"category": "self",
"summary": "SUSE Bug 1121034",
"url": "https://bugzilla.suse.com/1121034"
},
{
"category": "self",
"summary": "SUSE Bug 1121035",
"url": "https://bugzilla.suse.com/1121035"
},
{
"category": "self",
"summary": "SUSE Bug 1121056",
"url": "https://bugzilla.suse.com/1121056"
},
{
"category": "self",
"summary": "SUSE Bug 1133131",
"url": "https://bugzilla.suse.com/1133131"
},
{
"category": "self",
"summary": "SUSE Bug 1133232",
"url": "https://bugzilla.suse.com/1133232"
},
{
"category": "self",
"summary": "SUSE Bug 1141913",
"url": "https://bugzilla.suse.com/1141913"
},
{
"category": "self",
"summary": "SUSE Bug 1142772",
"url": "https://bugzilla.suse.com/1142772"
},
{
"category": "self",
"summary": "SUSE Bug 1152590",
"url": "https://bugzilla.suse.com/1152590"
},
{
"category": "self",
"summary": "SUSE Bug 1154016",
"url": "https://bugzilla.suse.com/1154016"
},
{
"category": "self",
"summary": "SUSE Bug 1154025",
"url": "https://bugzilla.suse.com/1154025"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000876 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000876/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-17358 page",
"url": "https://www.suse.com/security/cve/CVE-2018-17358/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-17359 page",
"url": "https://www.suse.com/security/cve/CVE-2018-17359/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-17360 page",
"url": "https://www.suse.com/security/cve/CVE-2018-17360/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-17985 page",
"url": "https://www.suse.com/security/cve/CVE-2018-17985/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18309 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18309/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18483 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18483/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18484 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18484/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18605 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18605/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18606 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18606/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18607 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18607/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-19931 page",
"url": "https://www.suse.com/security/cve/CVE-2018-19931/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-19932 page",
"url": "https://www.suse.com/security/cve/CVE-2018-19932/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20623 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20623/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20651 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20651/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20671 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20671/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-6323 page",
"url": "https://www.suse.com/security/cve/CVE-2018-6323/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-6543 page",
"url": "https://www.suse.com/security/cve/CVE-2018-6543/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-6759 page",
"url": "https://www.suse.com/security/cve/CVE-2018-6759/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-6872 page",
"url": "https://www.suse.com/security/cve/CVE-2018-6872/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7208 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7208/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7568 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7568/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7569 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7570 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7570/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7642 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7642/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7643 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7643/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-8945 page",
"url": "https://www.suse.com/security/cve/CVE-2018-8945/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-1010180 page",
"url": "https://www.suse.com/security/cve/CVE-2019-1010180/"
},
{
"category": "self",
"summary": "SUSE Bug ECO-368",
"url": "https://bugzilla.suse.com/ECO-368"
},
{
"category": "self",
"summary": "SUSE Bug SLE-6206",
"url": "https://bugzilla.suse.com/SLE-6206"
}
],
"title": "Security update for binutils",
"tracking": {
"current_release_date": "2019-10-25T12:25:52Z",
"generator": {
"date": "2019-10-25T12:25:52Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:2780-1",
"initial_release_date": "2019-10-25T12:25:52Z",
"revision_history": [
{
"date": "2019-10-25T12:25:52Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "binutils-2.32-6.8.1.aarch64",
"product": {
"name": "binutils-2.32-6.8.1.aarch64",
"product_id": "binutils-2.32-6.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "binutils-devel-2.32-6.8.1.aarch64",
"product": {
"name": "binutils-devel-2.32-6.8.1.aarch64",
"product_id": "binutils-devel-2.32-6.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "binutils-gold-2.32-6.8.1.aarch64",
"product": {
"name": "binutils-gold-2.32-6.8.1.aarch64",
"product_id": "binutils-gold-2.32-6.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-arm-binutils-2.32-6.8.1.aarch64",
"product": {
"name": "cross-arm-binutils-2.32-6.8.1.aarch64",
"product_id": "cross-arm-binutils-2.32-6.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-avr-binutils-2.32-6.8.1.aarch64",
"product": {
"name": "cross-avr-binutils-2.32-6.8.1.aarch64",
"product_id": "cross-avr-binutils-2.32-6.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-epiphany-binutils-2.32-6.8.1.aarch64",
"product": {
"name": "cross-epiphany-binutils-2.32-6.8.1.aarch64",
"product_id": "cross-epiphany-binutils-2.32-6.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-hppa-binutils-2.32-6.8.1.aarch64",
"product": {
"name": "cross-hppa-binutils-2.32-6.8.1.aarch64",
"product_id": "cross-hppa-binutils-2.32-6.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-hppa64-binutils-2.32-6.8.1.aarch64",
"product": {
"name": "cross-hppa64-binutils-2.32-6.8.1.aarch64",
"product_id": "cross-hppa64-binutils-2.32-6.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-i386-binutils-2.32-6.8.1.aarch64",
"product": {
"name": "cross-i386-binutils-2.32-6.8.1.aarch64",
"product_id": "cross-i386-binutils-2.32-6.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-ia64-binutils-2.32-6.8.1.aarch64",
"product": {
"name": "cross-ia64-binutils-2.32-6.8.1.aarch64",
"product_id": "cross-ia64-binutils-2.32-6.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-m68k-binutils-2.32-6.8.1.aarch64",
"product": {
"name": "cross-m68k-binutils-2.32-6.8.1.aarch64",
"product_id": "cross-m68k-binutils-2.32-6.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-mips-binutils-2.32-6.8.1.aarch64",
"product": {
"name": "cross-mips-binutils-2.32-6.8.1.aarch64",
"product_id": "cross-mips-binutils-2.32-6.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-ppc-binutils-2.32-6.8.1.aarch64",
"product": {
"name": "cross-ppc-binutils-2.32-6.8.1.aarch64",
"product_id": "cross-ppc-binutils-2.32-6.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-ppc64-binutils-2.32-6.8.1.aarch64",
"product": {
"name": "cross-ppc64-binutils-2.32-6.8.1.aarch64",
"product_id": "cross-ppc64-binutils-2.32-6.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-ppc64le-binutils-2.32-6.8.1.aarch64",
"product": {
"name": "cross-ppc64le-binutils-2.32-6.8.1.aarch64",
"product_id": "cross-ppc64le-binutils-2.32-6.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-riscv64-binutils-2.32-6.8.1.aarch64",
"product": {
"name": "cross-riscv64-binutils-2.32-6.8.1.aarch64",
"product_id": "cross-riscv64-binutils-2.32-6.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-rx-binutils-2.32-6.8.1.aarch64",
"product": {
"name": "cross-rx-binutils-2.32-6.8.1.aarch64",
"product_id": "cross-rx-binutils-2.32-6.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-s390-binutils-2.32-6.8.1.aarch64",
"product": {
"name": "cross-s390-binutils-2.32-6.8.1.aarch64",
"product_id": "cross-s390-binutils-2.32-6.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-s390x-binutils-2.32-6.8.1.aarch64",
"product": {
"name": "cross-s390x-binutils-2.32-6.8.1.aarch64",
"product_id": "cross-s390x-binutils-2.32-6.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-sparc-binutils-2.32-6.8.1.aarch64",
"product": {
"name": "cross-sparc-binutils-2.32-6.8.1.aarch64",
"product_id": "cross-sparc-binutils-2.32-6.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-sparc64-binutils-2.32-6.8.1.aarch64",
"product": {
"name": "cross-sparc64-binutils-2.32-6.8.1.aarch64",
"product_id": "cross-sparc64-binutils-2.32-6.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-spu-binutils-2.32-6.8.1.aarch64",
"product": {
"name": "cross-spu-binutils-2.32-6.8.1.aarch64",
"product_id": "cross-spu-binutils-2.32-6.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-x86_64-binutils-2.32-6.8.1.aarch64",
"product": {
"name": "cross-x86_64-binutils-2.32-6.8.1.aarch64",
"product_id": "cross-x86_64-binutils-2.32-6.8.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-devel-64bit-2.32-6.8.1.aarch64_ilp32",
"product": {
"name": "binutils-devel-64bit-2.32-6.8.1.aarch64_ilp32",
"product_id": "binutils-devel-64bit-2.32-6.8.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-2.32-6.8.1.i586",
"product": {
"name": "binutils-2.32-6.8.1.i586",
"product_id": "binutils-2.32-6.8.1.i586"
}
},
{
"category": "product_version",
"name": "binutils-devel-2.32-6.8.1.i586",
"product": {
"name": "binutils-devel-2.32-6.8.1.i586",
"product_id": "binutils-devel-2.32-6.8.1.i586"
}
},
{
"category": "product_version",
"name": "binutils-gold-2.32-6.8.1.i586",
"product": {
"name": "binutils-gold-2.32-6.8.1.i586",
"product_id": "binutils-gold-2.32-6.8.1.i586"
}
},
{
"category": "product_version",
"name": "cross-aarch64-binutils-2.32-6.8.1.i586",
"product": {
"name": "cross-aarch64-binutils-2.32-6.8.1.i586",
"product_id": "cross-aarch64-binutils-2.32-6.8.1.i586"
}
},
{
"category": "product_version",
"name": "cross-arm-binutils-2.32-6.8.1.i586",
"product": {
"name": "cross-arm-binutils-2.32-6.8.1.i586",
"product_id": "cross-arm-binutils-2.32-6.8.1.i586"
}
},
{
"category": "product_version",
"name": "cross-avr-binutils-2.32-6.8.1.i586",
"product": {
"name": "cross-avr-binutils-2.32-6.8.1.i586",
"product_id": "cross-avr-binutils-2.32-6.8.1.i586"
}
},
{
"category": "product_version",
"name": "cross-epiphany-binutils-2.32-6.8.1.i586",
"product": {
"name": "cross-epiphany-binutils-2.32-6.8.1.i586",
"product_id": "cross-epiphany-binutils-2.32-6.8.1.i586"
}
},
{
"category": "product_version",
"name": "cross-hppa-binutils-2.32-6.8.1.i586",
"product": {
"name": "cross-hppa-binutils-2.32-6.8.1.i586",
"product_id": "cross-hppa-binutils-2.32-6.8.1.i586"
}
},
{
"category": "product_version",
"name": "cross-hppa64-binutils-2.32-6.8.1.i586",
"product": {
"name": "cross-hppa64-binutils-2.32-6.8.1.i586",
"product_id": "cross-hppa64-binutils-2.32-6.8.1.i586"
}
},
{
"category": "product_version",
"name": "cross-ia64-binutils-2.32-6.8.1.i586",
"product": {
"name": "cross-ia64-binutils-2.32-6.8.1.i586",
"product_id": "cross-ia64-binutils-2.32-6.8.1.i586"
}
},
{
"category": "product_version",
"name": "cross-m68k-binutils-2.32-6.8.1.i586",
"product": {
"name": "cross-m68k-binutils-2.32-6.8.1.i586",
"product_id": "cross-m68k-binutils-2.32-6.8.1.i586"
}
},
{
"category": "product_version",
"name": "cross-mips-binutils-2.32-6.8.1.i586",
"product": {
"name": "cross-mips-binutils-2.32-6.8.1.i586",
"product_id": "cross-mips-binutils-2.32-6.8.1.i586"
}
},
{
"category": "product_version",
"name": "cross-ppc-binutils-2.32-6.8.1.i586",
"product": {
"name": "cross-ppc-binutils-2.32-6.8.1.i586",
"product_id": "cross-ppc-binutils-2.32-6.8.1.i586"
}
},
{
"category": "product_version",
"name": "cross-ppc64-binutils-2.32-6.8.1.i586",
"product": {
"name": "cross-ppc64-binutils-2.32-6.8.1.i586",
"product_id": "cross-ppc64-binutils-2.32-6.8.1.i586"
}
},
{
"category": "product_version",
"name": "cross-ppc64le-binutils-2.32-6.8.1.i586",
"product": {
"name": "cross-ppc64le-binutils-2.32-6.8.1.i586",
"product_id": "cross-ppc64le-binutils-2.32-6.8.1.i586"
}
},
{
"category": "product_version",
"name": "cross-riscv64-binutils-2.32-6.8.1.i586",
"product": {
"name": "cross-riscv64-binutils-2.32-6.8.1.i586",
"product_id": "cross-riscv64-binutils-2.32-6.8.1.i586"
}
},
{
"category": "product_version",
"name": "cross-rx-binutils-2.32-6.8.1.i586",
"product": {
"name": "cross-rx-binutils-2.32-6.8.1.i586",
"product_id": "cross-rx-binutils-2.32-6.8.1.i586"
}
},
{
"category": "product_version",
"name": "cross-s390-binutils-2.32-6.8.1.i586",
"product": {
"name": "cross-s390-binutils-2.32-6.8.1.i586",
"product_id": "cross-s390-binutils-2.32-6.8.1.i586"
}
},
{
"category": "product_version",
"name": "cross-s390x-binutils-2.32-6.8.1.i586",
"product": {
"name": "cross-s390x-binutils-2.32-6.8.1.i586",
"product_id": "cross-s390x-binutils-2.32-6.8.1.i586"
}
},
{
"category": "product_version",
"name": "cross-sparc-binutils-2.32-6.8.1.i586",
"product": {
"name": "cross-sparc-binutils-2.32-6.8.1.i586",
"product_id": "cross-sparc-binutils-2.32-6.8.1.i586"
}
},
{
"category": "product_version",
"name": "cross-sparc64-binutils-2.32-6.8.1.i586",
"product": {
"name": "cross-sparc64-binutils-2.32-6.8.1.i586",
"product_id": "cross-sparc64-binutils-2.32-6.8.1.i586"
}
},
{
"category": "product_version",
"name": "cross-spu-binutils-2.32-6.8.1.i586",
"product": {
"name": "cross-spu-binutils-2.32-6.8.1.i586",
"product_id": "cross-spu-binutils-2.32-6.8.1.i586"
}
},
{
"category": "product_version",
"name": "cross-x86_64-binutils-2.32-6.8.1.i586",
"product": {
"name": "cross-x86_64-binutils-2.32-6.8.1.i586",
"product_id": "cross-x86_64-binutils-2.32-6.8.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-2.32-6.8.1.ppc64le",
"product": {
"name": "binutils-2.32-6.8.1.ppc64le",
"product_id": "binutils-2.32-6.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "binutils-devel-2.32-6.8.1.ppc64le",
"product": {
"name": "binutils-devel-2.32-6.8.1.ppc64le",
"product_id": "binutils-devel-2.32-6.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "binutils-gold-2.32-6.8.1.ppc64le",
"product": {
"name": "binutils-gold-2.32-6.8.1.ppc64le",
"product_id": "binutils-gold-2.32-6.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-aarch64-binutils-2.32-6.8.1.ppc64le",
"product": {
"name": "cross-aarch64-binutils-2.32-6.8.1.ppc64le",
"product_id": "cross-aarch64-binutils-2.32-6.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-arm-binutils-2.32-6.8.1.ppc64le",
"product": {
"name": "cross-arm-binutils-2.32-6.8.1.ppc64le",
"product_id": "cross-arm-binutils-2.32-6.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-avr-binutils-2.32-6.8.1.ppc64le",
"product": {
"name": "cross-avr-binutils-2.32-6.8.1.ppc64le",
"product_id": "cross-avr-binutils-2.32-6.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-epiphany-binutils-2.32-6.8.1.ppc64le",
"product": {
"name": "cross-epiphany-binutils-2.32-6.8.1.ppc64le",
"product_id": "cross-epiphany-binutils-2.32-6.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-hppa-binutils-2.32-6.8.1.ppc64le",
"product": {
"name": "cross-hppa-binutils-2.32-6.8.1.ppc64le",
"product_id": "cross-hppa-binutils-2.32-6.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-hppa64-binutils-2.32-6.8.1.ppc64le",
"product": {
"name": "cross-hppa64-binutils-2.32-6.8.1.ppc64le",
"product_id": "cross-hppa64-binutils-2.32-6.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-i386-binutils-2.32-6.8.1.ppc64le",
"product": {
"name": "cross-i386-binutils-2.32-6.8.1.ppc64le",
"product_id": "cross-i386-binutils-2.32-6.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-ia64-binutils-2.32-6.8.1.ppc64le",
"product": {
"name": "cross-ia64-binutils-2.32-6.8.1.ppc64le",
"product_id": "cross-ia64-binutils-2.32-6.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-m68k-binutils-2.32-6.8.1.ppc64le",
"product": {
"name": "cross-m68k-binutils-2.32-6.8.1.ppc64le",
"product_id": "cross-m68k-binutils-2.32-6.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-mips-binutils-2.32-6.8.1.ppc64le",
"product": {
"name": "cross-mips-binutils-2.32-6.8.1.ppc64le",
"product_id": "cross-mips-binutils-2.32-6.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-ppc-binutils-2.32-6.8.1.ppc64le",
"product": {
"name": "cross-ppc-binutils-2.32-6.8.1.ppc64le",
"product_id": "cross-ppc-binutils-2.32-6.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-ppc64-binutils-2.32-6.8.1.ppc64le",
"product": {
"name": "cross-ppc64-binutils-2.32-6.8.1.ppc64le",
"product_id": "cross-ppc64-binutils-2.32-6.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-riscv64-binutils-2.32-6.8.1.ppc64le",
"product": {
"name": "cross-riscv64-binutils-2.32-6.8.1.ppc64le",
"product_id": "cross-riscv64-binutils-2.32-6.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-rx-binutils-2.32-6.8.1.ppc64le",
"product": {
"name": "cross-rx-binutils-2.32-6.8.1.ppc64le",
"product_id": "cross-rx-binutils-2.32-6.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-s390-binutils-2.32-6.8.1.ppc64le",
"product": {
"name": "cross-s390-binutils-2.32-6.8.1.ppc64le",
"product_id": "cross-s390-binutils-2.32-6.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-s390x-binutils-2.32-6.8.1.ppc64le",
"product": {
"name": "cross-s390x-binutils-2.32-6.8.1.ppc64le",
"product_id": "cross-s390x-binutils-2.32-6.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-sparc-binutils-2.32-6.8.1.ppc64le",
"product": {
"name": "cross-sparc-binutils-2.32-6.8.1.ppc64le",
"product_id": "cross-sparc-binutils-2.32-6.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-sparc64-binutils-2.32-6.8.1.ppc64le",
"product": {
"name": "cross-sparc64-binutils-2.32-6.8.1.ppc64le",
"product_id": "cross-sparc64-binutils-2.32-6.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-spu-binutils-2.32-6.8.1.ppc64le",
"product": {
"name": "cross-spu-binutils-2.32-6.8.1.ppc64le",
"product_id": "cross-spu-binutils-2.32-6.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-x86_64-binutils-2.32-6.8.1.ppc64le",
"product": {
"name": "cross-x86_64-binutils-2.32-6.8.1.ppc64le",
"product_id": "cross-x86_64-binutils-2.32-6.8.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-2.32-6.8.1.s390x",
"product": {
"name": "binutils-2.32-6.8.1.s390x",
"product_id": "binutils-2.32-6.8.1.s390x"
}
},
{
"category": "product_version",
"name": "binutils-devel-2.32-6.8.1.s390x",
"product": {
"name": "binutils-devel-2.32-6.8.1.s390x",
"product_id": "binutils-devel-2.32-6.8.1.s390x"
}
},
{
"category": "product_version",
"name": "binutils-gold-2.32-6.8.1.s390x",
"product": {
"name": "binutils-gold-2.32-6.8.1.s390x",
"product_id": "binutils-gold-2.32-6.8.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-aarch64-binutils-2.32-6.8.1.s390x",
"product": {
"name": "cross-aarch64-binutils-2.32-6.8.1.s390x",
"product_id": "cross-aarch64-binutils-2.32-6.8.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-arm-binutils-2.32-6.8.1.s390x",
"product": {
"name": "cross-arm-binutils-2.32-6.8.1.s390x",
"product_id": "cross-arm-binutils-2.32-6.8.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-avr-binutils-2.32-6.8.1.s390x",
"product": {
"name": "cross-avr-binutils-2.32-6.8.1.s390x",
"product_id": "cross-avr-binutils-2.32-6.8.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-epiphany-binutils-2.32-6.8.1.s390x",
"product": {
"name": "cross-epiphany-binutils-2.32-6.8.1.s390x",
"product_id": "cross-epiphany-binutils-2.32-6.8.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-hppa-binutils-2.32-6.8.1.s390x",
"product": {
"name": "cross-hppa-binutils-2.32-6.8.1.s390x",
"product_id": "cross-hppa-binutils-2.32-6.8.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-hppa64-binutils-2.32-6.8.1.s390x",
"product": {
"name": "cross-hppa64-binutils-2.32-6.8.1.s390x",
"product_id": "cross-hppa64-binutils-2.32-6.8.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-i386-binutils-2.32-6.8.1.s390x",
"product": {
"name": "cross-i386-binutils-2.32-6.8.1.s390x",
"product_id": "cross-i386-binutils-2.32-6.8.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-ia64-binutils-2.32-6.8.1.s390x",
"product": {
"name": "cross-ia64-binutils-2.32-6.8.1.s390x",
"product_id": "cross-ia64-binutils-2.32-6.8.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-m68k-binutils-2.32-6.8.1.s390x",
"product": {
"name": "cross-m68k-binutils-2.32-6.8.1.s390x",
"product_id": "cross-m68k-binutils-2.32-6.8.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-mips-binutils-2.32-6.8.1.s390x",
"product": {
"name": "cross-mips-binutils-2.32-6.8.1.s390x",
"product_id": "cross-mips-binutils-2.32-6.8.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-ppc-binutils-2.32-6.8.1.s390x",
"product": {
"name": "cross-ppc-binutils-2.32-6.8.1.s390x",
"product_id": "cross-ppc-binutils-2.32-6.8.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-ppc64-binutils-2.32-6.8.1.s390x",
"product": {
"name": "cross-ppc64-binutils-2.32-6.8.1.s390x",
"product_id": "cross-ppc64-binutils-2.32-6.8.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-ppc64le-binutils-2.32-6.8.1.s390x",
"product": {
"name": "cross-ppc64le-binutils-2.32-6.8.1.s390x",
"product_id": "cross-ppc64le-binutils-2.32-6.8.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-riscv64-binutils-2.32-6.8.1.s390x",
"product": {
"name": "cross-riscv64-binutils-2.32-6.8.1.s390x",
"product_id": "cross-riscv64-binutils-2.32-6.8.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-rx-binutils-2.32-6.8.1.s390x",
"product": {
"name": "cross-rx-binutils-2.32-6.8.1.s390x",
"product_id": "cross-rx-binutils-2.32-6.8.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-s390-binutils-2.32-6.8.1.s390x",
"product": {
"name": "cross-s390-binutils-2.32-6.8.1.s390x",
"product_id": "cross-s390-binutils-2.32-6.8.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-sparc-binutils-2.32-6.8.1.s390x",
"product": {
"name": "cross-sparc-binutils-2.32-6.8.1.s390x",
"product_id": "cross-sparc-binutils-2.32-6.8.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-sparc64-binutils-2.32-6.8.1.s390x",
"product": {
"name": "cross-sparc64-binutils-2.32-6.8.1.s390x",
"product_id": "cross-sparc64-binutils-2.32-6.8.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-spu-binutils-2.32-6.8.1.s390x",
"product": {
"name": "cross-spu-binutils-2.32-6.8.1.s390x",
"product_id": "cross-spu-binutils-2.32-6.8.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-x86_64-binutils-2.32-6.8.1.s390x",
"product": {
"name": "cross-x86_64-binutils-2.32-6.8.1.s390x",
"product_id": "cross-x86_64-binutils-2.32-6.8.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-2.32-6.8.1.x86_64",
"product": {
"name": "binutils-2.32-6.8.1.x86_64",
"product_id": "binutils-2.32-6.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "binutils-devel-2.32-6.8.1.x86_64",
"product": {
"name": "binutils-devel-2.32-6.8.1.x86_64",
"product_id": "binutils-devel-2.32-6.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "binutils-devel-32bit-2.32-6.8.1.x86_64",
"product": {
"name": "binutils-devel-32bit-2.32-6.8.1.x86_64",
"product_id": "binutils-devel-32bit-2.32-6.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "binutils-gold-2.32-6.8.1.x86_64",
"product": {
"name": "binutils-gold-2.32-6.8.1.x86_64",
"product_id": "binutils-gold-2.32-6.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-aarch64-binutils-2.32-6.8.1.x86_64",
"product": {
"name": "cross-aarch64-binutils-2.32-6.8.1.x86_64",
"product_id": "cross-aarch64-binutils-2.32-6.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-arm-binutils-2.32-6.8.1.x86_64",
"product": {
"name": "cross-arm-binutils-2.32-6.8.1.x86_64",
"product_id": "cross-arm-binutils-2.32-6.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-avr-binutils-2.32-6.8.1.x86_64",
"product": {
"name": "cross-avr-binutils-2.32-6.8.1.x86_64",
"product_id": "cross-avr-binutils-2.32-6.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-epiphany-binutils-2.32-6.8.1.x86_64",
"product": {
"name": "cross-epiphany-binutils-2.32-6.8.1.x86_64",
"product_id": "cross-epiphany-binutils-2.32-6.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-hppa-binutils-2.32-6.8.1.x86_64",
"product": {
"name": "cross-hppa-binutils-2.32-6.8.1.x86_64",
"product_id": "cross-hppa-binutils-2.32-6.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-hppa64-binutils-2.32-6.8.1.x86_64",
"product": {
"name": "cross-hppa64-binutils-2.32-6.8.1.x86_64",
"product_id": "cross-hppa64-binutils-2.32-6.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-i386-binutils-2.32-6.8.1.x86_64",
"product": {
"name": "cross-i386-binutils-2.32-6.8.1.x86_64",
"product_id": "cross-i386-binutils-2.32-6.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-ia64-binutils-2.32-6.8.1.x86_64",
"product": {
"name": "cross-ia64-binutils-2.32-6.8.1.x86_64",
"product_id": "cross-ia64-binutils-2.32-6.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-m68k-binutils-2.32-6.8.1.x86_64",
"product": {
"name": "cross-m68k-binutils-2.32-6.8.1.x86_64",
"product_id": "cross-m68k-binutils-2.32-6.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-mips-binutils-2.32-6.8.1.x86_64",
"product": {
"name": "cross-mips-binutils-2.32-6.8.1.x86_64",
"product_id": "cross-mips-binutils-2.32-6.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-ppc-binutils-2.32-6.8.1.x86_64",
"product": {
"name": "cross-ppc-binutils-2.32-6.8.1.x86_64",
"product_id": "cross-ppc-binutils-2.32-6.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-ppc64-binutils-2.32-6.8.1.x86_64",
"product": {
"name": "cross-ppc64-binutils-2.32-6.8.1.x86_64",
"product_id": "cross-ppc64-binutils-2.32-6.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-ppc64le-binutils-2.32-6.8.1.x86_64",
"product": {
"name": "cross-ppc64le-binutils-2.32-6.8.1.x86_64",
"product_id": "cross-ppc64le-binutils-2.32-6.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-riscv64-binutils-2.32-6.8.1.x86_64",
"product": {
"name": "cross-riscv64-binutils-2.32-6.8.1.x86_64",
"product_id": "cross-riscv64-binutils-2.32-6.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-rx-binutils-2.32-6.8.1.x86_64",
"product": {
"name": "cross-rx-binutils-2.32-6.8.1.x86_64",
"product_id": "cross-rx-binutils-2.32-6.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-s390-binutils-2.32-6.8.1.x86_64",
"product": {
"name": "cross-s390-binutils-2.32-6.8.1.x86_64",
"product_id": "cross-s390-binutils-2.32-6.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-s390x-binutils-2.32-6.8.1.x86_64",
"product": {
"name": "cross-s390x-binutils-2.32-6.8.1.x86_64",
"product_id": "cross-s390x-binutils-2.32-6.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-sparc-binutils-2.32-6.8.1.x86_64",
"product": {
"name": "cross-sparc-binutils-2.32-6.8.1.x86_64",
"product_id": "cross-sparc-binutils-2.32-6.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-sparc64-binutils-2.32-6.8.1.x86_64",
"product": {
"name": "cross-sparc64-binutils-2.32-6.8.1.x86_64",
"product_id": "cross-sparc64-binutils-2.32-6.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-spu-binutils-2.32-6.8.1.x86_64",
"product": {
"name": "cross-spu-binutils-2.32-6.8.1.x86_64",
"product_id": "cross-spu-binutils-2.32-6.8.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Package Hub 15",
"product": {
"name": "SUSE Linux Enterprise Module for Package Hub 15",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:packagehub:15"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-6.8.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64"
},
"product_reference": "binutils-2.32-6.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-6.8.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le"
},
"product_reference": "binutils-2.32-6.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-6.8.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x"
},
"product_reference": "binutils-2.32-6.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-6.8.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64"
},
"product_reference": "binutils-2.32-6.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.32-6.8.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64"
},
"product_reference": "binutils-devel-2.32-6.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.32-6.8.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le"
},
"product_reference": "binutils-devel-2.32-6.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.32-6.8.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x"
},
"product_reference": "binutils-devel-2.32-6.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.32-6.8.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64"
},
"product_reference": "binutils-devel-2.32-6.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-32bit-2.32-6.8.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64"
},
"product_reference": "binutils-devel-32bit-2.32-6.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-gold-2.32-6.8.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64"
},
"product_reference": "binutils-gold-2.32-6.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-gold-2.32-6.8.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le"
},
"product_reference": "binutils-gold-2.32-6.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-gold-2.32-6.8.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x"
},
"product_reference": "binutils-gold-2.32-6.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-gold-2.32-6.8.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
},
"product_reference": "binutils-gold-2.32-6.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-1000876",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000876"
}
],
"notes": [
{
"category": "general",
"text": "binutils version 2.32 and earlier contains a Integer Overflow vulnerability in objdump, bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc that can result in Integer overflow trigger heap overflow. Successful exploitation allows execution of arbitrary code.. This attack appear to be exploitable via Local. This vulnerability appears to have been fixed in after commit 3a551c7a1b80fca579461774860574eabfd7f18f.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000876",
"url": "https://www.suse.com/security/cve/CVE-2018-1000876"
},
{
"category": "external",
"summary": "SUSE Bug 1120640 for CVE-2018-1000876",
"url": "https://bugzilla.suse.com/1120640"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-25T12:25:52Z",
"details": "moderate"
}
],
"title": "CVE-2018-1000876"
},
{
"cve": "CVE-2018-17358",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-17358"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory access exists in _bfd_stab_section_find_nearest_line in syms.c. Attackers could leverage this vulnerability to cause a denial of service (application crash) via a crafted ELF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-17358",
"url": "https://www.suse.com/security/cve/CVE-2018-17358"
},
{
"category": "external",
"summary": "SUSE Bug 1109412 for CVE-2018-17358",
"url": "https://bugzilla.suse.com/1109412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-25T12:25:52Z",
"details": "low"
}
],
"title": "CVE-2018-17358"
},
{
"cve": "CVE-2018-17359",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-17359"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory access exists in bfd_zalloc in opncls.c. Attackers could leverage this vulnerability to cause a denial of service (application crash) via a crafted ELF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-17359",
"url": "https://www.suse.com/security/cve/CVE-2018-17359"
},
{
"category": "external",
"summary": "SUSE Bug 1109413 for CVE-2018-17359",
"url": "https://bugzilla.suse.com/1109413"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-25T12:25:52Z",
"details": "low"
}
],
"title": "CVE-2018-17359"
},
{
"cve": "CVE-2018-17360",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-17360"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. a heap-based buffer over-read in bfd_getl32 in libbfd.c allows an attacker to cause a denial of service through a crafted PE file. This vulnerability can be triggered by the executable objdump.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-17360",
"url": "https://www.suse.com/security/cve/CVE-2018-17360"
},
{
"category": "external",
"summary": "SUSE Bug 1109414 for CVE-2018-17360",
"url": "https://bugzilla.suse.com/1109414"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-25T12:25:52Z",
"details": "low"
}
],
"title": "CVE-2018-17360"
},
{
"cve": "CVE-2018-17985",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-17985"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. There is a stack consumption problem caused by the cplus_demangle_type function making recursive calls to itself in certain scenarios involving many \u0027P\u0027 characters.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-17985",
"url": "https://www.suse.com/security/cve/CVE-2018-17985"
},
{
"category": "external",
"summary": "SUSE Bug 1116827 for CVE-2018-17985",
"url": "https://bugzilla.suse.com/1116827"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-25T12:25:52Z",
"details": "moderate"
}
],
"title": "CVE-2018-17985"
},
{
"cve": "CVE-2018-18309",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18309"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory address dereference was discovered in read_reloc in reloc.c. The vulnerability causes a segmentation fault and application crash, which leads to denial of service, as demonstrated by objdump, because of missing _bfd_clear_contents bounds checking.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18309",
"url": "https://www.suse.com/security/cve/CVE-2018-18309"
},
{
"category": "external",
"summary": "SUSE Bug 1111996 for CVE-2018-18309",
"url": "https://bugzilla.suse.com/1111996"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-25T12:25:52Z",
"details": "low"
}
],
"title": "CVE-2018-18309"
},
{
"cve": "CVE-2018-18483",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18483"
}
],
"notes": [
{
"category": "general",
"text": "The get_count function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31, allows remote attackers to cause a denial of service (malloc called with the result of an integer-overflowing calculation) or possibly have unspecified other impact via a crafted string, as demonstrated by c++filt.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18483",
"url": "https://www.suse.com/security/cve/CVE-2018-18483"
},
{
"category": "external",
"summary": "SUSE Bug 1112535 for CVE-2018-18483",
"url": "https://bugzilla.suse.com/1112535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-25T12:25:52Z",
"details": "moderate"
}
],
"title": "CVE-2018-18483"
},
{
"cve": "CVE-2018-18484",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18484"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there is a stack consumption problem caused by recursive stack frames: cplus_demangle_type, d_bare_function_type, d_function_type.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18484",
"url": "https://www.suse.com/security/cve/CVE-2018-18484"
},
{
"category": "external",
"summary": "SUSE Bug 1112534 for CVE-2018-18484",
"url": "https://bugzilla.suse.com/1112534"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-25T12:25:52Z",
"details": "moderate"
}
],
"title": "CVE-2018-18484"
},
{
"cve": "CVE-2018-18605",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18605"
}
],
"notes": [
{
"category": "general",
"text": "A heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup in merge.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31, because _bfd_add_merge_section mishandles section merges when size is not a multiple of entsize. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18605",
"url": "https://www.suse.com/security/cve/CVE-2018-18605"
},
{
"category": "external",
"summary": "SUSE Bug 1113255 for CVE-2018-18605",
"url": "https://bugzilla.suse.com/1113255"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-25T12:25:52Z",
"details": "moderate"
}
],
"title": "CVE-2018-18605"
},
{
"cve": "CVE-2018-18606",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18606"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the merge_strings function in merge.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18606",
"url": "https://www.suse.com/security/cve/CVE-2018-18606"
},
{
"category": "external",
"summary": "SUSE Bug 1113252 for CVE-2018-18606",
"url": "https://bugzilla.suse.com/1113252"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-25T12:25:52Z",
"details": "low"
}
],
"title": "CVE-2018-18606"
},
{
"cve": "CVE-2018-18607",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18607"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in elf_link_input_bfd in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18607",
"url": "https://www.suse.com/security/cve/CVE-2018-18607"
},
{
"category": "external",
"summary": "SUSE Bug 1113247 for CVE-2018-18607",
"url": "https://bugzilla.suse.com/1113247"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-25T12:25:52Z",
"details": "low"
}
],
"title": "CVE-2018-18607"
},
{
"cve": "CVE-2018-19931",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-19931"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h because the number of program headers is not restricted.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-19931",
"url": "https://www.suse.com/security/cve/CVE-2018-19931"
},
{
"category": "external",
"summary": "SUSE Bug 1118830 for CVE-2018-19931",
"url": "https://bugzilla.suse.com/1118830"
},
{
"category": "external",
"summary": "SUSE Bug 1118831 for CVE-2018-19931",
"url": "https://bugzilla.suse.com/1118831"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-25T12:25:52Z",
"details": "low"
}
],
"title": "CVE-2018-19931"
},
{
"cve": "CVE-2018-19932",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-19932"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA macro in elf.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-19932",
"url": "https://www.suse.com/security/cve/CVE-2018-19932"
},
{
"category": "external",
"summary": "SUSE Bug 1118830 for CVE-2018-19932",
"url": "https://bugzilla.suse.com/1118830"
},
{
"category": "external",
"summary": "SUSE Bug 1118831 for CVE-2018-19932",
"url": "https://bugzilla.suse.com/1118831"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-25T12:25:52Z",
"details": "low"
}
],
"title": "CVE-2018-19932"
},
{
"cve": "CVE-2018-20623",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20623"
}
],
"notes": [
{
"category": "general",
"text": "In GNU Binutils 2.31.1, there is a use-after-free in the error function in elfcomm.c when called from the process_archive function in readelf.c via a crafted ELF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20623",
"url": "https://www.suse.com/security/cve/CVE-2018-20623"
},
{
"category": "external",
"summary": "SUSE Bug 1121035 for CVE-2018-20623",
"url": "https://bugzilla.suse.com/1121035"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-25T12:25:52Z",
"details": "moderate"
}
],
"title": "CVE-2018-20623"
},
{
"cve": "CVE-2018-20651",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20651"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference was discovered in elf_link_add_object_symbols in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31.1. This occurs for a crafted ET_DYN with no program headers. A specially crafted ELF file allows remote attackers to cause a denial of service, as demonstrated by ld.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20651",
"url": "https://www.suse.com/security/cve/CVE-2018-20651"
},
{
"category": "external",
"summary": "SUSE Bug 1121034 for CVE-2018-20651",
"url": "https://bugzilla.suse.com/1121034"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-25T12:25:52Z",
"details": "low"
}
],
"title": "CVE-2018-20651"
},
{
"cve": "CVE-2018-20671",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20671"
}
],
"notes": [
{
"category": "general",
"text": "load_specific_debug_section in objdump.c in GNU Binutils through 2.31.1 contains an integer overflow vulnerability that can trigger a heap-based buffer overflow via a crafted section size.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20671",
"url": "https://www.suse.com/security/cve/CVE-2018-20671"
},
{
"category": "external",
"summary": "SUSE Bug 1121056 for CVE-2018-20671",
"url": "https://bugzilla.suse.com/1121056"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-25T12:25:52Z",
"details": "low"
}
],
"title": "CVE-2018-20671"
},
{
"cve": "CVE-2018-6323",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-6323"
}
],
"notes": [
{
"category": "general",
"text": "The elf_object_p function in elfcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, has an unsigned integer overflow because bfd_size_type multiplication is not used. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-6323",
"url": "https://www.suse.com/security/cve/CVE-2018-6323"
},
{
"category": "external",
"summary": "SUSE Bug 1077745 for CVE-2018-6323",
"url": "https://bugzilla.suse.com/1077745"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-25T12:25:52Z",
"details": "low"
}
],
"title": "CVE-2018-6323"
},
{
"cve": "CVE-2018-6543",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-6543"
}
],
"notes": [
{
"category": "general",
"text": "In GNU Binutils 2.30, there\u0027s an integer overflow in the function load_specific_debug_section() in objdump.c, which results in `malloc()` with 0 size. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-6543",
"url": "https://www.suse.com/security/cve/CVE-2018-6543"
},
{
"category": "external",
"summary": "SUSE Bug 1079103 for CVE-2018-6543",
"url": "https://bugzilla.suse.com/1079103"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-25T12:25:52Z",
"details": "moderate"
}
],
"title": "CVE-2018-6543"
},
{
"cve": "CVE-2018-6759",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-6759"
}
],
"notes": [
{
"category": "general",
"text": "The bfd_get_debug_link_info_1 function in opncls.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, has an unchecked strnlen operation. Remote attackers could leverage this vulnerability to cause a denial of service (segmentation fault) via a crafted ELF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-6759",
"url": "https://www.suse.com/security/cve/CVE-2018-6759"
},
{
"category": "external",
"summary": "SUSE Bug 1079741 for CVE-2018-6759",
"url": "https://bugzilla.suse.com/1079741"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-25T12:25:52Z",
"details": "moderate"
}
],
"title": "CVE-2018-6759"
},
{
"cve": "CVE-2018-6872",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-6872"
}
],
"notes": [
{
"category": "general",
"text": "The elf_parse_notes function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (out-of-bounds read and segmentation violation) via a note with a large alignment.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-6872",
"url": "https://www.suse.com/security/cve/CVE-2018-6872"
},
{
"category": "external",
"summary": "SUSE Bug 1080556 for CVE-2018-6872",
"url": "https://bugzilla.suse.com/1080556"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-25T12:25:52Z",
"details": "moderate"
}
],
"title": "CVE-2018-6872"
},
{
"cve": "CVE-2018-7208",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7208"
}
],
"notes": [
{
"category": "general",
"text": "In the coff_pointerize_aux function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, an index is not validated, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted file, as demonstrated by objcopy of a COFF object.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7208",
"url": "https://www.suse.com/security/cve/CVE-2018-7208"
},
{
"category": "external",
"summary": "SUSE Bug 1081527 for CVE-2018-7208",
"url": "https://bugzilla.suse.com/1081527"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-25T12:25:52Z",
"details": "low"
}
],
"title": "CVE-2018-7208"
},
{
"cve": "CVE-2018-7568",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7568"
}
],
"notes": [
{
"category": "general",
"text": "The parse_die function in dwarf1.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer overflow and application crash) via an ELF file with corrupt dwarf1 debug information, as demonstrated by nm.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7568",
"url": "https://www.suse.com/security/cve/CVE-2018-7568"
},
{
"category": "external",
"summary": "SUSE Bug 1086788 for CVE-2018-7568",
"url": "https://bugzilla.suse.com/1086788"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-25T12:25:52Z",
"details": "low"
}
],
"title": "CVE-2018-7568"
},
{
"cve": "CVE-2018-7569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7569"
}
],
"notes": [
{
"category": "general",
"text": "dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer underflow or overflow, and application crash) via an ELF file with a corrupt DWARF FORM block, as demonstrated by nm.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7569",
"url": "https://www.suse.com/security/cve/CVE-2018-7569"
},
{
"category": "external",
"summary": "SUSE Bug 1083532 for CVE-2018-7569",
"url": "https://bugzilla.suse.com/1083532"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-25T12:25:52Z",
"details": "low"
}
],
"title": "CVE-2018-7569"
},
{
"cve": "CVE-2018-7570",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7570"
}
],
"notes": [
{
"category": "general",
"text": "The assign_file_positions_for_non_load_sections function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an ELF file with a RELRO segment that lacks a matching LOAD segment, as demonstrated by objcopy.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7570",
"url": "https://www.suse.com/security/cve/CVE-2018-7570"
},
{
"category": "external",
"summary": "SUSE Bug 1083528 for CVE-2018-7570",
"url": "https://bugzilla.suse.com/1083528"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-25T12:25:52Z",
"details": "low"
}
],
"title": "CVE-2018-7570"
},
{
"cve": "CVE-2018-7642",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7642"
}
],
"notes": [
{
"category": "general",
"text": "The swap_std_reloc_in function in aoutx.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (aout_32_swap_std_reloc_out NULL pointer dereference and application crash) via a crafted ELF file, as demonstrated by objcopy.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7642",
"url": "https://www.suse.com/security/cve/CVE-2018-7642"
},
{
"category": "external",
"summary": "SUSE Bug 1086786 for CVE-2018-7642",
"url": "https://bugzilla.suse.com/1086786"
},
{
"category": "external",
"summary": "SUSE Bug 1128518 for CVE-2018-7642",
"url": "https://bugzilla.suse.com/1128518"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-25T12:25:52Z",
"details": "low"
}
],
"title": "CVE-2018-7642"
},
{
"cve": "CVE-2018-7643",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7643"
}
],
"notes": [
{
"category": "general",
"text": "The display_debug_ranges function in dwarf.c in GNU Binutils 2.30 allows remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, as demonstrated by objdump.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7643",
"url": "https://www.suse.com/security/cve/CVE-2018-7643"
},
{
"category": "external",
"summary": "SUSE Bug 1086784 for CVE-2018-7643",
"url": "https://bugzilla.suse.com/1086784"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-25T12:25:52Z",
"details": "moderate"
}
],
"title": "CVE-2018-7643"
},
{
"cve": "CVE-2018-8945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-8945"
}
],
"notes": [
{
"category": "general",
"text": "The bfd_section_from_shdr function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (segmentation fault) via a large attribute section.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-8945",
"url": "https://www.suse.com/security/cve/CVE-2018-8945"
},
{
"category": "external",
"summary": "SUSE Bug 1086608 for CVE-2018-8945",
"url": "https://bugzilla.suse.com/1086608"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-25T12:25:52Z",
"details": "low"
}
],
"title": "CVE-2018-8945"
},
{
"cve": "CVE-2019-1010180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-1010180"
}
],
"notes": [
{
"category": "general",
"text": "GNU gdb All versions is affected by: Buffer Overflow - Out of bound memory access. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. The component is: The main gdb module. The attack vector is: Open an ELF for debugging. The fixed version is: Not fixed yet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-1010180",
"url": "https://www.suse.com/security/cve/CVE-2019-1010180"
},
{
"category": "external",
"summary": "SUSE Bug 1142772 for CVE-2019-1010180",
"url": "https://bugzilla.suse.com/1142772"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-25T12:25:52Z",
"details": "important"
}
],
"title": "CVE-2019-1010180"
}
]
}
CERTFR-2022-AVI-267
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Juniper Networks Junos Space. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Junos Space | Juniper Networks Junos Space versions antérieures à 21.1R1 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Juniper Networks Junos Space versions ant\u00e9rieures \u00e0 21.1R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-13078",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13078"
},
{
"name": "CVE-2017-13077",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13077"
},
{
"name": "CVE-2017-13080",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13080"
},
{
"name": "CVE-2017-13082",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13082"
},
{
"name": "CVE-2017-13088",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13088"
},
{
"name": "CVE-2017-13086",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13086"
},
{
"name": "CVE-2017-13087",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13087"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2007-1351",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1351"
},
{
"name": "CVE-2007-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1352"
},
{
"name": "CVE-2007-6284",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6284"
},
{
"name": "CVE-2008-2935",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2935"
},
{
"name": "CVE-2008-3281",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3281"
},
{
"name": "CVE-2008-3529",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3529"
},
{
"name": "CVE-2008-4226",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4226"
},
{
"name": "CVE-2008-4225",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4225"
},
{
"name": "CVE-2009-2414",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2414"
},
{
"name": "CVE-2009-2416",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2416"
},
{
"name": "CVE-2008-5161",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5161"
},
{
"name": "CVE-2010-4008",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4008"
},
{
"name": "CVE-2011-0411",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0411"
},
{
"name": "CVE-2011-1720",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1720"
},
{
"name": "CVE-2011-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0216"
},
{
"name": "CVE-2011-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2834"
},
{
"name": "CVE-2011-2895",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2895"
},
{
"name": "CVE-2011-3905",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3905"
},
{
"name": "CVE-2011-3919",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3919"
},
{
"name": "CVE-2012-0841",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0841"
},
{
"name": "CVE-2011-1944",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1944"
},
{
"name": "CVE-2012-2807",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2807"
},
{
"name": "CVE-2012-2870",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2870"
},
{
"name": "CVE-2012-5134",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5134"
},
{
"name": "CVE-2011-3102",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3102"
},
{
"name": "CVE-2013-2877",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2877"
},
{
"name": "CVE-2013-0338",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0338"
},
{
"name": "CVE-2012-6139",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6139"
},
{
"name": "CVE-2013-2566",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2566"
},
{
"name": "CVE-2013-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6462"
},
{
"name": "CVE-2014-0211",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0211"
},
{
"name": "CVE-2014-3660",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3660"
},
{
"name": "CVE-2015-1803",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1803"
},
{
"name": "CVE-2015-1804",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1804"
},
{
"name": "CVE-2015-1802",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1802"
},
{
"name": "CVE-2015-2716",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2716"
},
{
"name": "CVE-2015-5352",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5352"
},
{
"name": "CVE-2015-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2808"
},
{
"name": "CVE-2014-8991",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8991"
},
{
"name": "CVE-2014-7185",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7185"
},
{
"name": "CVE-2014-9365",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9365"
},
{
"name": "CVE-2015-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6838"
},
{
"name": "CVE-2015-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6837"
},
{
"name": "CVE-2015-7995",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7995"
},
{
"name": "CVE-2015-8035",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8035"
},
{
"name": "CVE-2015-7499",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7499"
},
{
"name": "CVE-2015-8242",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8242"
},
{
"name": "CVE-2015-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7500"
},
{
"name": "CVE-2016-1762",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1762"
},
{
"name": "CVE-2015-5312",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5312"
},
{
"name": "CVE-2016-1839",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1839"
},
{
"name": "CVE-2016-1833",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1833"
},
{
"name": "CVE-2016-1837",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1837"
},
{
"name": "CVE-2016-1834",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1834"
},
{
"name": "CVE-2016-1840",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1840"
},
{
"name": "CVE-2016-1836",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1836"
},
{
"name": "CVE-2016-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1838"
},
{
"name": "CVE-2016-1684",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1684"
},
{
"name": "CVE-2016-1683",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1683"
},
{
"name": "CVE-2016-4448",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4448"
},
{
"name": "CVE-2016-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4447"
},
{
"name": "CVE-2016-4449",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4449"
},
{
"name": "CVE-2016-5131",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5131"
},
{
"name": "CVE-2015-0975",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0975"
},
{
"name": "CVE-2016-4658",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
},
{
"name": "CVE-2016-2183",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
},
{
"name": "CVE-2016-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3627"
},
{
"name": "CVE-2016-3115",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3115"
},
{
"name": "CVE-2016-5636",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5636"
},
{
"name": "CVE-2017-7375",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7375"
},
{
"name": "CVE-2017-7376",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7376"
},
{
"name": "CVE-2017-7773",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7773"
},
{
"name": "CVE-2017-7772",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7772"
},
{
"name": "CVE-2017-7778",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7778"
},
{
"name": "CVE-2017-7771",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7771"
},
{
"name": "CVE-2017-7774",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7774"
},
{
"name": "CVE-2017-7776",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7776"
},
{
"name": "CVE-2017-7777",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7777"
},
{
"name": "CVE-2017-7775",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7775"
},
{
"name": "CVE-2017-6463",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6463"
},
{
"name": "CVE-2017-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6462"
},
{
"name": "CVE-2017-6464",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6464"
},
{
"name": "CVE-2017-14492",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14492"
},
{
"name": "CVE-2017-14496",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14496"
},
{
"name": "CVE-2017-14491",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14491"
},
{
"name": "CVE-2017-14493",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14493"
},
{
"name": "CVE-2017-14494",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14494"
},
{
"name": "CVE-2017-14495",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14495"
},
{
"name": "CVE-2017-5130",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5130"
},
{
"name": "CVE-2017-3736",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3736"
},
{
"name": "CVE-2017-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3735"
},
{
"name": "CVE-2017-15412",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15412"
},
{
"name": "CVE-2017-3738",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3738"
},
{
"name": "CVE-2017-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3737"
},
{
"name": "CVE-2017-17807",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17807"
},
{
"name": "CVE-2018-0739",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0739"
},
{
"name": "CVE-2017-16931",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16931"
},
{
"name": "CVE-2018-11214",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11214"
},
{
"name": "CVE-2015-9019",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9019"
},
{
"name": "CVE-2017-18258",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18258"
},
{
"name": "CVE-2017-16932",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16932"
},
{
"name": "CVE-2016-9318",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9318"
},
{
"name": "CVE-2018-1000120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000120"
},
{
"name": "CVE-2018-1000007",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000007"
},
{
"name": "CVE-2018-1000121",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000121"
},
{
"name": "CVE-2018-1000122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000122"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2018-6914",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6914"
},
{
"name": "CVE-2017-0898",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0898"
},
{
"name": "CVE-2018-8778",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8778"
},
{
"name": "CVE-2017-14033",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14033"
},
{
"name": "CVE-2018-8780",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8780"
},
{
"name": "CVE-2017-17742",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17742"
},
{
"name": "CVE-2017-10784",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10784"
},
{
"name": "CVE-2017-17405",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17405"
},
{
"name": "CVE-2018-8779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8779"
},
{
"name": "CVE-2017-14064",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14064"
},
{
"name": "CVE-2018-8777",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8777"
},
{
"name": "CVE-2018-16395",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16395"
},
{
"name": "CVE-2018-0737",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0737"
},
{
"name": "CVE-2018-16396",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16396"
},
{
"name": "CVE-2018-0495",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0495"
},
{
"name": "CVE-2018-0734",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0734"
},
{
"name": "CVE-2018-5407",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5407"
},
{
"name": "CVE-2018-1126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1126"
},
{
"name": "CVE-2018-7858",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7858"
},
{
"name": "CVE-2018-1124",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1124"
},
{
"name": "CVE-2018-10897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10897"
},
{
"name": "CVE-2018-1064",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1064"
},
{
"name": "CVE-2018-5683",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5683"
},
{
"name": "CVE-2017-13672",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13672"
},
{
"name": "CVE-2018-11212",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11212"
},
{
"name": "CVE-2017-18267",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18267"
},
{
"name": "CVE-2018-13988",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13988"
},
{
"name": "CVE-2018-20169",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20169"
},
{
"name": "CVE-2018-19985",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19985"
},
{
"name": "CVE-2019-1559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1559"
},
{
"name": "CVE-2019-6133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6133"
},
{
"name": "CVE-2018-18311",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18311"
},
{
"name": "CVE-2018-12127",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12127"
},
{
"name": "CVE-2018-12130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12130"
},
{
"name": "CVE-2019-11091",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11091"
},
{
"name": "CVE-2018-12126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12126"
},
{
"name": "CVE-2019-9503",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9503"
},
{
"name": "CVE-2019-10132",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10132"
},
{
"name": "CVE-2019-11190",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11190"
},
{
"name": "CVE-2019-11884",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11884"
},
{
"name": "CVE-2019-11487",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11487"
},
{
"name": "CVE-2019-12382",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12382"
},
{
"name": "CVE-2018-7191",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7191"
},
{
"name": "CVE-2019-5953",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5953"
},
{
"name": "CVE-2019-12614",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12614"
},
{
"name": "CVE-2019-11729",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11729"
},
{
"name": "CVE-2019-11727",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11727"
},
{
"name": "CVE-2019-11719",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11719"
},
{
"name": "CVE-2018-1060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1060"
},
{
"name": "CVE-2018-12327",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12327"
},
{
"name": "CVE-2018-1061",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1061"
},
{
"name": "CVE-2019-10639",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10639"
},
{
"name": "CVE-2019-10638",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10638"
},
{
"name": "CVE-2018-20836",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20836"
},
{
"name": "CVE-2019-13233",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13233"
},
{
"name": "CVE-2019-14283",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14283"
},
{
"name": "CVE-2019-13648",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13648"
},
{
"name": "CVE-2019-10207",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10207"
},
{
"name": "CVE-2015-9289",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9289"
},
{
"name": "CVE-2019-14816",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14816"
},
{
"name": "CVE-2019-15239",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15239"
},
{
"name": "CVE-2019-15917",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15917"
},
{
"name": "CVE-2017-18551",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18551"
},
{
"name": "CVE-2019-15217",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15217"
},
{
"name": "CVE-2019-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14821"
},
{
"name": "CVE-2019-11068",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11068"
},
{
"name": "CVE-2018-18066",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18066"
},
{
"name": "CVE-2019-15903",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15903"
},
{
"name": "CVE-2019-17666",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17666"
},
{
"name": "CVE-2019-17133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17133"
},
{
"name": "CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"name": "CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2019-17055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17055"
},
{
"name": "CVE-2019-17053",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17053"
},
{
"name": "CVE-2019-16746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16746"
},
{
"name": "CVE-2019-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0155"
},
{
"name": "CVE-2019-16233",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16233"
},
{
"name": "CVE-2019-15807",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15807"
},
{
"name": "CVE-2019-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16231"
},
{
"name": "CVE-2019-11756",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11756"
},
{
"name": "CVE-2019-11745",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11745"
},
{
"name": "CVE-2019-19058",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19058"
},
{
"name": "CVE-2019-14895",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14895"
},
{
"name": "CVE-2019-19046",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19046"
},
{
"name": "CVE-2019-15916",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15916"
},
{
"name": "CVE-2019-18660",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18660"
},
{
"name": "CVE-2019-19063",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19063"
},
{
"name": "CVE-2019-19062",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19062"
},
{
"name": "CVE-2018-14526",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14526"
},
{
"name": "CVE-2019-13734",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13734"
},
{
"name": "CVE-2019-19530",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19530"
},
{
"name": "CVE-2019-19534",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19534"
},
{
"name": "CVE-2019-19524",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19524"
},
{
"name": "CVE-2019-14901",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14901"
},
{
"name": "CVE-2019-19537",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19537"
},
{
"name": "CVE-2019-19523",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19523"
},
{
"name": "CVE-2019-19338",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19338"
},
{
"name": "CVE-2019-19332",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19332"
},
{
"name": "CVE-2019-19527",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19527"
},
{
"name": "CVE-2019-18808",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18808"
},
{
"name": "CVE-2019-19767",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19767"
},
{
"name": "CVE-2019-19807",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19807"
},
{
"name": "CVE-2019-19055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19055"
},
{
"name": "CVE-2019-17023",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17023"
},
{
"name": "CVE-2019-9824",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9824"
},
{
"name": "CVE-2019-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9636"
},
{
"name": "CVE-2019-12749",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12749"
},
{
"name": "CVE-2019-19447",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19447"
},
{
"name": "CVE-2019-20095",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20095"
},
{
"name": "CVE-2019-20054",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20054"
},
{
"name": "CVE-2019-18634",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18634"
},
{
"name": "CVE-2019-14898",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14898"
},
{
"name": "CVE-2019-16994",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16994"
},
{
"name": "CVE-2019-18282",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18282"
},
{
"name": "CVE-2020-2732",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2732"
},
{
"name": "CVE-2019-19059",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19059"
},
{
"name": "CVE-2019-3901",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3901"
},
{
"name": "CVE-2020-9383",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9383"
},
{
"name": "CVE-2020-8647",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8647"
},
{
"name": "CVE-2020-8649",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8649"
},
{
"name": "CVE-2020-1749",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1749"
},
{
"name": "CVE-2019-9458",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9458"
},
{
"name": "CVE-2020-10942",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10942"
},
{
"name": "CVE-2019-9454",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9454"
},
{
"name": "CVE-2020-11565",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11565"
},
{
"name": "CVE-2020-10690",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10690"
},
{
"name": "CVE-2020-10751",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10751"
},
{
"name": "CVE-2020-12826",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12826"
},
{
"name": "CVE-2020-12654",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12654"
},
{
"name": "CVE-2020-10732",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10732"
},
{
"name": "CVE-2019-20636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20636"
},
{
"name": "CVE-2019-20811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20811"
},
{
"name": "CVE-2020-12653",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12653"
},
{
"name": "CVE-2020-10757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10757"
},
{
"name": "CVE-2020-12770",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12770"
},
{
"name": "CVE-2020-12888",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12888"
},
{
"name": "CVE-2020-12402",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12402"
},
{
"name": "CVE-2018-16881",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16881"
},
{
"name": "CVE-2018-19519",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19519"
},
{
"name": "CVE-2020-10713",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10713"
},
{
"name": "CVE-2020-14311",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14311"
},
{
"name": "CVE-2020-14309",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14309"
},
{
"name": "CVE-2020-15706",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15706"
},
{
"name": "CVE-2020-14308",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14308"
},
{
"name": "CVE-2020-14310",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14310"
},
{
"name": "CVE-2020-15705",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15705"
},
{
"name": "CVE-2020-15707",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15707"
},
{
"name": "CVE-2020-14331",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14331"
},
{
"name": "CVE-2020-10769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10769"
},
{
"name": "CVE-2020-14364",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14364"
},
{
"name": "CVE-2020-12400",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12400"
},
{
"name": "CVE-2020-12401",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12401"
},
{
"name": "CVE-2020-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6829"
},
{
"name": "CVE-2020-14314",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14314"
},
{
"name": "CVE-2020-24394",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24394"
},
{
"name": "CVE-2020-25212",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25212"
},
{
"name": "CVE-2020-14305",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14305"
},
{
"name": "CVE-2020-10742",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10742"
},
{
"name": "CVE-2020-14385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14385"
},
{
"name": "CVE-2020-25643",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25643"
},
{
"name": "CVE-2020-15999",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15999"
},
{
"name": "CVE-2018-20843",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20843"
},
{
"name": "CVE-2018-5729",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5729"
},
{
"name": "CVE-2018-5730",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5730"
},
{
"name": "CVE-2020-13817",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13817"
},
{
"name": "CVE-2020-11868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11868"
},
{
"name": "CVE-2021-3156",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3156"
},
{
"name": "CVE-2019-17006",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17006"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2020-10531",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10531"
},
{
"name": "CVE-2019-8696",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8696"
},
{
"name": "CVE-2019-20907",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20907"
},
{
"name": "CVE-2019-8675",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8675"
},
{
"name": "CVE-2017-12652",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12652"
},
{
"name": "CVE-2019-12450",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12450"
},
{
"name": "CVE-2020-12825",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12825"
},
{
"name": "CVE-2020-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12243"
},
{
"name": "CVE-2019-14866",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14866"
},
{
"name": "CVE-2020-1983",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1983"
},
{
"name": "CVE-2019-5188",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5188"
},
{
"name": "CVE-2019-5094",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5094"
},
{
"name": "CVE-2020-10754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10754"
},
{
"name": "CVE-2020-12049",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12049"
},
{
"name": "CVE-2019-14822",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14822"
},
{
"name": "CVE-2020-14363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14363"
},
{
"name": "CVE-2019-9924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9924"
},
{
"name": "CVE-2018-18751",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18751"
},
{
"name": "CVE-2019-9948",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9948"
},
{
"name": "CVE-2019-20386",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20386"
},
{
"name": "CVE-2017-13722",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13722"
},
{
"name": "CVE-2014-0210",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0210"
},
{
"name": "CVE-2018-16403",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16403"
},
{
"name": "CVE-2018-15746",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15746"
},
{
"name": "CVE-2014-6272",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6272"
},
{
"name": "CVE-2019-7638",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7638"
},
{
"name": "CVE-2015-8241",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8241"
},
{
"name": "CVE-2019-10155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10155"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2018-18310",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18310"
},
{
"name": "CVE-2018-1084",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1084"
},
{
"name": "CVE-2020-12662",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12662"
},
{
"name": "CVE-2012-4423",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4423"
},
{
"name": "CVE-2017-0902",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0902"
},
{
"name": "CVE-2018-8945",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8945"
},
{
"name": "CVE-2017-0899",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0899"
},
{
"name": "CVE-2010-2239",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2239"
},
{
"name": "CVE-2010-2242",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2242"
},
{
"name": "CVE-2017-14167",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14167"
},
{
"name": "CVE-2015-0225",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0225"
},
{
"name": "CVE-2019-11324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11324"
},
{
"name": "CVE-2013-6458",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6458"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2018-15857",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15857"
},
{
"name": "CVE-2018-16062",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16062"
},
{
"name": "CVE-2018-10534",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10534"
},
{
"name": "CVE-2014-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0179"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2013-1766",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1766"
},
{
"name": "CVE-2016-6580",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6580"
},
{
"name": "CVE-2018-12697",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12697"
},
{
"name": "CVE-2018-1000301",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000301"
},
{
"name": "CVE-2019-11236",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11236"
},
{
"name": "CVE-2019-12155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12155"
},
{
"name": "CVE-2017-0900",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0900"
},
{
"name": "CVE-2014-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3598"
},
{
"name": "CVE-2017-1000050",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000050"
},
{
"name": "CVE-2018-10535",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10535"
},
{
"name": "CVE-2019-3820",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3820"
},
{
"name": "CVE-2018-16402",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16402"
},
{
"name": "CVE-2018-1116",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1116"
},
{
"name": "CVE-2018-15853",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15853"
},
{
"name": "CVE-2019-14378",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14378"
},
{
"name": "CVE-2016-1494",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1494"
},
{
"name": "CVE-2019-12312",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12312"
},
{
"name": "CVE-2013-0339",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0339"
},
{
"name": "CVE-2019-16935",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16935"
},
{
"name": "CVE-2015-6525",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6525"
},
{
"name": "CVE-2016-6581",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6581"
},
{
"name": "CVE-2013-4520",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4520"
},
{
"name": "CVE-2014-3633",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3633"
},
{
"name": "CVE-2014-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3004"
},
{
"name": "CVE-2015-9381",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9381"
},
{
"name": "CVE-2016-5361",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5361"
},
{
"name": "CVE-2018-14598",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14598"
},
{
"name": "CVE-2014-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1447"
},
{
"name": "CVE-2018-20852",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20852"
},
{
"name": "CVE-2012-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2693"
},
{
"name": "CVE-2018-7208",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7208"
},
{
"name": "CVE-2018-12910",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12910"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2015-7497",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7497"
},
{
"name": "CVE-2019-7665",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7665"
},
{
"name": "CVE-2018-15854",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15854"
},
{
"name": "CVE-2019-13404",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13404"
},
{
"name": "CVE-2015-5160",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5160"
},
{
"name": "CVE-2018-10767",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10767"
},
{
"name": "CVE-2018-7550",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7550"
},
{
"name": "CVE-2016-3076",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3076"
},
{
"name": "CVE-2018-14404",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14404"
},
{
"name": "CVE-2018-18521",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18521"
},
{
"name": "CVE-2018-19788",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19788"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2019-3840",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3840"
},
{
"name": "CVE-2016-9189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9189"
},
{
"name": "CVE-2015-9262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9262"
},
{
"name": "CVE-2018-14647",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14647"
},
{
"name": "CVE-2019-17041",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17041"
},
{
"name": "CVE-2019-14906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14906"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2019-9947",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9947"
},
{
"name": "CVE-2017-1000158",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000158"
},
{
"name": "CVE-2019-7635",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7635"
},
{
"name": "CVE-2019-7576",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7576"
},
{
"name": "CVE-2019-14834",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14834"
},
{
"name": "CVE-2018-15855",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15855"
},
{
"name": "CVE-2019-7149",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7149"
},
{
"name": "CVE-2018-7642",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7642"
},
{
"name": "CVE-2019-5010",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5010"
},
{
"name": "CVE-2018-12641",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12641"
},
{
"name": "CVE-2021-3396",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3396"
},
{
"name": "CVE-2020-12403",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12403"
},
{
"name": "CVE-2017-15268",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15268"
},
{
"name": "CVE-2018-15587",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15587"
},
{
"name": "CVE-2016-10746",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10746"
},
{
"name": "CVE-2017-13711",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13711"
},
{
"name": "CVE-2014-8131",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8131"
},
{
"name": "CVE-2014-9601",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9601"
},
{
"name": "CVE-2014-3657",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3657"
},
{
"name": "CVE-2018-10373",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10373"
},
{
"name": "CVE-2017-17790",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17790"
},
{
"name": "CVE-2011-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2511"
},
{
"name": "CVE-2018-1000802",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000802"
},
{
"name": "CVE-2017-7555",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7555"
},
{
"name": "CVE-2016-9015",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9015"
},
{
"name": "CVE-2017-13720",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13720"
},
{
"name": "CVE-2018-11782",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11782"
},
{
"name": "CVE-2017-11671",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11671"
},
{
"name": "CVE-2017-10664",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10664"
},
{
"name": "CVE-2018-11213",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11213"
},
{
"name": "CVE-2013-6457",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6457"
},
{
"name": "CVE-2019-10138",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10138"
},
{
"name": "CVE-2019-7578",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7578"
},
{
"name": "CVE-2020-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7039"
},
{
"name": "CVE-2017-11368",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11368"
},
{
"name": "CVE-2018-0494",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0494"
},
{
"name": "CVE-2019-20485",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20485"
},
{
"name": "CVE-2003-1418",
"url": "https://www.cve.org/CVERecord?id=CVE-2003-1418"
},
{
"name": "CVE-2017-15289",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15289"
},
{
"name": "CVE-2016-5391",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5391"
},
{
"name": "CVE-2017-2810",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2810"
},
{
"name": "CVE-2018-15864",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15864"
},
{
"name": "CVE-2017-18207",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18207"
},
{
"name": "CVE-2019-12761",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12761"
},
{
"name": "CVE-2013-5651",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5651"
},
{
"name": "CVE-2017-17522",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17522"
},
{
"name": "CVE-2019-20382",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20382"
},
{
"name": "CVE-2016-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2533"
},
{
"name": "CVE-2019-14287",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14287"
},
{
"name": "CVE-2018-18520",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18520"
},
{
"name": "CVE-2019-9740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9740"
},
{
"name": "CVE-2019-7575",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7575"
},
{
"name": "CVE-2015-5652",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5652"
},
{
"name": "CVE-2019-7572",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7572"
},
{
"name": "CVE-2017-6519",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6519"
},
{
"name": "CVE-2018-10906",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10906"
},
{
"name": "CVE-2018-15863",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15863"
},
{
"name": "CVE-2018-15862",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15862"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2019-7664",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7664"
},
{
"name": "CVE-2017-5992",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5992"
},
{
"name": "CVE-2019-16865",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16865"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2018-1000030",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000030"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2017-0901",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0901"
},
{
"name": "CVE-2018-7568",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7568"
},
{
"name": "CVE-2016-0775",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0775"
},
{
"name": "CVE-2018-15688",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15688"
},
{
"name": "CVE-2018-14599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14599"
},
{
"name": "CVE-2018-10733",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10733"
},
{
"name": "CVE-2016-9396",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9396"
},
{
"name": "CVE-2019-10160",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10160"
},
{
"name": "CVE-2017-7562",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7562"
},
{
"name": "CVE-2016-1000032",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000032"
},
{
"name": "CVE-2017-15124",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15124"
},
{
"name": "CVE-2018-1113",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1113"
},
{
"name": "CVE-2013-4399",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4399"
},
{
"name": "CVE-2019-7636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7636"
},
{
"name": "CVE-2014-3672",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3672"
},
{
"name": "CVE-2018-4700",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4700"
},
{
"name": "CVE-2017-0903",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0903"
},
{
"name": "CVE-2018-15856",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15856"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2019-7573",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7573"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2010-2237",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2237"
},
{
"name": "CVE-2018-1000876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000876"
},
{
"name": "CVE-2018-14348",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14348"
},
{
"name": "CVE-2019-3890",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3890"
},
{
"name": "CVE-2015-7498",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7498"
},
{
"name": "CVE-2019-7577",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7577"
},
{
"name": "CVE-2016-0740",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0740"
},
{
"name": "CVE-2018-4180",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4180"
},
{
"name": "CVE-2013-4297",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4297"
},
{
"name": "CVE-2010-2238",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2238"
},
{
"name": "CVE-2018-14600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14600"
},
{
"name": "CVE-2017-13090",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13090"
},
{
"name": "CVE-2013-7336",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7336"
},
{
"name": "CVE-2018-10372",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10372"
},
{
"name": "CVE-2019-7637",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7637"
},
{
"name": "CVE-2018-11806",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11806"
},
{
"name": "CVE-2018-7643",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7643"
},
{
"name": "CVE-2015-0236",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0236"
},
{
"name": "CVE-2018-1000117",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000117"
},
{
"name": "CVE-2014-0209",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0209"
},
{
"name": "CVE-2013-2230",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2230"
},
{
"name": "CVE-2018-1122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1122"
},
{
"name": "CVE-2014-3960",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3960"
},
{
"name": "CVE-2019-16056",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16056"
},
{
"name": "CVE-2020-12663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12663"
},
{
"name": "CVE-2018-10768",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10768"
},
{
"name": "CVE-2017-16611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16611"
},
{
"name": "CVE-2014-7823",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7823"
},
{
"name": "CVE-2020-10703",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10703"
},
{
"name": "CVE-2018-7569",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7569"
},
{
"name": "CVE-2013-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4154"
},
{
"name": "CVE-2018-20060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20060"
},
{
"name": "CVE-2015-9382",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9382"
},
{
"name": "CVE-2017-18190",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18190"
},
{
"name": "CVE-2016-4009",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4009"
},
{
"name": "CVE-2018-13033",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13033"
},
{
"name": "CVE-2016-9190",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9190"
},
{
"name": "CVE-2019-7574",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7574"
},
{
"name": "CVE-2016-0772",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0772"
},
{
"name": "CVE-2016-5699",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5699"
},
{
"name": "CVE-2011-1486",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1486"
},
{
"name": "CVE-2020-5208",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-5208"
},
{
"name": "CVE-2019-6778",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6778"
},
{
"name": "CVE-2020-10772",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10772"
},
{
"name": "CVE-2020-25637",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25637"
},
{
"name": "CVE-2018-10360",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10360"
},
{
"name": "CVE-2018-15859",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15859"
},
{
"name": "CVE-2017-13089",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13089"
},
{
"name": "CVE-2019-12779",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12779"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2019-6690",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6690"
},
{
"name": "CVE-2015-8317",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8317"
},
{
"name": "CVE-2018-4181",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4181"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2016-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3616"
},
{
"name": "CVE-2018-14498",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14498"
},
{
"name": "CVE-2018-15861",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15861"
},
{
"name": "CVE-2019-7150",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7150"
},
{
"name": "CVE-2019-17042",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17042"
},
{
"name": "CVE-2016-5008",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5008"
},
{
"name": "CVE-2014-4616",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4616"
}
],
"initial_release_date": "2022-03-23T00:00:00",
"last_revision_date": "2022-03-23T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-267",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-03-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Juniper Networks\nJunos Space. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper Networks Junos Space",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11176 du 22 mars 2022",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11176\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
gsd-2018-1000876
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2018-1000876",
"description": "binutils version 2.32 and earlier contains a Integer Overflow vulnerability in objdump, bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc that can result in Integer overflow trigger heap overflow. Successful exploitation allows execution of arbitrary code.. This attack appear to be exploitable via Local. This vulnerability appears to have been fixed in after commit 3a551c7a1b80fca579461774860574eabfd7f18f.",
"id": "GSD-2018-1000876",
"references": [
"https://www.suse.com/security/cve/CVE-2018-1000876.html",
"https://access.redhat.com/errata/RHBA-2020:0547",
"https://access.redhat.com/errata/RHSA-2019:2075",
"https://ubuntu.com/security/CVE-2018-1000876",
"https://linux.oracle.com/cve/CVE-2018-1000876.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2018-1000876"
],
"details": "binutils version 2.32 and earlier contains a Integer Overflow vulnerability in objdump, bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc that can result in Integer overflow trigger heap overflow. Successful exploitation allows execution of arbitrary code.. This attack appear to be exploitable via Local. This vulnerability appears to have been fixed in after commit 3a551c7a1b80fca579461774860574eabfd7f18f.",
"id": "GSD-2018-1000876",
"modified": "2023-12-13T01:22:27.977759Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2018-12-19T20:52:45.262881",
"DATE_REQUESTED": "2018-12-17T03:18:24",
"ID": "CVE-2018-1000876",
"REQUESTER": "yanshb@gmail.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "binutils version 2.32 and earlier contains a Integer Overflow vulnerability in objdump, bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc that can result in Integer overflow trigger heap overflow. Successful exploitation allows execution of arbitrary code.. This attack appear to be exploitable via Local. This vulnerability appears to have been fixed in after commit 3a551c7a1b80fca579461774860574eabfd7f18f."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=3a551c7a1b80fca579461774860574eabfd7f18f",
"refsource": "MISC",
"url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=3a551c7a1b80fca579461774860574eabfd7f18f"
},
{
"name": "106304",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106304"
},
{
"name": "https://sourceware.org/bugzilla/show_bug.cgi?id=23994",
"refsource": "MISC",
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23994"
},
{
"name": "RHSA-2019:2075",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:2075"
},
{
"name": "openSUSE-SU-2019:2415",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html"
},
{
"name": "openSUSE-SU-2019:2432",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html"
},
{
"name": "USN-4336-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/4336-1/"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.32",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-1000876"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "binutils version 2.32 and earlier contains a Integer Overflow vulnerability in objdump, bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc that can result in Integer overflow trigger heap overflow. Successful exploitation allows execution of arbitrary code.. This attack appear to be exploitable via Local. This vulnerability appears to have been fixed in after commit 3a551c7a1b80fca579461774860574eabfd7f18f."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
},
{
"lang": "en",
"value": "CWE-190"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=3a551c7a1b80fca579461774860574eabfd7f18f",
"refsource": "MISC",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=3a551c7a1b80fca579461774860574eabfd7f18f"
},
{
"name": "https://sourceware.org/bugzilla/show_bug.cgi?id=23994",
"refsource": "MISC",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23994"
},
{
"name": "106304",
"refsource": "BID",
"tags": [
"Broken Link"
],
"url": "http://www.securityfocus.com/bid/106304"
},
{
"name": "RHSA-2019:2075",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2075"
},
{
"name": "openSUSE-SU-2019:2415",
"refsource": "SUSE",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html"
},
{
"name": "openSUSE-SU-2019:2432",
"refsource": "SUSE",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html"
},
{
"name": "USN-4336-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4336-1/"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2023-02-28T20:43Z",
"publishedDate": "2018-12-20T17:29Z"
}
}
}
ssa-202008
Vulnerability from csaf_siemens
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)",
"tlp": {
"label": "WHITE"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Ruggedcom ROX familly contain multiple vulnerabilities before V2.17.0\n\nSiemens has released new versions for the affected products and recommends to update to the latest versions.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "productcert@siemens.com",
"name": "Siemens ProductCERT",
"namespace": "https://www.siemens.com"
},
"references": [
{
"category": "self",
"summary": "SSA-202008: Multiple Vulnerabilities in Ruggedcom Rox Before V2.17.0 - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-202008.html"
},
{
"category": "self",
"summary": "SSA-202008: Multiple Vulnerabilities in Ruggedcom Rox Before V2.17.0 - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-202008.json"
}
],
"title": "SSA-202008: Multiple Vulnerabilities in Ruggedcom Rox Before V2.17.0",
"tracking": {
"current_release_date": "2025-12-09T00:00:00Z",
"generator": {
"engine": {
"name": "Siemens ProductCERT CSAF Generator",
"version": "1"
}
},
"id": "SSA-202008",
"initial_release_date": "2025-12-09T00:00:00Z",
"revision_history": [
{
"date": "2025-12-09T00:00:00Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
}
],
"status": "interim",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c2.17.0",
"product": {
"name": "RUGGEDCOM ROX MX5000",
"product_id": "1"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX MX5000"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c2.17.0",
"product": {
"name": "RUGGEDCOM ROX MX5000RE",
"product_id": "2"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX MX5000RE"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c2.17.0",
"product": {
"name": "RUGGEDCOM ROX RX1400",
"product_id": "3"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1400"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c2.17.0",
"product": {
"name": "RUGGEDCOM ROX RX1500",
"product_id": "4"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1500"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c2.17.0",
"product": {
"name": "RUGGEDCOM ROX RX1501",
"product_id": "5"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1501"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c2.17.0",
"product": {
"name": "RUGGEDCOM ROX RX1510",
"product_id": "6"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1510"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c2.17.0",
"product": {
"name": "RUGGEDCOM ROX RX1511",
"product_id": "7"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1511"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c2.17.0",
"product": {
"name": "RUGGEDCOM ROX RX1512",
"product_id": "8"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1512"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c2.17.0",
"product": {
"name": "RUGGEDCOM ROX RX1524",
"product_id": "9"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1524"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c2.17.0",
"product": {
"name": "RUGGEDCOM ROX RX1536",
"product_id": "10"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1536"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c2.17.0",
"product": {
"name": "RUGGEDCOM ROX RX5000",
"product_id": "11"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX5000"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-7169",
"cwe": {
"id": "CWE-271",
"name": "Privilege Dropping / Lowering Errors"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in shadow 4.5. newgidmap (in shadow-utils) is setuid and allows an unprivileged user to be placed in a user namespace where setgroups(2) is permitted. This allows an attacker to remove themselves from a supplementary group, which may allow access to certain filesystem paths if the administrator has used \"group blacklisting\" (e.g., chmod g-rwx) to restrict access to paths. This flaw effectively reverts a security feature in the kernel (in particular, the /proc/self/setgroups knob) to prevent this sort of privilege escalation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2018-7169"
},
{
"cve": "CVE-2018-9234",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "GnuPG 2.2.4 and 2.2.5 does not enforce a configuration in which key certification requires an offline master Certify key, which results in apparently valid certifications that occurred only with access to a signing subkey.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2018-9234"
},
{
"cve": "CVE-2018-12934",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "remember_Ktype in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30, allows attackers to trigger excessive memory consumption (aka OOM). This can occur during execution of cxxfilt.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2018-12934"
},
{
"cve": "CVE-2018-1000876",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "binutils version 2.32 and earlier contains a Integer Overflow vulnerability in objdump, bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc that can result in Integer overflow trigger heap overflow. Successful exploitation allows execution of arbitrary code.. This attack appear to be exploitable via Local. This vulnerability appears to have been fixed in after commit 3a551c7a1b80fca579461774860574eabfd7f18f.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2018-1000876"
},
{
"cve": "CVE-2019-9893",
"cwe": {
"id": "CWE-385",
"name": "Covert Timing Channel"
},
"notes": [
{
"category": "summary",
"text": "libseccomp before 2.4.0 did not correctly generate 64-bit syscall argument comparisons using the arithmetic operators (LT, GT, LE, GE), which might able to lead to bypassing seccomp filters and potential privilege escalations.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2019-9893"
},
{
"cve": "CVE-2019-12900",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2019-12900"
},
{
"cve": "CVE-2019-14866",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In all versions of cpio before 2.13 does not properly validate input files when generating TAR archives. When cpio is used to create TAR archives from paths an attacker can write to, the resulting archive may contain files with permissions the attacker did not have or in paths he did not have access to. Extracting those archives from a high-privilege user without carefully reviewing them may lead to the compromise of the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2019-14866"
},
{
"cve": "CVE-2020-12762",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "json-c through 0.14 has an integer overflow and out-of-bounds write via a large JSON file, as demonstrated by printbuf_memappend.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2020-12762"
},
{
"cve": "CVE-2020-21047",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "The libcpu component which is used by libasm of elfutils version 0.177 (git 47780c9e), suffers from denial-of-service vulnerability caused by application crashes due to out-of-bounds write (CWE-787), off-by-one error (CWE-193) and reachable assertion (CWE-617); to exploit the vulnerability, the attackers need to craft certain ELF files which bypass the missing bound checks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2020-21047"
},
{
"cve": "CVE-2020-22217",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "summary",
"text": "Buffer overflow vulnerability in c-ares before 1_16_1 thru 1_17_0 via function ares_parse_soa_reply in ares_parse_soa_reply.c.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2020-22217"
},
{
"cve": "CVE-2020-35525",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In SQlite 3.31.1, a potential null pointer derreference was found in the INTERSEC query processing.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2020-35525"
},
{
"cve": "CVE-2021-35550",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2021-35550"
},
{
"cve": "CVE-2021-35556",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2021-35556"
},
{
"cve": "CVE-2021-35559",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2021-35559"
},
{
"cve": "CVE-2021-35561",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Utility). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2021-35561"
},
{
"cve": "CVE-2021-35564",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Keytool). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2021-35564"
},
{
"cve": "CVE-2021-35565",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2021-35565"
},
{
"cve": "CVE-2021-35567",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows low privileged attacker with network access via Kerberos to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Oracle GraalVM Enterprise Edition, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2021-35567"
},
{
"cve": "CVE-2021-35578",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2021-35578"
},
{
"cve": "CVE-2021-35586",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2021-35586"
},
{
"cve": "CVE-2021-35588",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u311, 8u301; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2021-35588"
},
{
"cve": "CVE-2021-35603",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2021-35603"
},
{
"cve": "CVE-2021-36084",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __cil_verify_classpermission and __cil_pre_verify_helper).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2021-36084"
},
{
"cve": "CVE-2021-36085",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __verify_map_perm_classperms and hashtab_map).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2021-36085"
},
{
"cve": "CVE-2021-36086",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "The CIL compiler in SELinux 3.2 has a use-after-free in cil_reset_classpermission (called from cil_reset_classperms_set and cil_reset_classperms_list).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2021-36086"
},
{
"cve": "CVE-2021-36087",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "The CIL compiler in SELinux 3.2 has a heap-based buffer over-read in ebitmap_match_any (called indirectly from cil_check_neverallow). This occurs because there is sometimes a lack of checks for invalid statements in an optional block.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2021-36087"
},
{
"cve": "CVE-2021-38185",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "GNU cpio through 2.13 allows attackers to execute arbitrary code via a crafted pattern file, because of a dstring.c ds_fgetstr integer overflow that triggers an out-of-bounds heap write. NOTE: it is unclear whether there are common cases where the pattern file, associated with the -E option, is untrusted data.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2021-38185"
},
{
"cve": "CVE-2021-47358",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nstaging: greybus: uart: fix tty use after free\r\n\r\nUser space can hold a tty open indefinitely and tty drivers must not\r\nrelease the underlying structures until the last user is gone.\r\n\r\nSwitch to using the tty-port reference counter to manage the life time\r\nof the greybus tty state to avoid use after free after a disconnect.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2021-47358"
},
{
"cve": "CVE-2021-47361",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmcb: fix error handling in mcb_alloc_bus()\r\n\r\nThere are two bugs:\r\n1) If ida_simple_get() fails then this code calls put_device(carrier)\r\n but we haven\u0027t yet called get_device(carrier) and probably that\r\n leads to a use after free.\r\n2) After device_initialize() then we need to use put_device() to\r\n release the bus. This will free the internal resources tied to the\r\n device and call mcb_free_bus() which will free the rest.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2021-47361"
},
{
"cve": "CVE-2022-0435",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-0435"
},
{
"cve": "CVE-2022-0492",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in the Linux kernel\u2019s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-0492"
},
{
"cve": "CVE-2022-0847",
"cwe": {
"id": "CWE-281",
"name": "Improper Preservation of Permissions"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in the way the \"flags\" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-0847"
},
{
"cve": "CVE-2022-0850",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in linux kernel, where an information leak occurs via ext4_extent_header to userspace.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-0850"
},
{
"cve": "CVE-2022-1353",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in the pfkey_register function in net/key/af_key.c in the Linux kernel. This flaw allows a local, unprivileged user to gain access to kernel memory, leading to a system crash or a leak of internal kernel information.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-1353"
},
{
"cve": "CVE-2022-1734",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A flaw in Linux Kernel found in nfcmrvl_nci_unregister_dev() in drivers/nfc/nfcmrvl/main.c can lead to use after free both read or write when non synchronized between cleanup routine and firmware download routine.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-1734"
},
{
"cve": "CVE-2022-2639",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"notes": [
{
"category": "summary",
"text": "An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-2639"
},
{
"cve": "CVE-2022-2964",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel\u2019s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-2964"
},
{
"cve": "CVE-2022-3424",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-3424"
},
{
"cve": "CVE-2022-20141",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "In ip_check_mc_rcu of igmp.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege when opening and closing inet sockets with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-112551163References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-20141"
},
{
"cve": "CVE-2022-23039",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "Linux PV device frontends vulnerable to attacks by backends [This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-23039"
},
{
"cve": "CVE-2022-23040",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "Linux PV device frontends vulnerable to attacks by backends [This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-23040"
},
{
"cve": "CVE-2022-24958",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev-\u003ebuf release.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-24958"
},
{
"cve": "CVE-2022-27223",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"notes": [
{
"category": "summary",
"text": "In drivers/usb/gadget/udc/udc-xilinx.c in the Linux kernel before 5.16.12, the endpoint index is not validated and might be manipulated by the host for out-of-array access.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-27223"
},
{
"cve": "CVE-2022-28390",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-28390"
},
{
"cve": "CVE-2022-30594",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"notes": [
{
"category": "summary",
"text": "The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-30594"
},
{
"cve": "CVE-2022-34903",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim\u0027s keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery via injection into the status line.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-34903"
},
{
"cve": "CVE-2022-36123",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "The Linux kernel before 5.18.13 lacks a certain clear operation for the block starting symbol (.bss). This allows Xen PV guest OS users to cause a denial of service or gain privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-36123"
},
{
"cve": "CVE-2022-37032",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds read in the BGP daemon of FRRouting FRR before 8.4 may lead to a segmentation fault and denial of service. This occurs in bgp_capability_msg_parse in bgpd/bgp_packet.c.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-37032"
},
{
"cve": "CVE-2022-37434",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-37434"
},
{
"cve": "CVE-2022-41858",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to crash the system or leak internal kernel information.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-41858"
},
{
"cve": "CVE-2022-48624",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "close_altfile in filename.c in less before 606 omits shell_quote calls for LESSCLOSE.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-48624"
},
{
"cve": "CVE-2022-48626",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmoxart: fix potential use-after-free on remove path\r\n\r\nIt was reported that the mmc host structure could be accessed after it\r\nwas freed in moxart_remove(), so fix this by saving the base register of\r\nthe device and using it instead of the pointer dereference.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-48626"
},
{
"cve": "CVE-2022-48919",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ncifs: fix double free race when mount fails in cifs_get_root()\r\n\r\nWhen cifs_get_root() fails during cifs_smb3_do_mount() we call\r\ndeactivate_locked_super() which eventually will call delayed_free() which\r\nwill free the context.\r\nIn this situation we should not proceed to enter the out: section in\r\ncifs_smb3_do_mount() and free the same resources a second time.\r\n\r\n[Thu Feb 10 12:59:06 2022] BUG: KASAN: use-after-free in rcu_cblist_dequeue+0x32/0x60\r\n[Thu Feb 10 12:59:06 2022] Read of size 8 at addr ffff888364f4d110 by task swapper/1/0\r\n\r\n[Thu Feb 10 12:59:06 2022] CPU: 1 PID: 0 Comm: swapper/1 Tainted: G OE 5.17.0-rc3+ #4\r\n[Thu Feb 10 12:59:06 2022] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.0 12/17/2019\r\n[Thu Feb 10 12:59:06 2022] Call Trace:\r\n[Thu Feb 10 12:59:06 2022] \u003cIRQ\u003e\r\n[Thu Feb 10 12:59:06 2022] dump_stack_lvl+0x5d/0x78\r\n[Thu Feb 10 12:59:06 2022] print_address_description.constprop.0+0x24/0x150\r\n[Thu Feb 10 12:59:06 2022] ? rcu_cblist_dequeue+0x32/0x60\r\n[Thu Feb 10 12:59:06 2022] kasan_report.cold+0x7d/0x117\r\n[Thu Feb 10 12:59:06 2022] ? rcu_cblist_dequeue+0x32/0x60\r\n[Thu Feb 10 12:59:06 2022] __asan_load8+0x86/0xa0\r\n[Thu Feb 10 12:59:06 2022] rcu_cblist_dequeue+0x32/0x60\r\n[Thu Feb 10 12:59:06 2022] rcu_core+0x547/0xca0\r\n[Thu Feb 10 12:59:06 2022] ? call_rcu+0x3c0/0x3c0\r\n[Thu Feb 10 12:59:06 2022] ? __this_cpu_preempt_check+0x13/0x20\r\n[Thu Feb 10 12:59:06 2022] ? lock_is_held_type+0xea/0x140\r\n[Thu Feb 10 12:59:06 2022] rcu_core_si+0xe/0x10\r\n[Thu Feb 10 12:59:06 2022] __do_softirq+0x1d4/0x67b\r\n[Thu Feb 10 12:59:06 2022] __irq_exit_rcu+0x100/0x150\r\n[Thu Feb 10 12:59:06 2022] irq_exit_rcu+0xe/0x30\r\n[Thu Feb 10 12:59:06 2022] sysvec_hyperv_stimer0+0x9d/0xc0\r\n...\r\n[Thu Feb 10 12:59:07 2022] Freed by task 58179:\r\n[Thu Feb 10 12:59:07 2022] kasan_save_stack+0x26/0x50\r\n[Thu Feb 10 12:59:07 2022] kasan_set_track+0x25/0x30\r\n[Thu Feb 10 12:59:07 2022] kasan_set_free_info+0x24/0x40\r\n[Thu Feb 10 12:59:07 2022] ____kasan_slab_free+0x137/0x170\r\n[Thu Feb 10 12:59:07 2022] __kasan_slab_free+0x12/0x20\r\n[Thu Feb 10 12:59:07 2022] slab_free_freelist_hook+0xb3/0x1d0\r\n[Thu Feb 10 12:59:07 2022] kfree+0xcd/0x520\r\n[Thu Feb 10 12:59:07 2022] cifs_smb3_do_mount+0x149/0xbe0 [cifs]\r\n[Thu Feb 10 12:59:07 2022] smb3_get_tree+0x1a0/0x2e0 [cifs]\r\n[Thu Feb 10 12:59:07 2022] vfs_get_tree+0x52/0x140\r\n[Thu Feb 10 12:59:07 2022] path_mount+0x635/0x10c0\r\n[Thu Feb 10 12:59:07 2022] __x64_sys_mount+0x1bf/0x210\r\n[Thu Feb 10 12:59:07 2022] do_syscall_64+0x5c/0xc0\r\n[Thu Feb 10 12:59:07 2022] entry_SYSCALL_64_after_hwframe+0x44/0xae\r\n\r\n[Thu Feb 10 12:59:07 2022] Last potentially related work creation:\r\n[Thu Feb 10 12:59:07 2022] kasan_save_stack+0x26/0x50\r\n[Thu Feb 10 12:59:07 2022] __kasan_record_aux_stack+0xb6/0xc0\r\n[Thu Feb 10 12:59:07 2022] kasan_record_aux_stack_noalloc+0xb/0x10\r\n[Thu Feb 10 12:59:07 2022] call_rcu+0x76/0x3c0\r\n[Thu Feb 10 12:59:07 2022] cifs_umount+0xce/0xe0 [cifs]\r\n[Thu Feb 10 12:59:07 2022] cifs_kill_sb+0xc8/0xe0 [cifs]\r\n[Thu Feb 10 12:59:07 2022] deactivate_locked_super+0x5d/0xd0\r\n[Thu Feb 10 12:59:07 2022] cifs_smb3_do_mount+0xab9/0xbe0 [cifs]\r\n[Thu Feb 10 12:59:07 2022] smb3_get_tree+0x1a0/0x2e0 [cifs]\r\n[Thu Feb 10 12:59:07 2022] vfs_get_tree+0x52/0x140\r\n[Thu Feb 10 12:59:07 2022] path_mount+0x635/0x10c0\r\n[Thu Feb 10 12:59:07 2022] __x64_sys_mount+0x1bf/0x210\r\n[Thu Feb 10 12:59:07 2022] do_syscall_64+0x5c/0xc0\r\n[Thu Feb 10 12:59:07 2022] entry_SYSCALL_64_after_hwframe+0x44/0xae",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-48919"
},
{
"cve": "CVE-2022-48926",
"cwe": {
"id": "CWE-414",
"name": "Missing Lock Check"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nusb: gadget: rndis: add spinlock for rndis response list\r\n\r\nThere\u0027s no lock for rndis response list. It could cause list corruption\r\nif there\u0027re two different list_add at the same time like below.\r\nIt\u0027s better to add in rndis_add_response / rndis_free_response\r\n/ rndis_get_next_response to prevent any race condition on response list.\r\n\r\n[ 361.894299] [1: irq/191-dwc3:16979] list_add corruption.\r\nnext-\u003eprev should be prev (ffffff80651764d0),\r\nbut was ffffff883dc36f80. (next=ffffff80651764d0).\r\n\r\n[ 361.904380] [1: irq/191-dwc3:16979] Call trace:\r\n[ 361.904391] [1: irq/191-dwc3:16979] __list_add_valid+0x74/0x90\r\n[ 361.904401] [1: irq/191-dwc3:16979] rndis_msg_parser+0x168/0x8c0\r\n[ 361.904409] [1: irq/191-dwc3:16979] rndis_command_complete+0x24/0x84\r\n[ 361.904417] [1: irq/191-dwc3:16979] usb_gadget_giveback_request+0x20/0xe4\r\n[ 361.904426] [1: irq/191-dwc3:16979] dwc3_gadget_giveback+0x44/0x60\r\n[ 361.904434] [1: irq/191-dwc3:16979] dwc3_ep0_complete_data+0x1e8/0x3a0\r\n[ 361.904442] [1: irq/191-dwc3:16979] dwc3_ep0_interrupt+0x29c/0x3dc\r\n[ 361.904450] [1: irq/191-dwc3:16979] dwc3_process_event_entry+0x78/0x6cc\r\n[ 361.904457] [1: irq/191-dwc3:16979] dwc3_process_event_buf+0xa0/0x1ec\r\n[ 361.904465] [1: irq/191-dwc3:16979] dwc3_thread_interrupt+0x34/0x5c",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-48926"
},
{
"cve": "CVE-2022-48948",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nusb: gadget: uvc: Prevent buffer overflow in setup handler\r\n\r\nSetup function uvc_function_setup permits control transfer\r\nrequests with up to 64 bytes of payload (UVC_MAX_REQUEST_SIZE),\r\ndata stage handler for OUT transfer uses memcpy to copy req-\u003eactual\r\nbytes to uvc_event-\u003edata.data array of size 60. This may result\r\nin an overflow of 4 bytes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-48948"
},
{
"cve": "CVE-2022-48951",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nASoC: ops: Check bounds for second channel in snd_soc_put_volsw_sx()\r\n\r\nThe bounds checks in snd_soc_put_volsw_sx() are only being applied to the\r\nfirst channel, meaning it is possible to write out of bounds values to the\r\nsecond channel in stereo controls. Add appropriate checks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-48951"
},
{
"cve": "CVE-2022-48960",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet: hisilicon: Fix potential use-after-free in hix5hd2_rx()\r\n\r\nThe skb is delivered to napi_gro_receive() which may free it, after\r\ncalling this, dereferencing skb may trigger use-after-free.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-48960"
},
{
"cve": "CVE-2022-48962",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet: hisilicon: Fix potential use-after-free in hisi_femac_rx()\r\n\r\nThe skb is delivered to napi_gro_receive() which may free it, after\r\ncalling this, dereferencing skb may trigger use-after-free.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-48962"
},
{
"cve": "CVE-2022-48966",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet: mvneta: Prevent out of bounds read in mvneta_config_rss()\r\n\r\nThe pp-\u003eindir[0] value comes from the user. It is passed to:\r\n\r\n\tif (cpu_online(pp-\u003erxq_def))\r\n\r\ninside the mvneta_percpu_elect() function. It needs bounds checkeding\r\nto ensure that it is not beyond the end of the cpu bitmap.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-48966"
},
{
"cve": "CVE-2022-48967",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nNFC: nci: Bounds check struct nfc_target arrays\r\n\r\nWhile running under CONFIG_FORTIFY_SOURCE=y, syzkaller reported:\r\n\r\n memcpy: detected field-spanning write (size 129) of single field \"target-\u003esensf_res\" at net/nfc/nci/ntf.c:260 (size 18)\r\n\r\nThis appears to be a legitimate lack of bounds checking in\r\nnci_add_new_protocol(). Add the missing checks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-48967"
},
{
"cve": "CVE-2022-49058",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: potential buffer overflow in handling symlinks\n\nSmatch printed a warning:\n\tarch/x86/crypto/poly1305_glue.c:198 poly1305_update_arch() error:\n\t__memcpy() \u0027dctx-\u003ebuf\u0027 too small (16 vs u32max)\n\nIt\u0027s caused because Smatch marks \u0027link_len\u0027 as untrusted since it comes\nfrom sscanf(). Add a check to ensure that \u0027link_len\u0027 is not larger than\nthe size of the \u0027link_str\u0027 buffer.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-49058"
},
{
"cve": "CVE-2023-4641",
"cwe": {
"id": "CWE-303",
"name": "Incorrect Implementation of Authentication Algorithm"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in shadow-utils. When asking for a new password, shadow-utils asks the password twice. If the password fails on the second attempt, shadow-utils fails in cleaning the buffer used to store the first entry. This may allow an attacker with enough access to retrieve the password from the memory.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2023-4641"
},
{
"cve": "CVE-2023-27043",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2023-27043"
},
{
"cve": "CVE-2023-28322",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "An information disclosure vulnerability exists in curl \u003cv8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2023-28322"
},
{
"cve": "CVE-2023-29383",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \\n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \\r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that \"cat /etc/passwd\" shows a rogue user account.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2023-29383"
},
{
"cve": "CVE-2023-29491",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "ncurses before 6.4 20230408, when used by a setuid application, allows local users to trigger security-relevant memory corruption via malformed data in a terminfo database file that is found in $HOME/.terminfo or reached via the TERMINFO or TERM environment variable.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2023-29491"
},
{
"cve": "CVE-2023-41358",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in FRRouting FRR through 9.0. bgpd/bgp_packet.c processes NLRIs if the attribute length is zero.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2023-41358"
},
{
"cve": "CVE-2023-46218",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"notes": [
{
"category": "summary",
"text": "This flaw allows a malicious HTTP server to set \"super cookies\" in curl that are then passed back to more origins than what is otherwise allowed or possible. This allows a site to set cookies that then would get sent to different and unrelated sites and domains. It could do this by exploiting a mixed case flaw in curl\u0027s function that verifies a given cookie domain against the Public Suffix List (PSL). For example a cookie could be set with `domain=co.UK` when the URL used a lower case hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2023-46218"
},
{
"cve": "CVE-2023-46753",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in FRRouting FRR through 9.0.1. A crash can occur for a crafted BGP UPDATE message without mandatory attributes, e.g., one with only an unknown transit attribute.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2023-46753"
},
{
"cve": "CVE-2023-47234",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in FRRouting FRR through 9.0.1. A crash can occur when processing a crafted BGP UPDATE message with a MP_UNREACH_NLRI attribute and additional NLRI data (that lacks mandatory path attributes).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2023-47234"
},
{
"cve": "CVE-2024-0397",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A defect was discovered in the Python \u201cssl\u201d module where there is a memory\nrace condition with the ssl.SSLContext methods \u201ccert_store_stats()\u201d and\n\u201cget_ca_certs()\u201d. The race condition can be triggered if the methods are\ncalled at the same time as certificates are loaded into the SSLContext,\nsuch as during the TLS handshake with a certificate directory configured.\nThis issue is fixed in CPython 3.10.14, 3.11.9, 3.12.3, and 3.13.0a5.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2024-0397"
},
{
"cve": "CVE-2024-5642",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "CPython 3.9 and earlier doesn\u0027t disallow configuring an empty list (\"[]\") for SSLContext.set_npn_protocols() which is an invalid value for the underlying OpenSSL API. This results in a buffer over-read when NPN is used (see CVE-2024-5535 for OpenSSL). This vulnerability is of low severity due to NPN being not widely used and specifying an empty list likely being uncommon in-practice (typically a protocol name would be configured).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2024-5642"
},
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "summary",
"text": "There is a MEDIUM severity vulnerability affecting CPython.\n\n\n\n\n\nRegular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-6923",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "There is a MEDIUM severity vulnerability affecting CPython.\n\nThe \nemail module didn\u2019t properly quote newlines for email headers when \nserializing an email message allowing for header injection when an email\n is serialized.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2024-6923"
},
{
"cve": "CVE-2024-7592",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "There is a LOW severity vulnerability affecting CPython, specifically the\n\u0027http.cookies\u0027 standard library module.\n\n\nWhen parsing cookies that contained backslashes for quoted characters in\nthe cookie value, the parser would use an algorithm with quadratic\ncomplexity, resulting in excess CPU resources being used while parsing the\nvalue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2024-7592"
},
{
"cve": "CVE-2024-11168",
"cwe": {
"id": "CWE-1287",
"name": "Improper Validation of Specified Type of Input"
},
"notes": [
{
"category": "summary",
"text": "he urllib.parse.urlsplit() and urlparse() functions improperly validated bracketed hosts (`[]`), allowing hosts that weren\u0027t IPv6 or IPvFuture. This behavior was not conformant to RFC 3986 and potentially enabled SSRF if a URL is processed by more than one URL parser.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2024-11168"
},
{
"cve": "CVE-2024-12133",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"notes": [
{
"category": "summary",
"text": "A flaw in libtasn1 causes inefficient handling of specific certificate data. When processing a large number of elements in a certificate, libtasn1 takes much longer than expected, which can slow down or even crash the system. This flaw allows an attacker to send a specially crafted certificate, causing a denial of service attack.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2024-12133"
},
{
"cve": "CVE-2024-12243",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in GnuTLS, which relies on libtasn1 for ASN.1 data processing. Due to an inefficient algorithm in libtasn1, decoding certain DER-encoded certificate data can take excessive time, leading to increased resource consumption. This flaw allows a remote attacker to send a specially crafted certificate, causing GnuTLS to become unresponsive or slow, resulting in a denial-of-service condition.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2024-12243"
},
{
"cve": "CVE-2024-28085",
"cwe": {
"id": "CWE-150",
"name": "Improper Neutralization of Escape, Meta, or Control Sequences"
},
"notes": [
{
"category": "summary",
"text": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users\u0027 terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2024-28085"
},
{
"cve": "CVE-2024-32487",
"cwe": {
"id": "CWE-96",
"name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "less through 653 allows OS command execution via a newline character in the name of a file, because quoting is mishandled in filename.c. Exploitation typically requires use with attacker-controlled file names, such as the files extracted from an untrusted archive. Exploitation also requires the LESSOPEN environment variable, but this is set by default in many common cases.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2024-32487"
},
{
"cve": "CVE-2024-50602",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2024-50602"
},
{
"cve": "CVE-2024-52533",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing \u0027\\\\0\u0027 character.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2024-52533"
},
{
"cve": "CVE-2025-0938",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The Python standard library functions `urllib.parse.urlsplit` and `urlparse` accepted domain names that included square brackets which isn\u0027t valid according to RFC 3986. Square brackets are only meant to be used as delimiters for specifying IPv6 and IPvFuture hosts in URLs. This could result in differential parsing across the Python URL parser and other specification-compliant URL parsers.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2025-0938"
}
]
}
fkie_cve-2018-1000876
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html | Broken Link | |
| cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html | Broken Link | |
| cve@mitre.org | http://www.securityfocus.com/bid/106304 | Broken Link | |
| cve@mitre.org | https://access.redhat.com/errata/RHSA-2019:2075 | Third Party Advisory | |
| cve@mitre.org | https://sourceware.org/bugzilla/show_bug.cgi?id=23994 | Exploit, Issue Tracking, Third Party Advisory | |
| cve@mitre.org | https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=3a551c7a1b80fca579461774860574eabfd7f18f | ||
| cve@mitre.org | https://usn.ubuntu.com/4336-1/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/106304 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:2075 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://sourceware.org/bugzilla/show_bug.cgi?id=23994 | Exploit, Issue Tracking, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=3a551c7a1b80fca579461774860574eabfd7f18f | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4336-1/ | Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| gnu | binutils | * | |
| canonical | ubuntu_linux | 18.04 | |
| redhat | enterprise_linux_desktop | 7.0 | |
| redhat | enterprise_linux_server | 7.0 | |
| redhat | enterprise_linux_workstation | 7.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*",
"matchCriteriaId": "28CC79FD-6BF9-4B39-970C-C509C931C6C1",
"versionEndExcluding": "2.32",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "binutils version 2.32 and earlier contains a Integer Overflow vulnerability in objdump, bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc that can result in Integer overflow trigger heap overflow. Successful exploitation allows execution of arbitrary code.. This attack appear to be exploitable via Local. This vulnerability appears to have been fixed in after commit 3a551c7a1b80fca579461774860574eabfd7f18f."
},
{
"lang": "es",
"value": "binutils, en versiones 2.32 y anteriores, contiene una vulnerabilidad de desbordamiento de enteros en objdump, bfd_get_dynamic_reloc_upper_bound y bfd_canonicalize_dynamic_reloc que puede resultar en un desbordamiento de enteros que desencadena un desbordamiento de memoria din\u00e1mica (heap). Si se explota con \u00e9xito, podr\u00eda conducir a la ejecuci\u00f3n de c\u00f3digo arbitrario. Este ataque parece ser explotable localmente. La vulnerabilidad parece haber sido solucionada tras el commit con ID 3a551c7a1b80fca579461774860574eabfd7f18f."
}
],
"id": "CVE-2018-1000876",
"lastModified": "2024-11-21T03:40:33.533",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2018-12-20T17:29:01.033",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://www.securityfocus.com/bid/106304"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2075"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23994"
},
{
"source": "cve@mitre.org",
"url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=3a551c7a1b80fca579461774860574eabfd7f18f"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4336-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://www.securityfocus.com/bid/106304"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2075"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23994"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=3a551c7a1b80fca579461774860574eabfd7f18f"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4336-1/"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-190"
},
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
opensuse-su-2019:2432-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for binutils",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for binutils fixes the following issues:\n\nbinutils was updated to current 2.32 branch [jsc#ECO-368].\n\nIncludes following security fixes:\n\n- CVE-2018-17358: Fixed invalid memory access in _bfd_stab_section_find_nearest_line in syms.c (bsc#1109412)\n- CVE-2018-17359: Fixed invalid memory access exists in bfd_zalloc in opncls.c (bsc#1109413)\n- CVE-2018-17360: Fixed heap-based buffer over-read in bfd_getl32 in libbfd.c (bsc#1109414)\n- CVE-2018-17985: Fixed a stack consumption problem caused by the cplus_demangle_type (bsc#1116827)\n- CVE-2018-18309: Fixed an invalid memory address dereference was discovered in read_reloc in reloc.c (bsc#1111996)\n- CVE-2018-18483: Fixed get_count function provided by libiberty that allowed attackers to cause a denial of service or other unspecified impact (bsc#1112535)\n- CVE-2018-18484: Fixed stack exhaustion in the C++ demangling functions provided by libiberty, caused by recursive stack frames (bsc#1112534)\n- CVE-2018-18605: Fixed a heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup causing a denial of service (bsc#1113255)\n- CVE-2018-18606: Fixed a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments, causing denial of service (bsc#1113252)\n- CVE-2018-18607: Fixed a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section, causing denial of service (bsc#1113247)\n- CVE-2018-19931: Fixed a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h (bsc#1118831)\n- CVE-2018-19932: Fixed an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA (bsc#1118830)\n- CVE-2018-20623: Fixed a use-after-free in the error function in elfcomm.c (bsc#1121035)\n- CVE-2018-20651: Fixed a denial of service via a NULL pointer dereference in elf_link_add_object_symbols in elflink.c (bsc#1121034)\n- CVE-2018-20671: Fixed an integer overflow that can trigger a heap-based buffer overflow in load_specific_debug_section in objdump.c (bsc#1121056)\n- CVE-2018-1000876: Fixed integer overflow in bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc in objdump (bsc#1120640)\n- CVE-2019-1010180: Fixed an out of bound memory access that could lead to crashes (bsc#1142772)\n\n- enable xtensa architecture (Tensilica lc6 and related)\n- Use -ffat-lto-objects in order to provide assembly for static libs\n (bsc#1141913).\n- Fixed some LTO build issues (bsc#1133131 bsc#1133232).\n- riscv: Don\u0027t check ABI flags if no code section\n- Fixed a segfault in ld when building some versions of pacemaker (bsc#1154025, bsc#1154016).\n- Add avr, epiphany and rx to target_list so that the common binutils can handle all objects we can create with crosses (bsc#1152590).\n\nUpdate to binutils 2.32:\n\n* The binutils now support for the C-SKY processor series.\n* The x86 assembler now supports a -mvexwig=[0|1] option to control\n encoding of VEX.W-ignored (WIG) VEX instructions.\n It also has a new -mx86-used-note=[yes|no] option to generate (or\n not) x86 GNU property notes. \n* The MIPS assembler now supports the Loongson EXTensions R2 (EXT2),\n the Loongson EXTensions (EXT) instructions, the Loongson Content\n Address Memory (CAM) ASE and the Loongson MultiMedia extensions\n Instructions (MMI) ASE.\n* The addr2line, c++filt, nm and objdump tools now have a default\n limit on the maximum amount of recursion that is allowed whilst\n demangling strings. This limit can be disabled if necessary.\n* Objdump\u0027s --disassemble option can now take a parameter,\n specifying the starting symbol for disassembly. Disassembly will\n continue from this symbol up to the next symbol or the end of the\n function.\n* The BFD linker will now report property change in linker map file\n when merging GNU properties.\n* The BFD linker\u0027s -t option now doesn\u0027t report members within\n archives, unless -t is given twice. This makes it more useful\n when generating a list of files that should be packaged for a\n linker bug report.\n* The GOLD linker has improved warning messages for relocations that\n refer to discarded sections.\n\n- Improve relro support on s390 [fate#326356]\n- Fix broken debug symbols (bsc#1118644)\n- Handle ELF compressed header alignment correctly.\n\n\nThis update was imported from the SUSE:SLE-15-SP1:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2019-2432",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2432-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2019:2432-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SWUEZJ7AYL2LKLBXPYPMQQS6C42W3MB6/#SWUEZJ7AYL2LKLBXPYPMQQS6C42W3MB6"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2019:2432-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SWUEZJ7AYL2LKLBXPYPMQQS6C42W3MB6/#SWUEZJ7AYL2LKLBXPYPMQQS6C42W3MB6"
},
{
"category": "self",
"summary": "SUSE Bug 1109412",
"url": "https://bugzilla.suse.com/1109412"
},
{
"category": "self",
"summary": "SUSE Bug 1109413",
"url": "https://bugzilla.suse.com/1109413"
},
{
"category": "self",
"summary": "SUSE Bug 1109414",
"url": "https://bugzilla.suse.com/1109414"
},
{
"category": "self",
"summary": "SUSE Bug 1111996",
"url": "https://bugzilla.suse.com/1111996"
},
{
"category": "self",
"summary": "SUSE Bug 1112534",
"url": "https://bugzilla.suse.com/1112534"
},
{
"category": "self",
"summary": "SUSE Bug 1112535",
"url": "https://bugzilla.suse.com/1112535"
},
{
"category": "self",
"summary": "SUSE Bug 1113247",
"url": "https://bugzilla.suse.com/1113247"
},
{
"category": "self",
"summary": "SUSE Bug 1113252",
"url": "https://bugzilla.suse.com/1113252"
},
{
"category": "self",
"summary": "SUSE Bug 1113255",
"url": "https://bugzilla.suse.com/1113255"
},
{
"category": "self",
"summary": "SUSE Bug 1116827",
"url": "https://bugzilla.suse.com/1116827"
},
{
"category": "self",
"summary": "SUSE Bug 1118644",
"url": "https://bugzilla.suse.com/1118644"
},
{
"category": "self",
"summary": "SUSE Bug 1118830",
"url": "https://bugzilla.suse.com/1118830"
},
{
"category": "self",
"summary": "SUSE Bug 1118831",
"url": "https://bugzilla.suse.com/1118831"
},
{
"category": "self",
"summary": "SUSE Bug 1120640",
"url": "https://bugzilla.suse.com/1120640"
},
{
"category": "self",
"summary": "SUSE Bug 1121034",
"url": "https://bugzilla.suse.com/1121034"
},
{
"category": "self",
"summary": "SUSE Bug 1121035",
"url": "https://bugzilla.suse.com/1121035"
},
{
"category": "self",
"summary": "SUSE Bug 1121056",
"url": "https://bugzilla.suse.com/1121056"
},
{
"category": "self",
"summary": "SUSE Bug 1133131",
"url": "https://bugzilla.suse.com/1133131"
},
{
"category": "self",
"summary": "SUSE Bug 1133232",
"url": "https://bugzilla.suse.com/1133232"
},
{
"category": "self",
"summary": "SUSE Bug 1141913",
"url": "https://bugzilla.suse.com/1141913"
},
{
"category": "self",
"summary": "SUSE Bug 1142772",
"url": "https://bugzilla.suse.com/1142772"
},
{
"category": "self",
"summary": "SUSE Bug 1152590",
"url": "https://bugzilla.suse.com/1152590"
},
{
"category": "self",
"summary": "SUSE Bug 1154016",
"url": "https://bugzilla.suse.com/1154016"
},
{
"category": "self",
"summary": "SUSE Bug 1154025",
"url": "https://bugzilla.suse.com/1154025"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000876 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000876/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-17358 page",
"url": "https://www.suse.com/security/cve/CVE-2018-17358/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-17359 page",
"url": "https://www.suse.com/security/cve/CVE-2018-17359/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-17360 page",
"url": "https://www.suse.com/security/cve/CVE-2018-17360/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-17985 page",
"url": "https://www.suse.com/security/cve/CVE-2018-17985/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18309 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18309/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18483 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18483/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18484 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18484/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18605 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18605/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18606 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18606/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18607 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18607/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-19931 page",
"url": "https://www.suse.com/security/cve/CVE-2018-19931/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-19932 page",
"url": "https://www.suse.com/security/cve/CVE-2018-19932/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20623 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20623/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20651 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20651/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20671 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20671/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-6323 page",
"url": "https://www.suse.com/security/cve/CVE-2018-6323/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-6543 page",
"url": "https://www.suse.com/security/cve/CVE-2018-6543/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-6759 page",
"url": "https://www.suse.com/security/cve/CVE-2018-6759/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-6872 page",
"url": "https://www.suse.com/security/cve/CVE-2018-6872/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7208 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7208/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7568 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7568/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7569 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7570 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7570/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7642 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7642/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7643 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7643/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-8945 page",
"url": "https://www.suse.com/security/cve/CVE-2018-8945/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-1010180 page",
"url": "https://www.suse.com/security/cve/CVE-2019-1010180/"
}
],
"title": "Security update for binutils",
"tracking": {
"current_release_date": "2019-11-05T15:30:18Z",
"generator": {
"date": "2019-11-05T15:30:18Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2019:2432-1",
"initial_release_date": "2019-11-05T15:30:18Z",
"revision_history": [
{
"date": "2019-11-05T15:30:18Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "binutils-2.32-lp151.3.3.1.i586",
"product": {
"name": "binutils-2.32-lp151.3.3.1.i586",
"product_id": "binutils-2.32-lp151.3.3.1.i586"
}
},
{
"category": "product_version",
"name": "binutils-devel-2.32-lp151.3.3.1.i586",
"product": {
"name": "binutils-devel-2.32-lp151.3.3.1.i586",
"product_id": "binutils-devel-2.32-lp151.3.3.1.i586"
}
},
{
"category": "product_version",
"name": "binutils-gold-2.32-lp151.3.3.1.i586",
"product": {
"name": "binutils-gold-2.32-lp151.3.3.1.i586",
"product_id": "binutils-gold-2.32-lp151.3.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-2.32-lp151.3.3.1.x86_64",
"product": {
"name": "binutils-2.32-lp151.3.3.1.x86_64",
"product_id": "binutils-2.32-lp151.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "binutils-devel-2.32-lp151.3.3.1.x86_64",
"product": {
"name": "binutils-devel-2.32-lp151.3.3.1.x86_64",
"product_id": "binutils-devel-2.32-lp151.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"product": {
"name": "binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"product_id": "binutils-devel-32bit-2.32-lp151.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "binutils-gold-2.32-lp151.3.3.1.x86_64",
"product": {
"name": "binutils-gold-2.32-lp151.3.3.1.x86_64",
"product_id": "binutils-gold-2.32-lp151.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"product": {
"name": "cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"product_id": "cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"product": {
"name": "cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"product_id": "cross-arm-binutils-2.32-lp151.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"product": {
"name": "cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"product_id": "cross-avr-binutils-2.32-lp151.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"product": {
"name": "cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"product_id": "cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"product": {
"name": "cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"product_id": "cross-hppa-binutils-2.32-lp151.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"product": {
"name": "cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"product_id": "cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"product": {
"name": "cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"product_id": "cross-i386-binutils-2.32-lp151.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"product": {
"name": "cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"product_id": "cross-ia64-binutils-2.32-lp151.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"product": {
"name": "cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"product_id": "cross-m68k-binutils-2.32-lp151.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"product": {
"name": "cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"product_id": "cross-mips-binutils-2.32-lp151.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"product": {
"name": "cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"product_id": "cross-ppc-binutils-2.32-lp151.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"product": {
"name": "cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"product_id": "cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"product": {
"name": "cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"product_id": "cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"product": {
"name": "cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"product_id": "cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"product": {
"name": "cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"product_id": "cross-rx-binutils-2.32-lp151.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"product": {
"name": "cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"product_id": "cross-s390-binutils-2.32-lp151.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"product": {
"name": "cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"product_id": "cross-s390x-binutils-2.32-lp151.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"product": {
"name": "cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"product_id": "cross-sparc-binutils-2.32-lp151.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"product": {
"name": "cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"product_id": "cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-spu-binutils-2.32-lp151.3.3.1.x86_64",
"product": {
"name": "cross-spu-binutils-2.32-lp151.3.3.1.x86_64",
"product_id": "cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.1",
"product": {
"name": "openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-lp151.3.3.1.i586 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586"
},
"product_reference": "binutils-2.32-lp151.3.3.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64"
},
"product_reference": "binutils-2.32-lp151.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.32-lp151.3.3.1.i586 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586"
},
"product_reference": "binutils-devel-2.32-lp151.3.3.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64"
},
"product_reference": "binutils-devel-2.32-lp151.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-32bit-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64"
},
"product_reference": "binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-gold-2.32-lp151.3.3.1.i586 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586"
},
"product_reference": "binutils-gold-2.32-lp151.3.3.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-gold-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64"
},
"product_reference": "binutils-gold-2.32-lp151.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64"
},
"product_reference": "cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-arm-binutils-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64"
},
"product_reference": "cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-avr-binutils-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64"
},
"product_reference": "cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64"
},
"product_reference": "cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-hppa-binutils-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64"
},
"product_reference": "cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64"
},
"product_reference": "cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-i386-binutils-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64"
},
"product_reference": "cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-ia64-binutils-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64"
},
"product_reference": "cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-m68k-binutils-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64"
},
"product_reference": "cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-mips-binutils-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64"
},
"product_reference": "cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-ppc-binutils-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64"
},
"product_reference": "cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64"
},
"product_reference": "cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64"
},
"product_reference": "cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64"
},
"product_reference": "cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-rx-binutils-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64"
},
"product_reference": "cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-s390-binutils-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64"
},
"product_reference": "cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-s390x-binutils-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64"
},
"product_reference": "cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-sparc-binutils-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64"
},
"product_reference": "cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64"
},
"product_reference": "cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-spu-binutils-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
},
"product_reference": "cross-spu-binutils-2.32-lp151.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-1000876",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000876"
}
],
"notes": [
{
"category": "general",
"text": "binutils version 2.32 and earlier contains a Integer Overflow vulnerability in objdump, bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc that can result in Integer overflow trigger heap overflow. Successful exploitation allows execution of arbitrary code.. This attack appear to be exploitable via Local. This vulnerability appears to have been fixed in after commit 3a551c7a1b80fca579461774860574eabfd7f18f.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000876",
"url": "https://www.suse.com/security/cve/CVE-2018-1000876"
},
{
"category": "external",
"summary": "SUSE Bug 1120640 for CVE-2018-1000876",
"url": "https://bugzilla.suse.com/1120640"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-05T15:30:18Z",
"details": "moderate"
}
],
"title": "CVE-2018-1000876"
},
{
"cve": "CVE-2018-17358",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-17358"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory access exists in _bfd_stab_section_find_nearest_line in syms.c. Attackers could leverage this vulnerability to cause a denial of service (application crash) via a crafted ELF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-17358",
"url": "https://www.suse.com/security/cve/CVE-2018-17358"
},
{
"category": "external",
"summary": "SUSE Bug 1109412 for CVE-2018-17358",
"url": "https://bugzilla.suse.com/1109412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-05T15:30:18Z",
"details": "low"
}
],
"title": "CVE-2018-17358"
},
{
"cve": "CVE-2018-17359",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-17359"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory access exists in bfd_zalloc in opncls.c. Attackers could leverage this vulnerability to cause a denial of service (application crash) via a crafted ELF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-17359",
"url": "https://www.suse.com/security/cve/CVE-2018-17359"
},
{
"category": "external",
"summary": "SUSE Bug 1109413 for CVE-2018-17359",
"url": "https://bugzilla.suse.com/1109413"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-05T15:30:18Z",
"details": "low"
}
],
"title": "CVE-2018-17359"
},
{
"cve": "CVE-2018-17360",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-17360"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. a heap-based buffer over-read in bfd_getl32 in libbfd.c allows an attacker to cause a denial of service through a crafted PE file. This vulnerability can be triggered by the executable objdump.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-17360",
"url": "https://www.suse.com/security/cve/CVE-2018-17360"
},
{
"category": "external",
"summary": "SUSE Bug 1109414 for CVE-2018-17360",
"url": "https://bugzilla.suse.com/1109414"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-05T15:30:18Z",
"details": "low"
}
],
"title": "CVE-2018-17360"
},
{
"cve": "CVE-2018-17985",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-17985"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. There is a stack consumption problem caused by the cplus_demangle_type function making recursive calls to itself in certain scenarios involving many \u0027P\u0027 characters.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-17985",
"url": "https://www.suse.com/security/cve/CVE-2018-17985"
},
{
"category": "external",
"summary": "SUSE Bug 1116827 for CVE-2018-17985",
"url": "https://bugzilla.suse.com/1116827"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-05T15:30:18Z",
"details": "moderate"
}
],
"title": "CVE-2018-17985"
},
{
"cve": "CVE-2018-18309",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18309"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory address dereference was discovered in read_reloc in reloc.c. The vulnerability causes a segmentation fault and application crash, which leads to denial of service, as demonstrated by objdump, because of missing _bfd_clear_contents bounds checking.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18309",
"url": "https://www.suse.com/security/cve/CVE-2018-18309"
},
{
"category": "external",
"summary": "SUSE Bug 1111996 for CVE-2018-18309",
"url": "https://bugzilla.suse.com/1111996"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-05T15:30:18Z",
"details": "low"
}
],
"title": "CVE-2018-18309"
},
{
"cve": "CVE-2018-18483",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18483"
}
],
"notes": [
{
"category": "general",
"text": "The get_count function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31, allows remote attackers to cause a denial of service (malloc called with the result of an integer-overflowing calculation) or possibly have unspecified other impact via a crafted string, as demonstrated by c++filt.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18483",
"url": "https://www.suse.com/security/cve/CVE-2018-18483"
},
{
"category": "external",
"summary": "SUSE Bug 1112535 for CVE-2018-18483",
"url": "https://bugzilla.suse.com/1112535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-05T15:30:18Z",
"details": "moderate"
}
],
"title": "CVE-2018-18483"
},
{
"cve": "CVE-2018-18484",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18484"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there is a stack consumption problem caused by recursive stack frames: cplus_demangle_type, d_bare_function_type, d_function_type.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18484",
"url": "https://www.suse.com/security/cve/CVE-2018-18484"
},
{
"category": "external",
"summary": "SUSE Bug 1112534 for CVE-2018-18484",
"url": "https://bugzilla.suse.com/1112534"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-05T15:30:18Z",
"details": "moderate"
}
],
"title": "CVE-2018-18484"
},
{
"cve": "CVE-2018-18605",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18605"
}
],
"notes": [
{
"category": "general",
"text": "A heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup in merge.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31, because _bfd_add_merge_section mishandles section merges when size is not a multiple of entsize. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18605",
"url": "https://www.suse.com/security/cve/CVE-2018-18605"
},
{
"category": "external",
"summary": "SUSE Bug 1113255 for CVE-2018-18605",
"url": "https://bugzilla.suse.com/1113255"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-05T15:30:18Z",
"details": "moderate"
}
],
"title": "CVE-2018-18605"
},
{
"cve": "CVE-2018-18606",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18606"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the merge_strings function in merge.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18606",
"url": "https://www.suse.com/security/cve/CVE-2018-18606"
},
{
"category": "external",
"summary": "SUSE Bug 1113252 for CVE-2018-18606",
"url": "https://bugzilla.suse.com/1113252"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-05T15:30:18Z",
"details": "low"
}
],
"title": "CVE-2018-18606"
},
{
"cve": "CVE-2018-18607",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18607"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in elf_link_input_bfd in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18607",
"url": "https://www.suse.com/security/cve/CVE-2018-18607"
},
{
"category": "external",
"summary": "SUSE Bug 1113247 for CVE-2018-18607",
"url": "https://bugzilla.suse.com/1113247"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-05T15:30:18Z",
"details": "low"
}
],
"title": "CVE-2018-18607"
},
{
"cve": "CVE-2018-19931",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-19931"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h because the number of program headers is not restricted.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-19931",
"url": "https://www.suse.com/security/cve/CVE-2018-19931"
},
{
"category": "external",
"summary": "SUSE Bug 1118830 for CVE-2018-19931",
"url": "https://bugzilla.suse.com/1118830"
},
{
"category": "external",
"summary": "SUSE Bug 1118831 for CVE-2018-19931",
"url": "https://bugzilla.suse.com/1118831"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-05T15:30:18Z",
"details": "low"
}
],
"title": "CVE-2018-19931"
},
{
"cve": "CVE-2018-19932",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-19932"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA macro in elf.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-19932",
"url": "https://www.suse.com/security/cve/CVE-2018-19932"
},
{
"category": "external",
"summary": "SUSE Bug 1118830 for CVE-2018-19932",
"url": "https://bugzilla.suse.com/1118830"
},
{
"category": "external",
"summary": "SUSE Bug 1118831 for CVE-2018-19932",
"url": "https://bugzilla.suse.com/1118831"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-05T15:30:18Z",
"details": "low"
}
],
"title": "CVE-2018-19932"
},
{
"cve": "CVE-2018-20623",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20623"
}
],
"notes": [
{
"category": "general",
"text": "In GNU Binutils 2.31.1, there is a use-after-free in the error function in elfcomm.c when called from the process_archive function in readelf.c via a crafted ELF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20623",
"url": "https://www.suse.com/security/cve/CVE-2018-20623"
},
{
"category": "external",
"summary": "SUSE Bug 1121035 for CVE-2018-20623",
"url": "https://bugzilla.suse.com/1121035"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-05T15:30:18Z",
"details": "moderate"
}
],
"title": "CVE-2018-20623"
},
{
"cve": "CVE-2018-20651",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20651"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference was discovered in elf_link_add_object_symbols in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31.1. This occurs for a crafted ET_DYN with no program headers. A specially crafted ELF file allows remote attackers to cause a denial of service, as demonstrated by ld.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20651",
"url": "https://www.suse.com/security/cve/CVE-2018-20651"
},
{
"category": "external",
"summary": "SUSE Bug 1121034 for CVE-2018-20651",
"url": "https://bugzilla.suse.com/1121034"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-05T15:30:18Z",
"details": "low"
}
],
"title": "CVE-2018-20651"
},
{
"cve": "CVE-2018-20671",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20671"
}
],
"notes": [
{
"category": "general",
"text": "load_specific_debug_section in objdump.c in GNU Binutils through 2.31.1 contains an integer overflow vulnerability that can trigger a heap-based buffer overflow via a crafted section size.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20671",
"url": "https://www.suse.com/security/cve/CVE-2018-20671"
},
{
"category": "external",
"summary": "SUSE Bug 1121056 for CVE-2018-20671",
"url": "https://bugzilla.suse.com/1121056"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-05T15:30:18Z",
"details": "low"
}
],
"title": "CVE-2018-20671"
},
{
"cve": "CVE-2018-6323",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-6323"
}
],
"notes": [
{
"category": "general",
"text": "The elf_object_p function in elfcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, has an unsigned integer overflow because bfd_size_type multiplication is not used. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-6323",
"url": "https://www.suse.com/security/cve/CVE-2018-6323"
},
{
"category": "external",
"summary": "SUSE Bug 1077745 for CVE-2018-6323",
"url": "https://bugzilla.suse.com/1077745"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-05T15:30:18Z",
"details": "low"
}
],
"title": "CVE-2018-6323"
},
{
"cve": "CVE-2018-6543",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-6543"
}
],
"notes": [
{
"category": "general",
"text": "In GNU Binutils 2.30, there\u0027s an integer overflow in the function load_specific_debug_section() in objdump.c, which results in `malloc()` with 0 size. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-6543",
"url": "https://www.suse.com/security/cve/CVE-2018-6543"
},
{
"category": "external",
"summary": "SUSE Bug 1079103 for CVE-2018-6543",
"url": "https://bugzilla.suse.com/1079103"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-05T15:30:18Z",
"details": "moderate"
}
],
"title": "CVE-2018-6543"
},
{
"cve": "CVE-2018-6759",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-6759"
}
],
"notes": [
{
"category": "general",
"text": "The bfd_get_debug_link_info_1 function in opncls.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, has an unchecked strnlen operation. Remote attackers could leverage this vulnerability to cause a denial of service (segmentation fault) via a crafted ELF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-6759",
"url": "https://www.suse.com/security/cve/CVE-2018-6759"
},
{
"category": "external",
"summary": "SUSE Bug 1079741 for CVE-2018-6759",
"url": "https://bugzilla.suse.com/1079741"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-05T15:30:18Z",
"details": "moderate"
}
],
"title": "CVE-2018-6759"
},
{
"cve": "CVE-2018-6872",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-6872"
}
],
"notes": [
{
"category": "general",
"text": "The elf_parse_notes function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (out-of-bounds read and segmentation violation) via a note with a large alignment.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-6872",
"url": "https://www.suse.com/security/cve/CVE-2018-6872"
},
{
"category": "external",
"summary": "SUSE Bug 1080556 for CVE-2018-6872",
"url": "https://bugzilla.suse.com/1080556"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-05T15:30:18Z",
"details": "moderate"
}
],
"title": "CVE-2018-6872"
},
{
"cve": "CVE-2018-7208",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7208"
}
],
"notes": [
{
"category": "general",
"text": "In the coff_pointerize_aux function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, an index is not validated, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted file, as demonstrated by objcopy of a COFF object.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7208",
"url": "https://www.suse.com/security/cve/CVE-2018-7208"
},
{
"category": "external",
"summary": "SUSE Bug 1081527 for CVE-2018-7208",
"url": "https://bugzilla.suse.com/1081527"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-05T15:30:18Z",
"details": "low"
}
],
"title": "CVE-2018-7208"
},
{
"cve": "CVE-2018-7568",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7568"
}
],
"notes": [
{
"category": "general",
"text": "The parse_die function in dwarf1.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer overflow and application crash) via an ELF file with corrupt dwarf1 debug information, as demonstrated by nm.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7568",
"url": "https://www.suse.com/security/cve/CVE-2018-7568"
},
{
"category": "external",
"summary": "SUSE Bug 1086788 for CVE-2018-7568",
"url": "https://bugzilla.suse.com/1086788"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-05T15:30:18Z",
"details": "low"
}
],
"title": "CVE-2018-7568"
},
{
"cve": "CVE-2018-7569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7569"
}
],
"notes": [
{
"category": "general",
"text": "dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer underflow or overflow, and application crash) via an ELF file with a corrupt DWARF FORM block, as demonstrated by nm.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7569",
"url": "https://www.suse.com/security/cve/CVE-2018-7569"
},
{
"category": "external",
"summary": "SUSE Bug 1083532 for CVE-2018-7569",
"url": "https://bugzilla.suse.com/1083532"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-05T15:30:18Z",
"details": "low"
}
],
"title": "CVE-2018-7569"
},
{
"cve": "CVE-2018-7570",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7570"
}
],
"notes": [
{
"category": "general",
"text": "The assign_file_positions_for_non_load_sections function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an ELF file with a RELRO segment that lacks a matching LOAD segment, as demonstrated by objcopy.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7570",
"url": "https://www.suse.com/security/cve/CVE-2018-7570"
},
{
"category": "external",
"summary": "SUSE Bug 1083528 for CVE-2018-7570",
"url": "https://bugzilla.suse.com/1083528"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-05T15:30:18Z",
"details": "low"
}
],
"title": "CVE-2018-7570"
},
{
"cve": "CVE-2018-7642",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7642"
}
],
"notes": [
{
"category": "general",
"text": "The swap_std_reloc_in function in aoutx.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (aout_32_swap_std_reloc_out NULL pointer dereference and application crash) via a crafted ELF file, as demonstrated by objcopy.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7642",
"url": "https://www.suse.com/security/cve/CVE-2018-7642"
},
{
"category": "external",
"summary": "SUSE Bug 1086786 for CVE-2018-7642",
"url": "https://bugzilla.suse.com/1086786"
},
{
"category": "external",
"summary": "SUSE Bug 1128518 for CVE-2018-7642",
"url": "https://bugzilla.suse.com/1128518"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-05T15:30:18Z",
"details": "low"
}
],
"title": "CVE-2018-7642"
},
{
"cve": "CVE-2018-7643",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7643"
}
],
"notes": [
{
"category": "general",
"text": "The display_debug_ranges function in dwarf.c in GNU Binutils 2.30 allows remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, as demonstrated by objdump.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7643",
"url": "https://www.suse.com/security/cve/CVE-2018-7643"
},
{
"category": "external",
"summary": "SUSE Bug 1086784 for CVE-2018-7643",
"url": "https://bugzilla.suse.com/1086784"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-05T15:30:18Z",
"details": "moderate"
}
],
"title": "CVE-2018-7643"
},
{
"cve": "CVE-2018-8945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-8945"
}
],
"notes": [
{
"category": "general",
"text": "The bfd_section_from_shdr function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (segmentation fault) via a large attribute section.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-8945",
"url": "https://www.suse.com/security/cve/CVE-2018-8945"
},
{
"category": "external",
"summary": "SUSE Bug 1086608 for CVE-2018-8945",
"url": "https://bugzilla.suse.com/1086608"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-05T15:30:18Z",
"details": "low"
}
],
"title": "CVE-2018-8945"
},
{
"cve": "CVE-2019-1010180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-1010180"
}
],
"notes": [
{
"category": "general",
"text": "GNU gdb All versions is affected by: Buffer Overflow - Out of bound memory access. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. The component is: The main gdb module. The attack vector is: Open an ELF for debugging. The fixed version is: Not fixed yet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-1010180",
"url": "https://www.suse.com/security/cve/CVE-2019-1010180"
},
{
"category": "external",
"summary": "SUSE Bug 1142772 for CVE-2019-1010180",
"url": "https://bugzilla.suse.com/1142772"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-05T15:30:18Z",
"details": "important"
}
],
"title": "CVE-2019-1010180"
}
]
}
opensuse-su-2024:10651-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "binutils-2.37-1.3 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the binutils-2.37-1.3 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10651",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10651-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-9939 page",
"url": "https://www.suse.com/security/cve/CVE-2014-9939/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-12448 page",
"url": "https://www.suse.com/security/cve/CVE-2017-12448/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-12450 page",
"url": "https://www.suse.com/security/cve/CVE-2017-12450/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-12452 page",
"url": "https://www.suse.com/security/cve/CVE-2017-12452/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-12453 page",
"url": "https://www.suse.com/security/cve/CVE-2017-12453/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-12454 page",
"url": "https://www.suse.com/security/cve/CVE-2017-12454/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-12456 page",
"url": "https://www.suse.com/security/cve/CVE-2017-12456/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-12799 page",
"url": "https://www.suse.com/security/cve/CVE-2017-12799/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13757 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13757/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-14128 page",
"url": "https://www.suse.com/security/cve/CVE-2017-14128/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-14129 page",
"url": "https://www.suse.com/security/cve/CVE-2017-14129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-14130 page",
"url": "https://www.suse.com/security/cve/CVE-2017-14130/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-14333 page",
"url": "https://www.suse.com/security/cve/CVE-2017-14333/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-14529 page",
"url": "https://www.suse.com/security/cve/CVE-2017-14529/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-14729 page",
"url": "https://www.suse.com/security/cve/CVE-2017-14729/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-14745 page",
"url": "https://www.suse.com/security/cve/CVE-2017-14745/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-14974 page",
"url": "https://www.suse.com/security/cve/CVE-2017-14974/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15938 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15938/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15939 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15939/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15996 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15996/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16826 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16826/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16827 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16827/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16828 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16828/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16829 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16829/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16830 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16830/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16831 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16831/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16832 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16832/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-6965 page",
"url": "https://www.suse.com/security/cve/CVE-2017-6965/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-6966 page",
"url": "https://www.suse.com/security/cve/CVE-2017-6966/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-6969 page",
"url": "https://www.suse.com/security/cve/CVE-2017-6969/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7209 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7209/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7210 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7210/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7223 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7223/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7224 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7224/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7225 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7225/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7226 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7226/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7299 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7299/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7300 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7300/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7301 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7301/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7302 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7302/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7303 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7303/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7304 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7304/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-8392 page",
"url": "https://www.suse.com/security/cve/CVE-2017-8392/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-8393 page",
"url": "https://www.suse.com/security/cve/CVE-2017-8393/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-8394 page",
"url": "https://www.suse.com/security/cve/CVE-2017-8394/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-8396 page",
"url": "https://www.suse.com/security/cve/CVE-2017-8396/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-8421 page",
"url": "https://www.suse.com/security/cve/CVE-2017-8421/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9746 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9746/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9747 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9747/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9748 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9748/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9750 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9750/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9755 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9755/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9756 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9756/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000876 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000876/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10372 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10372/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10373 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10373/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10534 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10534/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10535 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10535/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-17358 page",
"url": "https://www.suse.com/security/cve/CVE-2018-17358/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-17359 page",
"url": "https://www.suse.com/security/cve/CVE-2018-17359/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-17360 page",
"url": "https://www.suse.com/security/cve/CVE-2018-17360/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-17985 page",
"url": "https://www.suse.com/security/cve/CVE-2018-17985/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18309 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18309/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18483 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18483/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18484 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18484/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18605 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18605/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18606 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18606/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18607 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18607/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-19931 page",
"url": "https://www.suse.com/security/cve/CVE-2018-19931/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-19932 page",
"url": "https://www.suse.com/security/cve/CVE-2018-19932/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20623 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20623/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20651 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20651/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20671 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20671/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-6323 page",
"url": "https://www.suse.com/security/cve/CVE-2018-6323/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-6543 page",
"url": "https://www.suse.com/security/cve/CVE-2018-6543/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-6759 page",
"url": "https://www.suse.com/security/cve/CVE-2018-6759/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-6872 page",
"url": "https://www.suse.com/security/cve/CVE-2018-6872/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7208 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7208/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7568 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7568/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7569 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7570 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7570/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7642 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7642/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7643 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7643/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-8945 page",
"url": "https://www.suse.com/security/cve/CVE-2018-8945/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-1010180 page",
"url": "https://www.suse.com/security/cve/CVE-2019-1010180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12972 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12972/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14250 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14250/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14444 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14444/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17450 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17450/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17451 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17451/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9074 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9075 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9077 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9077/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-16590 page",
"url": "https://www.suse.com/security/cve/CVE-2020-16590/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-16591 page",
"url": "https://www.suse.com/security/cve/CVE-2020-16591/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-16592 page",
"url": "https://www.suse.com/security/cve/CVE-2020-16592/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-16593 page",
"url": "https://www.suse.com/security/cve/CVE-2020-16593/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-16598 page",
"url": "https://www.suse.com/security/cve/CVE-2020-16598/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-16599 page",
"url": "https://www.suse.com/security/cve/CVE-2020-16599/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-35448 page",
"url": "https://www.suse.com/security/cve/CVE-2020-35448/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-35493 page",
"url": "https://www.suse.com/security/cve/CVE-2020-35493/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-35496 page",
"url": "https://www.suse.com/security/cve/CVE-2020-35496/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-35507 page",
"url": "https://www.suse.com/security/cve/CVE-2020-35507/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20197 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20197/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20284 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20284/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3487 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3487/"
}
],
"title": "binutils-2.37-1.3 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10651-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "binutils-2.37-1.3.aarch64",
"product": {
"name": "binutils-2.37-1.3.aarch64",
"product_id": "binutils-2.37-1.3.aarch64"
}
},
{
"category": "product_version",
"name": "binutils-devel-2.37-1.3.aarch64",
"product": {
"name": "binutils-devel-2.37-1.3.aarch64",
"product_id": "binutils-devel-2.37-1.3.aarch64"
}
},
{
"category": "product_version",
"name": "binutils-devel-32bit-2.37-1.3.aarch64",
"product": {
"name": "binutils-devel-32bit-2.37-1.3.aarch64",
"product_id": "binutils-devel-32bit-2.37-1.3.aarch64"
}
},
{
"category": "product_version",
"name": "binutils-gold-2.37-1.3.aarch64",
"product": {
"name": "binutils-gold-2.37-1.3.aarch64",
"product_id": "binutils-gold-2.37-1.3.aarch64"
}
},
{
"category": "product_version",
"name": "libctf-nobfd0-2.37-1.3.aarch64",
"product": {
"name": "libctf-nobfd0-2.37-1.3.aarch64",
"product_id": "libctf-nobfd0-2.37-1.3.aarch64"
}
},
{
"category": "product_version",
"name": "libctf0-2.37-1.3.aarch64",
"product": {
"name": "libctf0-2.37-1.3.aarch64",
"product_id": "libctf0-2.37-1.3.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-2.37-1.3.ppc64le",
"product": {
"name": "binutils-2.37-1.3.ppc64le",
"product_id": "binutils-2.37-1.3.ppc64le"
}
},
{
"category": "product_version",
"name": "binutils-devel-2.37-1.3.ppc64le",
"product": {
"name": "binutils-devel-2.37-1.3.ppc64le",
"product_id": "binutils-devel-2.37-1.3.ppc64le"
}
},
{
"category": "product_version",
"name": "binutils-devel-32bit-2.37-1.3.ppc64le",
"product": {
"name": "binutils-devel-32bit-2.37-1.3.ppc64le",
"product_id": "binutils-devel-32bit-2.37-1.3.ppc64le"
}
},
{
"category": "product_version",
"name": "binutils-gold-2.37-1.3.ppc64le",
"product": {
"name": "binutils-gold-2.37-1.3.ppc64le",
"product_id": "binutils-gold-2.37-1.3.ppc64le"
}
},
{
"category": "product_version",
"name": "libctf-nobfd0-2.37-1.3.ppc64le",
"product": {
"name": "libctf-nobfd0-2.37-1.3.ppc64le",
"product_id": "libctf-nobfd0-2.37-1.3.ppc64le"
}
},
{
"category": "product_version",
"name": "libctf0-2.37-1.3.ppc64le",
"product": {
"name": "libctf0-2.37-1.3.ppc64le",
"product_id": "libctf0-2.37-1.3.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-2.37-1.3.s390x",
"product": {
"name": "binutils-2.37-1.3.s390x",
"product_id": "binutils-2.37-1.3.s390x"
}
},
{
"category": "product_version",
"name": "binutils-devel-2.37-1.3.s390x",
"product": {
"name": "binutils-devel-2.37-1.3.s390x",
"product_id": "binutils-devel-2.37-1.3.s390x"
}
},
{
"category": "product_version",
"name": "binutils-devel-32bit-2.37-1.3.s390x",
"product": {
"name": "binutils-devel-32bit-2.37-1.3.s390x",
"product_id": "binutils-devel-32bit-2.37-1.3.s390x"
}
},
{
"category": "product_version",
"name": "binutils-gold-2.37-1.3.s390x",
"product": {
"name": "binutils-gold-2.37-1.3.s390x",
"product_id": "binutils-gold-2.37-1.3.s390x"
}
},
{
"category": "product_version",
"name": "libctf-nobfd0-2.37-1.3.s390x",
"product": {
"name": "libctf-nobfd0-2.37-1.3.s390x",
"product_id": "libctf-nobfd0-2.37-1.3.s390x"
}
},
{
"category": "product_version",
"name": "libctf0-2.37-1.3.s390x",
"product": {
"name": "libctf0-2.37-1.3.s390x",
"product_id": "libctf0-2.37-1.3.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-2.37-1.3.x86_64",
"product": {
"name": "binutils-2.37-1.3.x86_64",
"product_id": "binutils-2.37-1.3.x86_64"
}
},
{
"category": "product_version",
"name": "binutils-devel-2.37-1.3.x86_64",
"product": {
"name": "binutils-devel-2.37-1.3.x86_64",
"product_id": "binutils-devel-2.37-1.3.x86_64"
}
},
{
"category": "product_version",
"name": "binutils-devel-32bit-2.37-1.3.x86_64",
"product": {
"name": "binutils-devel-32bit-2.37-1.3.x86_64",
"product_id": "binutils-devel-32bit-2.37-1.3.x86_64"
}
},
{
"category": "product_version",
"name": "binutils-gold-2.37-1.3.x86_64",
"product": {
"name": "binutils-gold-2.37-1.3.x86_64",
"product_id": "binutils-gold-2.37-1.3.x86_64"
}
},
{
"category": "product_version",
"name": "libctf-nobfd0-2.37-1.3.x86_64",
"product": {
"name": "libctf-nobfd0-2.37-1.3.x86_64",
"product_id": "libctf-nobfd0-2.37-1.3.x86_64"
}
},
{
"category": "product_version",
"name": "libctf0-2.37-1.3.x86_64",
"product": {
"name": "libctf0-2.37-1.3.x86_64",
"product_id": "libctf0-2.37-1.3.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.37-1.3.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64"
},
"product_reference": "binutils-2.37-1.3.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.37-1.3.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le"
},
"product_reference": "binutils-2.37-1.3.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.37-1.3.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:binutils-2.37-1.3.s390x"
},
"product_reference": "binutils-2.37-1.3.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.37-1.3.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64"
},
"product_reference": "binutils-2.37-1.3.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.37-1.3.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64"
},
"product_reference": "binutils-devel-2.37-1.3.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.37-1.3.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le"
},
"product_reference": "binutils-devel-2.37-1.3.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.37-1.3.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x"
},
"product_reference": "binutils-devel-2.37-1.3.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.37-1.3.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64"
},
"product_reference": "binutils-devel-2.37-1.3.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-32bit-2.37-1.3.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64"
},
"product_reference": "binutils-devel-32bit-2.37-1.3.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-32bit-2.37-1.3.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le"
},
"product_reference": "binutils-devel-32bit-2.37-1.3.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-32bit-2.37-1.3.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x"
},
"product_reference": "binutils-devel-32bit-2.37-1.3.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-32bit-2.37-1.3.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64"
},
"product_reference": "binutils-devel-32bit-2.37-1.3.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-gold-2.37-1.3.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64"
},
"product_reference": "binutils-gold-2.37-1.3.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-gold-2.37-1.3.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le"
},
"product_reference": "binutils-gold-2.37-1.3.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-gold-2.37-1.3.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x"
},
"product_reference": "binutils-gold-2.37-1.3.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-gold-2.37-1.3.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64"
},
"product_reference": "binutils-gold-2.37-1.3.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libctf-nobfd0-2.37-1.3.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64"
},
"product_reference": "libctf-nobfd0-2.37-1.3.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libctf-nobfd0-2.37-1.3.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le"
},
"product_reference": "libctf-nobfd0-2.37-1.3.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libctf-nobfd0-2.37-1.3.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x"
},
"product_reference": "libctf-nobfd0-2.37-1.3.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libctf-nobfd0-2.37-1.3.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64"
},
"product_reference": "libctf-nobfd0-2.37-1.3.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libctf0-2.37-1.3.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64"
},
"product_reference": "libctf0-2.37-1.3.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libctf0-2.37-1.3.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le"
},
"product_reference": "libctf0-2.37-1.3.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libctf0-2.37-1.3.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x"
},
"product_reference": "libctf0-2.37-1.3.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libctf0-2.37-1.3.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
},
"product_reference": "libctf0-2.37-1.3.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2014-9939",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-9939"
}
],
"notes": [
{
"category": "general",
"text": "ihex.c in GNU Binutils before 2.26 contains a stack buffer overflow when printing bad bytes in Intel Hex objects.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-9939",
"url": "https://www.suse.com/security/cve/CVE-2014-9939"
},
{
"category": "external",
"summary": "SUSE Bug 1030296 for CVE-2014-9939",
"url": "https://bugzilla.suse.com/1030296"
},
{
"category": "external",
"summary": "SUSE Bug 1105209 for CVE-2014-9939",
"url": "https://bugzilla.suse.com/1105209"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2014-9939"
},
{
"cve": "CVE-2017-12448",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-12448"
}
],
"notes": [
{
"category": "general",
"text": "The bfd_cache_close function in bfd/cache.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause a heap use after free and possibly achieve code execution via a crafted nested archive file. This issue occurs because incorrect functions are called during an attempt to release memory. The issue can be addressed by better input validation in the bfd_generic_archive_p function in bfd/archive.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-12448",
"url": "https://www.suse.com/security/cve/CVE-2017-12448"
},
{
"category": "external",
"summary": "SUSE Bug 1052518 for CVE-2017-12448",
"url": "https://bugzilla.suse.com/1052518"
},
{
"category": "external",
"summary": "SUSE Bug 1059785 for CVE-2017-12448",
"url": "https://bugzilla.suse.com/1059785"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-12448"
},
{
"cve": "CVE-2017-12450",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-12450"
}
],
"notes": [
{
"category": "general",
"text": "The alpha_vms_object_p function in bfd/vms-alpha.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap write and possibly achieve code execution via a crafted vms alpha file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-12450",
"url": "https://www.suse.com/security/cve/CVE-2017-12450"
},
{
"category": "external",
"summary": "SUSE Bug 1052514 for CVE-2017-12450",
"url": "https://bugzilla.suse.com/1052514"
},
{
"category": "external",
"summary": "SUSE Bug 1059785 for CVE-2017-12450",
"url": "https://bugzilla.suse.com/1059785"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-12450"
},
{
"cve": "CVE-2017-12452",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-12452"
}
],
"notes": [
{
"category": "general",
"text": "The bfd_mach_o_i386_canonicalize_one_reloc function in bfd/mach-o-i386.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap read via a crafted mach-o file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-12452",
"url": "https://www.suse.com/security/cve/CVE-2017-12452"
},
{
"category": "external",
"summary": "SUSE Bug 1052511 for CVE-2017-12452",
"url": "https://bugzilla.suse.com/1052511"
},
{
"category": "external",
"summary": "SUSE Bug 1059785 for CVE-2017-12452",
"url": "https://bugzilla.suse.com/1059785"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-12452"
},
{
"cve": "CVE-2017-12453",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-12453"
}
],
"notes": [
{
"category": "general",
"text": "The _bfd_vms_slurp_eeom function in libbfd.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap read via a crafted vms alpha file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-12453",
"url": "https://www.suse.com/security/cve/CVE-2017-12453"
},
{
"category": "external",
"summary": "SUSE Bug 1052509 for CVE-2017-12453",
"url": "https://bugzilla.suse.com/1052509"
},
{
"category": "external",
"summary": "SUSE Bug 1059785 for CVE-2017-12453",
"url": "https://bugzilla.suse.com/1059785"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-12453"
},
{
"cve": "CVE-2017-12454",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-12454"
}
],
"notes": [
{
"category": "general",
"text": "The _bfd_vms_slurp_egsd function in bfd/vms-alpha.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an arbitrary memory read via a crafted vms alpha file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-12454",
"url": "https://www.suse.com/security/cve/CVE-2017-12454"
},
{
"category": "external",
"summary": "SUSE Bug 1052507 for CVE-2017-12454",
"url": "https://bugzilla.suse.com/1052507"
},
{
"category": "external",
"summary": "SUSE Bug 1059785 for CVE-2017-12454",
"url": "https://bugzilla.suse.com/1059785"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-12454"
},
{
"cve": "CVE-2017-12456",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-12456"
}
],
"notes": [
{
"category": "general",
"text": "The read_symbol_stabs_debugging_info function in rddbg.c in GNU Binutils 2.29 and earlier allows remote attackers to cause an out of bounds heap read via a crafted binary file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-12456",
"url": "https://www.suse.com/security/cve/CVE-2017-12456"
},
{
"category": "external",
"summary": "SUSE Bug 1052503 for CVE-2017-12456",
"url": "https://bugzilla.suse.com/1052503"
},
{
"category": "external",
"summary": "SUSE Bug 1059785 for CVE-2017-12456",
"url": "https://bugzilla.suse.com/1059785"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-12456"
},
{
"cve": "CVE-2017-12799",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-12799"
}
],
"notes": [
{
"category": "general",
"text": "The elf_read_notesfunction in bfd/elf.c in GNU Binutils 2.29 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-12799",
"url": "https://www.suse.com/security/cve/CVE-2017-12799"
},
{
"category": "external",
"summary": "SUSE Bug 1053347 for CVE-2017-12799",
"url": "https://bugzilla.suse.com/1053347"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-12799"
},
{
"cve": "CVE-2017-13757",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13757"
}
],
"notes": [
{
"category": "general",
"text": "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, does not validate the PLT section size, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file, related to elf_i386_get_synthetic_symtab in elf32-i386.c and elf_x86_64_get_synthetic_symtab in elf64-x86-64.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13757",
"url": "https://www.suse.com/security/cve/CVE-2017-13757"
},
{
"category": "external",
"summary": "SUSE Bug 1056312 for CVE-2017-13757",
"url": "https://bugzilla.suse.com/1056312"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-13757"
},
{
"cve": "CVE-2017-14128",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-14128"
}
],
"notes": [
{
"category": "general",
"text": "The decode_line_info function in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (read_1_byte heap-based buffer over-read and application crash) via a crafted ELF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-14128",
"url": "https://www.suse.com/security/cve/CVE-2017-14128"
},
{
"category": "external",
"summary": "SUSE Bug 1057139 for CVE-2017-14128",
"url": "https://bugzilla.suse.com/1057139"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-14128"
},
{
"cve": "CVE-2017-14129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-14129"
}
],
"notes": [
{
"category": "general",
"text": "The read_section function in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (parse_comp_unit heap-based buffer over-read and application crash) via a crafted ELF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-14129",
"url": "https://www.suse.com/security/cve/CVE-2017-14129"
},
{
"category": "external",
"summary": "SUSE Bug 1057144 for CVE-2017-14129",
"url": "https://bugzilla.suse.com/1057144"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-14129"
},
{
"cve": "CVE-2017-14130",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-14130"
}
],
"notes": [
{
"category": "general",
"text": "The _bfd_elf_parse_attributes function in elf-attrs.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (_bfd_elf_attr_strdup heap-based buffer over-read and application crash) via a crafted ELF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-14130",
"url": "https://www.suse.com/security/cve/CVE-2017-14130"
},
{
"category": "external",
"summary": "SUSE Bug 1057149 for CVE-2017-14130",
"url": "https://bugzilla.suse.com/1057149"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-14130"
},
{
"cve": "CVE-2017-14333",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-14333"
}
],
"notes": [
{
"category": "general",
"text": "The process_version_sections function in readelf.c in GNU Binutils 2.29 allows attackers to cause a denial of service (Integer Overflow, and hang because of a time-consuming loop) or possibly have unspecified other impact via a crafted binary file with invalid values of ent.vn_next, during \"readelf -a\" execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-14333",
"url": "https://www.suse.com/security/cve/CVE-2017-14333"
},
{
"category": "external",
"summary": "SUSE Bug 1058480 for CVE-2017-14333",
"url": "https://bugzilla.suse.com/1058480"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-14333"
},
{
"cve": "CVE-2017-14529",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-14529"
}
],
"notes": [
{
"category": "general",
"text": "The pe_print_idata function in peXXigen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, mishandles HintName vector entries, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted PE file, related to the bfd_getl16 function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-14529",
"url": "https://www.suse.com/security/cve/CVE-2017-14529"
},
{
"category": "external",
"summary": "SUSE Bug 1059050 for CVE-2017-14529",
"url": "https://bugzilla.suse.com/1059050"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-14529"
},
{
"cve": "CVE-2017-14729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-14729"
}
],
"notes": [
{
"category": "general",
"text": "The *_get_synthetic_symtab functions in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, do not ensure a unique PLT entry for a symbol, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, related to elf32-i386.c and elf64-x86-64.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-14729",
"url": "https://www.suse.com/security/cve/CVE-2017-14729"
},
{
"category": "external",
"summary": "SUSE Bug 1060621 for CVE-2017-14729",
"url": "https://bugzilla.suse.com/1060621"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-14729"
},
{
"cve": "CVE-2017-14745",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-14745"
}
],
"notes": [
{
"category": "general",
"text": "The *_get_synthetic_symtab functions in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, interpret a -1 value as a sorting count instead of an error flag, which allows remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, related to elf32-i386.c and elf64-x86-64.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-14745",
"url": "https://www.suse.com/security/cve/CVE-2017-14745"
},
{
"category": "external",
"summary": "SUSE Bug 1060599 for CVE-2017-14745",
"url": "https://bugzilla.suse.com/1060599"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-14745"
},
{
"cve": "CVE-2017-14974",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-14974"
}
],
"notes": [
{
"category": "general",
"text": "The *_get_synthetic_symtab functions in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, mishandle the failure of a certain canonicalization step, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted ELF file, related to elf32-i386.c and elf64-x86-64.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-14974",
"url": "https://www.suse.com/security/cve/CVE-2017-14974"
},
{
"category": "external",
"summary": "SUSE Bug 1061241 for CVE-2017-14974",
"url": "https://bugzilla.suse.com/1061241"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-14974"
},
{
"cve": "CVE-2017-15938",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15938"
}
],
"notes": [
{
"category": "general",
"text": "dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, miscalculates DW_FORM_ref_addr die refs in the case of a relocatable object file, which allows remote attackers to cause a denial of service (find_abstract_instance_name invalid memory read, segmentation fault, and application crash).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15938",
"url": "https://www.suse.com/security/cve/CVE-2017-15938"
},
{
"category": "external",
"summary": "SUSE Bug 1065693 for CVE-2017-15938",
"url": "https://bugzilla.suse.com/1065693"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-15938"
},
{
"cve": "CVE-2017-15939",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15939"
}
],
"notes": [
{
"category": "general",
"text": "dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, mishandles NULL files in a .debug_line file table, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted ELF file, related to concat_filename. NOTE: this issue is caused by an incomplete fix for CVE-2017-15023.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15939",
"url": "https://www.suse.com/security/cve/CVE-2017-15939"
},
{
"category": "external",
"summary": "SUSE Bug 1061623 for CVE-2017-15939",
"url": "https://bugzilla.suse.com/1061623"
},
{
"category": "external",
"summary": "SUSE Bug 1065689 for CVE-2017-15939",
"url": "https://bugzilla.suse.com/1065689"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-15939"
},
{
"cve": "CVE-2017-15996",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15996"
}
],
"notes": [
{
"category": "general",
"text": "elfcomm.c in readelf in GNU Binutils 2.29 allows remote attackers to cause a denial of service (excessive memory allocation) or possibly have unspecified other impact via a crafted ELF file that triggers a \"buffer overflow on fuzzed archive header,\" related to an uninitialized variable, an improper conditional jump, and the get_archive_member_name, process_archive_index_and_symbols, and setup_archive functions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15996",
"url": "https://www.suse.com/security/cve/CVE-2017-15996"
},
{
"category": "external",
"summary": "SUSE Bug 1065643 for CVE-2017-15996",
"url": "https://bugzilla.suse.com/1065643"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-15996"
},
{
"cve": "CVE-2017-16826",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16826"
}
],
"notes": [
{
"category": "general",
"text": "The coff_slurp_line_table function in coffcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, allows remote attackers to cause a denial of service (invalid memory access and application crash) or possibly have unspecified other impact via a crafted PE file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16826",
"url": "https://www.suse.com/security/cve/CVE-2017-16826"
},
{
"category": "external",
"summary": "SUSE Bug 1068640 for CVE-2017-16826",
"url": "https://bugzilla.suse.com/1068640"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-16826"
},
{
"cve": "CVE-2017-16827",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16827"
}
],
"notes": [
{
"category": "general",
"text": "The aout_get_external_symbols function in aoutx.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, allows remote attackers to cause a denial of service (slurp_symtab invalid free and application crash) or possibly have unspecified other impact via a crafted ELF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16827",
"url": "https://www.suse.com/security/cve/CVE-2017-16827"
},
{
"category": "external",
"summary": "SUSE Bug 1069202 for CVE-2017-16827",
"url": "https://bugzilla.suse.com/1069202"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-16827"
},
{
"cve": "CVE-2017-16828",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16828"
}
],
"notes": [
{
"category": "general",
"text": "The display_debug_frames function in dwarf.c in GNU Binutils 2.29.1 allows remote attackers to cause a denial of service (integer overflow and heap-based buffer over-read, and application crash) or possibly have unspecified other impact via a crafted ELF file, related to print_debug_frame.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16828",
"url": "https://www.suse.com/security/cve/CVE-2017-16828"
},
{
"category": "external",
"summary": "SUSE Bug 1069176 for CVE-2017-16828",
"url": "https://bugzilla.suse.com/1069176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-16828"
},
{
"cve": "CVE-2017-16829",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16829"
}
],
"notes": [
{
"category": "general",
"text": "The _bfd_elf_parse_gnu_properties function in elf-properties.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not prevent negative pointers, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a crafted ELF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16829",
"url": "https://www.suse.com/security/cve/CVE-2017-16829"
},
{
"category": "external",
"summary": "SUSE Bug 1068950 for CVE-2017-16829",
"url": "https://bugzilla.suse.com/1068950"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-16829"
},
{
"cve": "CVE-2017-16830",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16830"
}
],
"notes": [
{
"category": "general",
"text": "The print_gnu_property_note function in readelf.c in GNU Binutils 2.29.1 does not have integer-overflow protection on 32-bit platforms, which allows remote attackers to cause a denial of service (segmentation violation and application crash) or possibly have unspecified other impact via a crafted ELF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16830",
"url": "https://www.suse.com/security/cve/CVE-2017-16830"
},
{
"category": "external",
"summary": "SUSE Bug 1068888 for CVE-2017-16830",
"url": "https://bugzilla.suse.com/1068888"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-16830"
},
{
"cve": "CVE-2017-16831",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16831"
}
],
"notes": [
{
"category": "general",
"text": "coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not validate the symbol count, which allows remote attackers to cause a denial of service (integer overflow and application crash, or excessive memory allocation) or possibly have unspecified other impact via a crafted PE file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16831",
"url": "https://www.suse.com/security/cve/CVE-2017-16831"
},
{
"category": "external",
"summary": "SUSE Bug 1068887 for CVE-2017-16831",
"url": "https://bugzilla.suse.com/1068887"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-16831"
},
{
"cve": "CVE-2017-16832",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16832"
}
],
"notes": [
{
"category": "general",
"text": "The pe_bfd_read_buildid function in peicode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not validate size and offset values in the data dictionary, which allows remote attackers to cause a denial of service (segmentation violation and application crash) or possibly have unspecified other impact via a crafted PE file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16832",
"url": "https://www.suse.com/security/cve/CVE-2017-16832"
},
{
"category": "external",
"summary": "SUSE Bug 1068643 for CVE-2017-16832",
"url": "https://bugzilla.suse.com/1068643"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-16832"
},
{
"cve": "CVE-2017-6965",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-6965"
}
],
"notes": [
{
"category": "general",
"text": "readelf in GNU Binutils 2.28 writes to illegal addresses while processing corrupt input files containing symbol-difference relocations, leading to a heap-based buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-6965",
"url": "https://www.suse.com/security/cve/CVE-2017-6965"
},
{
"category": "external",
"summary": "SUSE Bug 1029909 for CVE-2017-6965",
"url": "https://bugzilla.suse.com/1029909"
},
{
"category": "external",
"summary": "SUSE Bug 1030295 for CVE-2017-6965",
"url": "https://bugzilla.suse.com/1030295"
},
{
"category": "external",
"summary": "SUSE Bug 1030296 for CVE-2017-6965",
"url": "https://bugzilla.suse.com/1030296"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-6965"
},
{
"cve": "CVE-2017-6966",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-6966"
}
],
"notes": [
{
"category": "general",
"text": "readelf in GNU Binutils 2.28 has a use-after-free (specifically read-after-free) error while processing multiple, relocated sections in an MSP430 binary. This is caused by mishandling of an invalid symbol index, and mishandling of state across invocations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-6966",
"url": "https://www.suse.com/security/cve/CVE-2017-6966"
},
{
"category": "external",
"summary": "SUSE Bug 1029908 for CVE-2017-6966",
"url": "https://bugzilla.suse.com/1029908"
},
{
"category": "external",
"summary": "SUSE Bug 1030295 for CVE-2017-6966",
"url": "https://bugzilla.suse.com/1030295"
},
{
"category": "external",
"summary": "SUSE Bug 1030296 for CVE-2017-6966",
"url": "https://bugzilla.suse.com/1030296"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-6966"
},
{
"cve": "CVE-2017-6969",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-6969"
}
],
"notes": [
{
"category": "general",
"text": "readelf in GNU Binutils 2.28 is vulnerable to a heap-based buffer over-read while processing corrupt RL78 binaries. The vulnerability can trigger program crashes. It may lead to an information leak as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-6969",
"url": "https://www.suse.com/security/cve/CVE-2017-6969"
},
{
"category": "external",
"summary": "SUSE Bug 1029907 for CVE-2017-6969",
"url": "https://bugzilla.suse.com/1029907"
},
{
"category": "external",
"summary": "SUSE Bug 1030295 for CVE-2017-6969",
"url": "https://bugzilla.suse.com/1030295"
},
{
"category": "external",
"summary": "SUSE Bug 1030296 for CVE-2017-6969",
"url": "https://bugzilla.suse.com/1030296"
},
{
"category": "external",
"summary": "SUSE Bug 1105209 for CVE-2017-6969",
"url": "https://bugzilla.suse.com/1105209"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2017-6969"
},
{
"cve": "CVE-2017-7209",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7209"
}
],
"notes": [
{
"category": "general",
"text": "The dump_section_as_bytes function in readelf in GNU Binutils 2.28 accesses a NULL pointer while reading section contents in a corrupt binary, leading to a program crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7209",
"url": "https://www.suse.com/security/cve/CVE-2017-7209"
},
{
"category": "external",
"summary": "SUSE Bug 1030295 for CVE-2017-7209",
"url": "https://bugzilla.suse.com/1030295"
},
{
"category": "external",
"summary": "SUSE Bug 1030296 for CVE-2017-7209",
"url": "https://bugzilla.suse.com/1030296"
},
{
"category": "external",
"summary": "SUSE Bug 1030298 for CVE-2017-7209",
"url": "https://bugzilla.suse.com/1030298"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-7209"
},
{
"cve": "CVE-2017-7210",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7210"
}
],
"notes": [
{
"category": "general",
"text": "objdump in GNU Binutils 2.28 is vulnerable to multiple heap-based buffer over-reads (of size 1 and size 8) while handling corrupt STABS enum type strings in a crafted object file, leading to program crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7210",
"url": "https://www.suse.com/security/cve/CVE-2017-7210"
},
{
"category": "external",
"summary": "SUSE Bug 1030295 for CVE-2017-7210",
"url": "https://bugzilla.suse.com/1030295"
},
{
"category": "external",
"summary": "SUSE Bug 1030296 for CVE-2017-7210",
"url": "https://bugzilla.suse.com/1030296"
},
{
"category": "external",
"summary": "SUSE Bug 1030297 for CVE-2017-7210",
"url": "https://bugzilla.suse.com/1030297"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-7210"
},
{
"cve": "CVE-2017-7223",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7223"
}
],
"notes": [
{
"category": "general",
"text": "GNU assembler in GNU Binutils 2.28 is vulnerable to a global buffer overflow (of size 1) while attempting to unget an EOF character from the input stream, potentially leading to a program crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7223",
"url": "https://www.suse.com/security/cve/CVE-2017-7223"
},
{
"category": "external",
"summary": "SUSE Bug 1030295 for CVE-2017-7223",
"url": "https://bugzilla.suse.com/1030295"
},
{
"category": "external",
"summary": "SUSE Bug 1030296 for CVE-2017-7223",
"url": "https://bugzilla.suse.com/1030296"
},
{
"category": "external",
"summary": "SUSE Bug 1030589 for CVE-2017-7223",
"url": "https://bugzilla.suse.com/1030589"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-7223"
},
{
"cve": "CVE-2017-7224",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7224"
}
],
"notes": [
{
"category": "general",
"text": "The find_nearest_line function in objdump in GNU Binutils 2.28 is vulnerable to an invalid write (of size 1) while disassembling a corrupt binary that contains an empty function name, leading to a program crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7224",
"url": "https://www.suse.com/security/cve/CVE-2017-7224"
},
{
"category": "external",
"summary": "SUSE Bug 1030295 for CVE-2017-7224",
"url": "https://bugzilla.suse.com/1030295"
},
{
"category": "external",
"summary": "SUSE Bug 1030296 for CVE-2017-7224",
"url": "https://bugzilla.suse.com/1030296"
},
{
"category": "external",
"summary": "SUSE Bug 1030588 for CVE-2017-7224",
"url": "https://bugzilla.suse.com/1030588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-7224"
},
{
"cve": "CVE-2017-7225",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7225"
}
],
"notes": [
{
"category": "general",
"text": "The find_nearest_line function in addr2line in GNU Binutils 2.28 does not handle the case where the main file name and the directory name are both empty, triggering a NULL pointer dereference and an invalid write, and leading to a program crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7225",
"url": "https://www.suse.com/security/cve/CVE-2017-7225"
},
{
"category": "external",
"summary": "SUSE Bug 1030295 for CVE-2017-7225",
"url": "https://bugzilla.suse.com/1030295"
},
{
"category": "external",
"summary": "SUSE Bug 1030296 for CVE-2017-7225",
"url": "https://bugzilla.suse.com/1030296"
},
{
"category": "external",
"summary": "SUSE Bug 1030585 for CVE-2017-7225",
"url": "https://bugzilla.suse.com/1030585"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-7225"
},
{
"cve": "CVE-2017-7226",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7226"
}
],
"notes": [
{
"category": "general",
"text": "The pe_ILF_object_p function in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to a heap-based buffer over-read of size 4049 because it uses the strlen function instead of strnlen, leading to program crashes in several utilities such as addr2line, size, and strings. It could lead to information disclosure as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7226",
"url": "https://www.suse.com/security/cve/CVE-2017-7226"
},
{
"category": "external",
"summary": "SUSE Bug 1030295 for CVE-2017-7226",
"url": "https://bugzilla.suse.com/1030295"
},
{
"category": "external",
"summary": "SUSE Bug 1030296 for CVE-2017-7226",
"url": "https://bugzilla.suse.com/1030296"
},
{
"category": "external",
"summary": "SUSE Bug 1030584 for CVE-2017-7226",
"url": "https://bugzilla.suse.com/1030584"
},
{
"category": "external",
"summary": "SUSE Bug 1105209 for CVE-2017-7226",
"url": "https://bugzilla.suse.com/1105209"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2017-7226"
},
{
"cve": "CVE-2017-7299",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7299"
}
],
"notes": [
{
"category": "general",
"text": "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has an invalid read (of size 8) because the code to emit relocs (bfd_elf_final_link function in bfd/elflink.c) does not check the format of the input file before trying to read the ELF reloc section header. The vulnerability leads to a GNU linker (ld) program crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7299",
"url": "https://www.suse.com/security/cve/CVE-2017-7299"
},
{
"category": "external",
"summary": "SUSE Bug 1030295 for CVE-2017-7299",
"url": "https://bugzilla.suse.com/1030295"
},
{
"category": "external",
"summary": "SUSE Bug 1031644 for CVE-2017-7299",
"url": "https://bugzilla.suse.com/1031644"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-7299"
},
{
"cve": "CVE-2017-7300",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7300"
}
],
"notes": [
{
"category": "general",
"text": "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has an aout_link_add_symbols function in bfd/aoutx.h that is vulnerable to a heap-based buffer over-read (off-by-one) because of an incomplete check for invalid string offsets while loading symbols, leading to a GNU linker (ld) program crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7300",
"url": "https://www.suse.com/security/cve/CVE-2017-7300"
},
{
"category": "external",
"summary": "SUSE Bug 1030295 for CVE-2017-7300",
"url": "https://bugzilla.suse.com/1030295"
},
{
"category": "external",
"summary": "SUSE Bug 1031656 for CVE-2017-7300",
"url": "https://bugzilla.suse.com/1031656"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-7300"
},
{
"cve": "CVE-2017-7301",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7301"
}
],
"notes": [
{
"category": "general",
"text": "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has an aout_link_add_symbols function in bfd/aoutx.h that has an off-by-one vulnerability because it does not carefully check the string offset. The vulnerability could lead to a GNU linker (ld) program crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7301",
"url": "https://www.suse.com/security/cve/CVE-2017-7301"
},
{
"category": "external",
"summary": "SUSE Bug 1030295 for CVE-2017-7301",
"url": "https://bugzilla.suse.com/1030295"
},
{
"category": "external",
"summary": "SUSE Bug 1031638 for CVE-2017-7301",
"url": "https://bugzilla.suse.com/1031638"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-7301"
},
{
"cve": "CVE-2017-7302",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7302"
}
],
"notes": [
{
"category": "general",
"text": "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has a swap_std_reloc_out function in bfd/aoutx.h that is vulnerable to an invalid read (of size 4) because of missing checks for relocs that could not be recognised. This vulnerability causes Binutils utilities like strip to crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7302",
"url": "https://www.suse.com/security/cve/CVE-2017-7302"
},
{
"category": "external",
"summary": "SUSE Bug 1030295 for CVE-2017-7302",
"url": "https://bugzilla.suse.com/1030295"
},
{
"category": "external",
"summary": "SUSE Bug 1031595 for CVE-2017-7302",
"url": "https://bugzilla.suse.com/1031595"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-7302"
},
{
"cve": "CVE-2017-7303",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7303"
}
],
"notes": [
{
"category": "general",
"text": "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read (of size 4) because of missing a check (in the find_link function) for null headers before attempting to match them. This vulnerability causes Binutils utilities like strip to crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7303",
"url": "https://www.suse.com/security/cve/CVE-2017-7303"
},
{
"category": "external",
"summary": "SUSE Bug 1030295 for CVE-2017-7303",
"url": "https://bugzilla.suse.com/1030295"
},
{
"category": "external",
"summary": "SUSE Bug 1031593 for CVE-2017-7303",
"url": "https://bugzilla.suse.com/1031593"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-7303"
},
{
"cve": "CVE-2017-7304",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7304"
}
],
"notes": [
{
"category": "general",
"text": "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read (of size 8) because of missing a check (in the copy_special_section_fields function) for an invalid sh_link field before attempting to follow it. This vulnerability causes Binutils utilities like strip to crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7304",
"url": "https://www.suse.com/security/cve/CVE-2017-7304"
},
{
"category": "external",
"summary": "SUSE Bug 1030295 for CVE-2017-7304",
"url": "https://bugzilla.suse.com/1030295"
},
{
"category": "external",
"summary": "SUSE Bug 1031590 for CVE-2017-7304",
"url": "https://bugzilla.suse.com/1031590"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-7304"
},
{
"cve": "CVE-2017-8392",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-8392"
}
],
"notes": [
{
"category": "general",
"text": "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 8 because of missing a check to determine whether symbols are NULL in the _bfd_dwarf2_find_nearest_line function. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objdump, to crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-8392",
"url": "https://www.suse.com/security/cve/CVE-2017-8392"
},
{
"category": "external",
"summary": "SUSE Bug 1037052 for CVE-2017-8392",
"url": "https://bugzilla.suse.com/1037052"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-8392"
},
{
"cve": "CVE-2017-8393",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-8393"
}
],
"notes": [
{
"category": "general",
"text": "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to a global buffer over-read error because of an assumption made by code that runs for objcopy and strip, that SHT_REL/SHR_RELA sections are always named starting with a .rel/.rela prefix. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objcopy and strip, to crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-8393",
"url": "https://www.suse.com/security/cve/CVE-2017-8393"
},
{
"category": "external",
"summary": "SUSE Bug 1037057 for CVE-2017-8393",
"url": "https://bugzilla.suse.com/1037057"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-8393"
},
{
"cve": "CVE-2017-8394",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-8394"
}
],
"notes": [
{
"category": "general",
"text": "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 4 due to NULL pointer dereferencing of _bfd_elf_large_com_section. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objcopy, to crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-8394",
"url": "https://www.suse.com/security/cve/CVE-2017-8394"
},
{
"category": "external",
"summary": "SUSE Bug 1037061 for CVE-2017-8394",
"url": "https://bugzilla.suse.com/1037061"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-8394"
},
{
"cve": "CVE-2017-8396",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-8396"
}
],
"notes": [
{
"category": "general",
"text": "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 1 because the existing reloc offset range tests didn\u0027t catch small negative offsets less than the size of the reloc field. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objdump, to crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-8396",
"url": "https://www.suse.com/security/cve/CVE-2017-8396"
},
{
"category": "external",
"summary": "SUSE Bug 1037066 for CVE-2017-8396",
"url": "https://bugzilla.suse.com/1037066"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-8396"
},
{
"cve": "CVE-2017-8421",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-8421"
}
],
"notes": [
{
"category": "general",
"text": "The function coff_set_alignment_hook in coffcode.h in Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has a memory leak vulnerability which can cause memory exhaustion in objdump via a crafted PE file. Additional validation in dump_relocs_in_section in objdump.c can resolve this.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-8421",
"url": "https://www.suse.com/security/cve/CVE-2017-8421"
},
{
"category": "external",
"summary": "SUSE Bug 1037273 for CVE-2017-8421",
"url": "https://bugzilla.suse.com/1037273"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-8421"
},
{
"cve": "CVE-2017-9746",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9746"
}
],
"notes": [
{
"category": "general",
"text": "The disassemble_bytes function in objdump.c in GNU Binutils 2.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of rae insns printing for this file during \"objdump -D\" execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9746",
"url": "https://www.suse.com/security/cve/CVE-2017-9746"
},
{
"category": "external",
"summary": "SUSE Bug 1030296 for CVE-2017-9746",
"url": "https://bugzilla.suse.com/1030296"
},
{
"category": "external",
"summary": "SUSE Bug 1044891 for CVE-2017-9746",
"url": "https://bugzilla.suse.com/1044891"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-9746"
},
{
"cve": "CVE-2017-9747",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9747"
}
],
"notes": [
{
"category": "general",
"text": "The ieee_archive_p function in bfd/ieee.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, might allow remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution. NOTE: this may be related to a compiler bug.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9747",
"url": "https://www.suse.com/security/cve/CVE-2017-9747"
},
{
"category": "external",
"summary": "SUSE Bug 1030296 for CVE-2017-9747",
"url": "https://bugzilla.suse.com/1030296"
},
{
"category": "external",
"summary": "SUSE Bug 1044897 for CVE-2017-9747",
"url": "https://bugzilla.suse.com/1044897"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-9747"
},
{
"cve": "CVE-2017-9748",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9748"
}
],
"notes": [
{
"category": "general",
"text": "The ieee_object_p function in bfd/ieee.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, might allow remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution. NOTE: this may be related to a compiler bug.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9748",
"url": "https://www.suse.com/security/cve/CVE-2017-9748"
},
{
"category": "external",
"summary": "SUSE Bug 1030296 for CVE-2017-9748",
"url": "https://bugzilla.suse.com/1030296"
},
{
"category": "external",
"summary": "SUSE Bug 1044901 for CVE-2017-9748",
"url": "https://bugzilla.suse.com/1044901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-9748"
},
{
"cve": "CVE-2017-9750",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9750"
}
],
"notes": [
{
"category": "general",
"text": "opcodes/rx-decode.opc in GNU Binutils 2.28 lacks bounds checks for certain scale arrays, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9750",
"url": "https://www.suse.com/security/cve/CVE-2017-9750"
},
{
"category": "external",
"summary": "SUSE Bug 1030296 for CVE-2017-9750",
"url": "https://bugzilla.suse.com/1030296"
},
{
"category": "external",
"summary": "SUSE Bug 1044909 for CVE-2017-9750",
"url": "https://bugzilla.suse.com/1044909"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-9750"
},
{
"cve": "CVE-2017-9755",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9755"
}
],
"notes": [
{
"category": "general",
"text": "opcodes/i386-dis.c in GNU Binutils 2.28 does not consider the number of registers for bnd mode, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9755",
"url": "https://www.suse.com/security/cve/CVE-2017-9755"
},
{
"category": "external",
"summary": "SUSE Bug 1030296 for CVE-2017-9755",
"url": "https://bugzilla.suse.com/1030296"
},
{
"category": "external",
"summary": "SUSE Bug 1044925 for CVE-2017-9755",
"url": "https://bugzilla.suse.com/1044925"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-9755"
},
{
"cve": "CVE-2017-9756",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9756"
}
],
"notes": [
{
"category": "general",
"text": "The aarch64_ext_ldst_reglist function in opcodes/aarch64-dis.c in GNU Binutils 2.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9756",
"url": "https://www.suse.com/security/cve/CVE-2017-9756"
},
{
"category": "external",
"summary": "SUSE Bug 1030296 for CVE-2017-9756",
"url": "https://bugzilla.suse.com/1030296"
},
{
"category": "external",
"summary": "SUSE Bug 1044927 for CVE-2017-9756",
"url": "https://bugzilla.suse.com/1044927"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-9756"
},
{
"cve": "CVE-2018-1000876",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000876"
}
],
"notes": [
{
"category": "general",
"text": "binutils version 2.32 and earlier contains a Integer Overflow vulnerability in objdump, bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc that can result in Integer overflow trigger heap overflow. Successful exploitation allows execution of arbitrary code.. This attack appear to be exploitable via Local. This vulnerability appears to have been fixed in after commit 3a551c7a1b80fca579461774860574eabfd7f18f.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000876",
"url": "https://www.suse.com/security/cve/CVE-2018-1000876"
},
{
"category": "external",
"summary": "SUSE Bug 1120640 for CVE-2018-1000876",
"url": "https://bugzilla.suse.com/1120640"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-1000876"
},
{
"cve": "CVE-2018-10372",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10372"
}
],
"notes": [
{
"category": "general",
"text": "process_cu_tu_index in dwarf.c in GNU Binutils 2.30 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted binary file, as demonstrated by readelf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10372",
"url": "https://www.suse.com/security/cve/CVE-2018-10372"
},
{
"category": "external",
"summary": "SUSE Bug 1091015 for CVE-2018-10372",
"url": "https://bugzilla.suse.com/1091015"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-10372"
},
{
"cve": "CVE-2018-10373",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10373"
}
],
"notes": [
{
"category": "general",
"text": "concat_filename in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted binary file, as demonstrated by nm-new.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10373",
"url": "https://www.suse.com/security/cve/CVE-2018-10373"
},
{
"category": "external",
"summary": "SUSE Bug 1090997 for CVE-2018-10373",
"url": "https://bugzilla.suse.com/1090997"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-10373"
},
{
"cve": "CVE-2018-10534",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10534"
}
],
"notes": [
{
"category": "general",
"text": "The _bfd_XX_bfd_copy_private_bfd_data_common function in peXXigen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, processes a negative Data Directory size with an unbounded loop that increases the value of (external_IMAGE_DEBUG_DIRECTORY) *edd so that the address exceeds its own memory region, resulting in an out-of-bounds memory write, as demonstrated by objcopy copying private info with _bfd_pex64_bfd_copy_private_bfd_data_common in pex64igen.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10534",
"url": "https://www.suse.com/security/cve/CVE-2018-10534"
},
{
"category": "external",
"summary": "SUSE Bug 1091368 for CVE-2018-10534",
"url": "https://bugzilla.suse.com/1091368"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-10534"
},
{
"cve": "CVE-2018-10535",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10535"
}
],
"notes": [
{
"category": "general",
"text": "The ignore_section_sym function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, does not validate the output_section pointer in the case of a symtab entry with a \"SECTION\" type that has a \"0\" value, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file, as demonstrated by objcopy.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10535",
"url": "https://www.suse.com/security/cve/CVE-2018-10535"
},
{
"category": "external",
"summary": "SUSE Bug 1091365 for CVE-2018-10535",
"url": "https://bugzilla.suse.com/1091365"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-10535"
},
{
"cve": "CVE-2018-17358",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-17358"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory access exists in _bfd_stab_section_find_nearest_line in syms.c. Attackers could leverage this vulnerability to cause a denial of service (application crash) via a crafted ELF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-17358",
"url": "https://www.suse.com/security/cve/CVE-2018-17358"
},
{
"category": "external",
"summary": "SUSE Bug 1109412 for CVE-2018-17358",
"url": "https://bugzilla.suse.com/1109412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-17358"
},
{
"cve": "CVE-2018-17359",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-17359"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory access exists in bfd_zalloc in opncls.c. Attackers could leverage this vulnerability to cause a denial of service (application crash) via a crafted ELF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-17359",
"url": "https://www.suse.com/security/cve/CVE-2018-17359"
},
{
"category": "external",
"summary": "SUSE Bug 1109413 for CVE-2018-17359",
"url": "https://bugzilla.suse.com/1109413"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-17359"
},
{
"cve": "CVE-2018-17360",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-17360"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. a heap-based buffer over-read in bfd_getl32 in libbfd.c allows an attacker to cause a denial of service through a crafted PE file. This vulnerability can be triggered by the executable objdump.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-17360",
"url": "https://www.suse.com/security/cve/CVE-2018-17360"
},
{
"category": "external",
"summary": "SUSE Bug 1109414 for CVE-2018-17360",
"url": "https://bugzilla.suse.com/1109414"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-17360"
},
{
"cve": "CVE-2018-17985",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-17985"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. There is a stack consumption problem caused by the cplus_demangle_type function making recursive calls to itself in certain scenarios involving many \u0027P\u0027 characters.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-17985",
"url": "https://www.suse.com/security/cve/CVE-2018-17985"
},
{
"category": "external",
"summary": "SUSE Bug 1116827 for CVE-2018-17985",
"url": "https://bugzilla.suse.com/1116827"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-17985"
},
{
"cve": "CVE-2018-18309",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18309"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory address dereference was discovered in read_reloc in reloc.c. The vulnerability causes a segmentation fault and application crash, which leads to denial of service, as demonstrated by objdump, because of missing _bfd_clear_contents bounds checking.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18309",
"url": "https://www.suse.com/security/cve/CVE-2018-18309"
},
{
"category": "external",
"summary": "SUSE Bug 1111996 for CVE-2018-18309",
"url": "https://bugzilla.suse.com/1111996"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-18309"
},
{
"cve": "CVE-2018-18483",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18483"
}
],
"notes": [
{
"category": "general",
"text": "The get_count function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31, allows remote attackers to cause a denial of service (malloc called with the result of an integer-overflowing calculation) or possibly have unspecified other impact via a crafted string, as demonstrated by c++filt.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18483",
"url": "https://www.suse.com/security/cve/CVE-2018-18483"
},
{
"category": "external",
"summary": "SUSE Bug 1112535 for CVE-2018-18483",
"url": "https://bugzilla.suse.com/1112535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-18483"
},
{
"cve": "CVE-2018-18484",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18484"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there is a stack consumption problem caused by recursive stack frames: cplus_demangle_type, d_bare_function_type, d_function_type.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18484",
"url": "https://www.suse.com/security/cve/CVE-2018-18484"
},
{
"category": "external",
"summary": "SUSE Bug 1112534 for CVE-2018-18484",
"url": "https://bugzilla.suse.com/1112534"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-18484"
},
{
"cve": "CVE-2018-18605",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18605"
}
],
"notes": [
{
"category": "general",
"text": "A heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup in merge.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31, because _bfd_add_merge_section mishandles section merges when size is not a multiple of entsize. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18605",
"url": "https://www.suse.com/security/cve/CVE-2018-18605"
},
{
"category": "external",
"summary": "SUSE Bug 1113255 for CVE-2018-18605",
"url": "https://bugzilla.suse.com/1113255"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-18605"
},
{
"cve": "CVE-2018-18606",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18606"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the merge_strings function in merge.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18606",
"url": "https://www.suse.com/security/cve/CVE-2018-18606"
},
{
"category": "external",
"summary": "SUSE Bug 1113252 for CVE-2018-18606",
"url": "https://bugzilla.suse.com/1113252"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-18606"
},
{
"cve": "CVE-2018-18607",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18607"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in elf_link_input_bfd in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18607",
"url": "https://www.suse.com/security/cve/CVE-2018-18607"
},
{
"category": "external",
"summary": "SUSE Bug 1113247 for CVE-2018-18607",
"url": "https://bugzilla.suse.com/1113247"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-18607"
},
{
"cve": "CVE-2018-19931",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-19931"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h because the number of program headers is not restricted.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-19931",
"url": "https://www.suse.com/security/cve/CVE-2018-19931"
},
{
"category": "external",
"summary": "SUSE Bug 1118830 for CVE-2018-19931",
"url": "https://bugzilla.suse.com/1118830"
},
{
"category": "external",
"summary": "SUSE Bug 1118831 for CVE-2018-19931",
"url": "https://bugzilla.suse.com/1118831"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-19931"
},
{
"cve": "CVE-2018-19932",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-19932"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA macro in elf.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-19932",
"url": "https://www.suse.com/security/cve/CVE-2018-19932"
},
{
"category": "external",
"summary": "SUSE Bug 1118830 for CVE-2018-19932",
"url": "https://bugzilla.suse.com/1118830"
},
{
"category": "external",
"summary": "SUSE Bug 1118831 for CVE-2018-19932",
"url": "https://bugzilla.suse.com/1118831"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-19932"
},
{
"cve": "CVE-2018-20623",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20623"
}
],
"notes": [
{
"category": "general",
"text": "In GNU Binutils 2.31.1, there is a use-after-free in the error function in elfcomm.c when called from the process_archive function in readelf.c via a crafted ELF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20623",
"url": "https://www.suse.com/security/cve/CVE-2018-20623"
},
{
"category": "external",
"summary": "SUSE Bug 1121035 for CVE-2018-20623",
"url": "https://bugzilla.suse.com/1121035"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-20623"
},
{
"cve": "CVE-2018-20651",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20651"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference was discovered in elf_link_add_object_symbols in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31.1. This occurs for a crafted ET_DYN with no program headers. A specially crafted ELF file allows remote attackers to cause a denial of service, as demonstrated by ld.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20651",
"url": "https://www.suse.com/security/cve/CVE-2018-20651"
},
{
"category": "external",
"summary": "SUSE Bug 1121034 for CVE-2018-20651",
"url": "https://bugzilla.suse.com/1121034"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-20651"
},
{
"cve": "CVE-2018-20671",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20671"
}
],
"notes": [
{
"category": "general",
"text": "load_specific_debug_section in objdump.c in GNU Binutils through 2.31.1 contains an integer overflow vulnerability that can trigger a heap-based buffer overflow via a crafted section size.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20671",
"url": "https://www.suse.com/security/cve/CVE-2018-20671"
},
{
"category": "external",
"summary": "SUSE Bug 1121056 for CVE-2018-20671",
"url": "https://bugzilla.suse.com/1121056"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-20671"
},
{
"cve": "CVE-2018-6323",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-6323"
}
],
"notes": [
{
"category": "general",
"text": "The elf_object_p function in elfcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, has an unsigned integer overflow because bfd_size_type multiplication is not used. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-6323",
"url": "https://www.suse.com/security/cve/CVE-2018-6323"
},
{
"category": "external",
"summary": "SUSE Bug 1077745 for CVE-2018-6323",
"url": "https://bugzilla.suse.com/1077745"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-6323"
},
{
"cve": "CVE-2018-6543",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-6543"
}
],
"notes": [
{
"category": "general",
"text": "In GNU Binutils 2.30, there\u0027s an integer overflow in the function load_specific_debug_section() in objdump.c, which results in `malloc()` with 0 size. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-6543",
"url": "https://www.suse.com/security/cve/CVE-2018-6543"
},
{
"category": "external",
"summary": "SUSE Bug 1079103 for CVE-2018-6543",
"url": "https://bugzilla.suse.com/1079103"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-6543"
},
{
"cve": "CVE-2018-6759",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-6759"
}
],
"notes": [
{
"category": "general",
"text": "The bfd_get_debug_link_info_1 function in opncls.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, has an unchecked strnlen operation. Remote attackers could leverage this vulnerability to cause a denial of service (segmentation fault) via a crafted ELF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-6759",
"url": "https://www.suse.com/security/cve/CVE-2018-6759"
},
{
"category": "external",
"summary": "SUSE Bug 1079741 for CVE-2018-6759",
"url": "https://bugzilla.suse.com/1079741"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-6759"
},
{
"cve": "CVE-2018-6872",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-6872"
}
],
"notes": [
{
"category": "general",
"text": "The elf_parse_notes function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (out-of-bounds read and segmentation violation) via a note with a large alignment.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-6872",
"url": "https://www.suse.com/security/cve/CVE-2018-6872"
},
{
"category": "external",
"summary": "SUSE Bug 1080556 for CVE-2018-6872",
"url": "https://bugzilla.suse.com/1080556"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-6872"
},
{
"cve": "CVE-2018-7208",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7208"
}
],
"notes": [
{
"category": "general",
"text": "In the coff_pointerize_aux function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, an index is not validated, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted file, as demonstrated by objcopy of a COFF object.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7208",
"url": "https://www.suse.com/security/cve/CVE-2018-7208"
},
{
"category": "external",
"summary": "SUSE Bug 1081527 for CVE-2018-7208",
"url": "https://bugzilla.suse.com/1081527"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-7208"
},
{
"cve": "CVE-2018-7568",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7568"
}
],
"notes": [
{
"category": "general",
"text": "The parse_die function in dwarf1.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer overflow and application crash) via an ELF file with corrupt dwarf1 debug information, as demonstrated by nm.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7568",
"url": "https://www.suse.com/security/cve/CVE-2018-7568"
},
{
"category": "external",
"summary": "SUSE Bug 1086788 for CVE-2018-7568",
"url": "https://bugzilla.suse.com/1086788"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-7568"
},
{
"cve": "CVE-2018-7569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7569"
}
],
"notes": [
{
"category": "general",
"text": "dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer underflow or overflow, and application crash) via an ELF file with a corrupt DWARF FORM block, as demonstrated by nm.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7569",
"url": "https://www.suse.com/security/cve/CVE-2018-7569"
},
{
"category": "external",
"summary": "SUSE Bug 1083532 for CVE-2018-7569",
"url": "https://bugzilla.suse.com/1083532"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-7569"
},
{
"cve": "CVE-2018-7570",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7570"
}
],
"notes": [
{
"category": "general",
"text": "The assign_file_positions_for_non_load_sections function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an ELF file with a RELRO segment that lacks a matching LOAD segment, as demonstrated by objcopy.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7570",
"url": "https://www.suse.com/security/cve/CVE-2018-7570"
},
{
"category": "external",
"summary": "SUSE Bug 1083528 for CVE-2018-7570",
"url": "https://bugzilla.suse.com/1083528"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-7570"
},
{
"cve": "CVE-2018-7642",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7642"
}
],
"notes": [
{
"category": "general",
"text": "The swap_std_reloc_in function in aoutx.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (aout_32_swap_std_reloc_out NULL pointer dereference and application crash) via a crafted ELF file, as demonstrated by objcopy.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7642",
"url": "https://www.suse.com/security/cve/CVE-2018-7642"
},
{
"category": "external",
"summary": "SUSE Bug 1086786 for CVE-2018-7642",
"url": "https://bugzilla.suse.com/1086786"
},
{
"category": "external",
"summary": "SUSE Bug 1128518 for CVE-2018-7642",
"url": "https://bugzilla.suse.com/1128518"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-7642"
},
{
"cve": "CVE-2018-7643",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7643"
}
],
"notes": [
{
"category": "general",
"text": "The display_debug_ranges function in dwarf.c in GNU Binutils 2.30 allows remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, as demonstrated by objdump.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7643",
"url": "https://www.suse.com/security/cve/CVE-2018-7643"
},
{
"category": "external",
"summary": "SUSE Bug 1086784 for CVE-2018-7643",
"url": "https://bugzilla.suse.com/1086784"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-7643"
},
{
"cve": "CVE-2018-8945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-8945"
}
],
"notes": [
{
"category": "general",
"text": "The bfd_section_from_shdr function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (segmentation fault) via a large attribute section.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-8945",
"url": "https://www.suse.com/security/cve/CVE-2018-8945"
},
{
"category": "external",
"summary": "SUSE Bug 1086608 for CVE-2018-8945",
"url": "https://bugzilla.suse.com/1086608"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-8945"
},
{
"cve": "CVE-2019-1010180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-1010180"
}
],
"notes": [
{
"category": "general",
"text": "GNU gdb All versions is affected by: Buffer Overflow - Out of bound memory access. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. The component is: The main gdb module. The attack vector is: Open an ELF for debugging. The fixed version is: Not fixed yet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-1010180",
"url": "https://www.suse.com/security/cve/CVE-2019-1010180"
},
{
"category": "external",
"summary": "SUSE Bug 1142772 for CVE-2019-1010180",
"url": "https://bugzilla.suse.com/1142772"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-1010180"
},
{
"cve": "CVE-2019-12972",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12972"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. There is a heap-based buffer over-read in _bfd_doprnt in bfd.c because elf_object_p in elfcode.h mishandles an e_shstrndx section of type SHT_GROUP by omitting a trailing \u0027\\0\u0027 character.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12972",
"url": "https://www.suse.com/security/cve/CVE-2019-12972"
},
{
"category": "external",
"summary": "SUSE Bug 1140126 for CVE-2019-12972",
"url": "https://bugzilla.suse.com/1140126"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-12972"
},
{
"cve": "CVE-2019-14250",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14250"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. simple_object_elf_match in simple-object-elf.c does not check for a zero shstrndx value, leading to an integer overflow and resultant heap-based buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14250",
"url": "https://www.suse.com/security/cve/CVE-2019-14250"
},
{
"category": "external",
"summary": "SUSE Bug 1142649 for CVE-2019-14250",
"url": "https://bugzilla.suse.com/1142649"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-14250"
},
{
"cve": "CVE-2019-14444",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14444"
}
],
"notes": [
{
"category": "general",
"text": "apply_relocations in readelf.c in GNU Binutils 2.32 contains an integer overflow that allows attackers to trigger a write access violation (in byte_put_little_endian function in elfcomm.c) via an ELF file, as demonstrated by readelf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14444",
"url": "https://www.suse.com/security/cve/CVE-2019-14444"
},
{
"category": "external",
"summary": "SUSE Bug 1143609 for CVE-2019-14444",
"url": "https://bugzilla.suse.com/1143609"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-14444"
},
{
"cve": "CVE-2019-17450",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17450"
}
],
"notes": [
{
"category": "general",
"text": "find_abstract_instance in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32, allows remote attackers to cause a denial of service (infinite recursion and application crash) via a crafted ELF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17450",
"url": "https://www.suse.com/security/cve/CVE-2019-17450"
},
{
"category": "external",
"summary": "SUSE Bug 1153770 for CVE-2019-17450",
"url": "https://bugzilla.suse.com/1153770"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-17450"
},
{
"cve": "CVE-2019-17451",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17451"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an integer overflow leading to a SEGV in _bfd_dwarf2_find_nearest_line in dwarf2.c, as demonstrated by nm.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17451",
"url": "https://www.suse.com/security/cve/CVE-2019-17451"
},
{
"category": "external",
"summary": "SUSE Bug 1153768 for CVE-2019-17451",
"url": "https://bugzilla.suse.com/1153768"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-17451"
},
{
"cve": "CVE-2019-9074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9074"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an out-of-bounds read leading to a SEGV in bfd_getl32 in libbfd.c, when called from pex64_get_runtime_function in pei-x86_64.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9074",
"url": "https://www.suse.com/security/cve/CVE-2019-9074"
},
{
"category": "external",
"summary": "SUSE Bug 1126831 for CVE-2019-9074",
"url": "https://bugzilla.suse.com/1126831"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-9074"
},
{
"cve": "CVE-2019-9075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9075"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is a heap-based buffer overflow in _bfd_archive_64_bit_slurp_armap in archive64.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9075",
"url": "https://www.suse.com/security/cve/CVE-2019-9075"
},
{
"category": "external",
"summary": "SUSE Bug 1071544 for CVE-2019-9075",
"url": "https://bugzilla.suse.com/1071544"
},
{
"category": "external",
"summary": "SUSE Bug 1126829 for CVE-2019-9075",
"url": "https://bugzilla.suse.com/1126829"
},
{
"category": "external",
"summary": "SUSE Bug 1193110 for CVE-2019-9075",
"url": "https://bugzilla.suse.com/1193110"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9075"
},
{
"cve": "CVE-2019-9077",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9077"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in GNU Binutils 2.32. It is a heap-based buffer overflow in process_mips_specific in readelf.c via a malformed MIPS option section.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9077",
"url": "https://www.suse.com/security/cve/CVE-2019-9077"
},
{
"category": "external",
"summary": "SUSE Bug 1126826 for CVE-2019-9077",
"url": "https://bugzilla.suse.com/1126826"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-9077"
},
{
"cve": "CVE-2020-16590",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-16590"
}
],
"notes": [
{
"category": "general",
"text": "A double free vulnerability exists in the Binary File Descriptor (BFD) (aka libbrd) in GNU Binutils 2.35 in the process_symbol_table, as demonstrated in readelf, via a crafted file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-16590",
"url": "https://www.suse.com/security/cve/CVE-2020-16590"
},
{
"category": "external",
"summary": "SUSE Bug 1179898 for CVE-2020-16590",
"url": "https://bugzilla.suse.com/1179898"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-16590"
},
{
"cve": "CVE-2020-16591",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-16591"
}
],
"notes": [
{
"category": "general",
"text": "A Denial of Service vulnerability exists in the Binary File Descriptor (BFD) in GNU Binutils 2.35 due to an invalid read in process_symbol_table, as demonstrated in readeif.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-16591",
"url": "https://www.suse.com/security/cve/CVE-2020-16591"
},
{
"category": "external",
"summary": "SUSE Bug 1179899 for CVE-2020-16591",
"url": "https://bugzilla.suse.com/1179899"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-16591"
},
{
"cve": "CVE-2020-16592",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-16592"
}
],
"notes": [
{
"category": "general",
"text": "A use after free issue exists in the Binary File Descriptor (BFD) library (aka libbfd) in GNU Binutils 2.34 in bfd_hash_lookup, as demonstrated in nm-new, that can cause a denial of service via a crafted file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-16592",
"url": "https://www.suse.com/security/cve/CVE-2020-16592"
},
{
"category": "external",
"summary": "SUSE Bug 1179900 for CVE-2020-16592",
"url": "https://bugzilla.suse.com/1179900"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-16592"
},
{
"cve": "CVE-2020-16593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-16593"
}
],
"notes": [
{
"category": "general",
"text": "A Null Pointer Dereference vulnerability exists in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.35, in scan_unit_for_symbols, as demonstrated in addr2line, that can cause a denial of service via a crafted file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-16593",
"url": "https://www.suse.com/security/cve/CVE-2020-16593"
},
{
"category": "external",
"summary": "SUSE Bug 1179901 for CVE-2020-16593",
"url": "https://bugzilla.suse.com/1179901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-16593"
},
{
"cve": "CVE-2020-16598",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-16598"
}
],
"notes": [
{
"category": "general",
"text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-16598",
"url": "https://www.suse.com/security/cve/CVE-2020-16598"
},
{
"category": "external",
"summary": "SUSE Bug 1179902 for CVE-2020-16598",
"url": "https://bugzilla.suse.com/1179902"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-16598"
},
{
"cve": "CVE-2020-16599",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-16599"
}
],
"notes": [
{
"category": "general",
"text": "A Null Pointer Dereference vulnerability exists in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.35, in _bfd_elf_get_symbol_version_string, as demonstrated in nm-new, that can cause a denial of service via a crafted file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-16599",
"url": "https://www.suse.com/security/cve/CVE-2020-16599"
},
{
"category": "external",
"summary": "SUSE Bug 1179903 for CVE-2020-16599",
"url": "https://bugzilla.suse.com/1179903"
},
{
"category": "external",
"summary": "SUSE Bug 1206080 for CVE-2020-16599",
"url": "https://bugzilla.suse.com/1206080"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-16599"
},
{
"cve": "CVE-2020-35448",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-35448"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.35.1. A heap-based buffer over-read can occur in bfd_getl_signed_32 in libbfd.c because sh_entsize is not validated in _bfd_elf_slurp_secondary_reloc_section in elf.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-35448",
"url": "https://www.suse.com/security/cve/CVE-2020-35448"
},
{
"category": "external",
"summary": "SUSE Bug 1184794 for CVE-2020-35448",
"url": "https://bugzilla.suse.com/1184794"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-35448"
},
{
"cve": "CVE-2020-35493",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-35493"
}
],
"notes": [
{
"category": "general",
"text": "A flaw exists in binutils in bfd/pef.c. An attacker who is able to submit a crafted PEF file to be parsed by objdump could cause a heap buffer overflow -\u003e out-of-bounds read that could lead to an impact to application availability. This flaw affects binutils versions prior to 2.34.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-35493",
"url": "https://www.suse.com/security/cve/CVE-2020-35493"
},
{
"category": "external",
"summary": "SUSE Bug 1180451 for CVE-2020-35493",
"url": "https://bugzilla.suse.com/1180451"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-35493"
},
{
"cve": "CVE-2020-35496",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-35496"
}
],
"notes": [
{
"category": "general",
"text": "There\u0027s a flaw in bfd_pef_scan_start_address() of bfd/pef.c in binutils which could allow an attacker who is able to submit a crafted file to be processed by objdump to cause a NULL pointer dereference. The greatest threat of this flaw is to application availability. This flaw affects binutils versions prior to 2.34.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-35496",
"url": "https://www.suse.com/security/cve/CVE-2020-35496"
},
{
"category": "external",
"summary": "SUSE Bug 1180454 for CVE-2020-35496",
"url": "https://bugzilla.suse.com/1180454"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-35496"
},
{
"cve": "CVE-2020-35507",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-35507"
}
],
"notes": [
{
"category": "general",
"text": "There\u0027s a flaw in bfd_pef_parse_function_stubs of bfd/pef.c in binutils in versions prior to 2.34 which could allow an attacker who is able to submit a crafted file to be processed by objdump to cause a NULL pointer dereference. The greatest threat of this flaw is to application availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-35507",
"url": "https://www.suse.com/security/cve/CVE-2020-35507"
},
{
"category": "external",
"summary": "SUSE Bug 1180461 for CVE-2020-35507",
"url": "https://bugzilla.suse.com/1180461"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-35507"
},
{
"cve": "CVE-2021-20197",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20197"
}
],
"notes": [
{
"category": "general",
"text": "There is an open race window when writing output in the following utilities in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20197",
"url": "https://www.suse.com/security/cve/CVE-2021-20197"
},
{
"category": "external",
"summary": "SUSE Bug 1181452 for CVE-2021-20197",
"url": "https://bugzilla.suse.com/1181452"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-20197"
},
{
"cve": "CVE-2021-20284",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20284"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in GNU Binutils 2.35.1, where there is a heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c due to the number of symbols not calculated correctly. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20284",
"url": "https://www.suse.com/security/cve/CVE-2021-20284"
},
{
"category": "external",
"summary": "SUSE Bug 1183511 for CVE-2021-20284",
"url": "https://bugzilla.suse.com/1183511"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-20284"
},
{
"cve": "CVE-2021-3487",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3487"
}
],
"notes": [
{
"category": "general",
"text": "Non Security Issue. See the binutils security policy for more details, https://sourceware.org/cgit/binutils-gdb/tree/binutils/SECURITY.txt",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3487",
"url": "https://www.suse.com/security/cve/CVE-2021-3487"
},
{
"category": "external",
"summary": "SUSE Bug 1184620 for CVE-2021-3487",
"url": "https://bugzilla.suse.com/1184620"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3487"
}
]
}
opensuse-su-2019:2415-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for binutils",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for binutils fixes the following issues:\n\nbinutils was updated to current 2.32 branch [jsc#ECO-368].\n\nIncludes following security fixes:\n\n- CVE-2018-17358: Fixed invalid memory access in _bfd_stab_section_find_nearest_line in syms.c (bsc#1109412)\n- CVE-2018-17359: Fixed invalid memory access exists in bfd_zalloc in opncls.c (bsc#1109413)\n- CVE-2018-17360: Fixed heap-based buffer over-read in bfd_getl32 in libbfd.c (bsc#1109414)\n- CVE-2018-17985: Fixed a stack consumption problem caused by the cplus_demangle_type (bsc#1116827)\n- CVE-2018-18309: Fixed an invalid memory address dereference was discovered in read_reloc in reloc.c (bsc#1111996)\n- CVE-2018-18483: Fixed get_count function provided by libiberty that allowed attackers to cause a denial of service or other unspecified impact (bsc#1112535)\n- CVE-2018-18484: Fixed stack exhaustion in the C++ demangling functions provided by libiberty, caused by recursive stack frames (bsc#1112534)\n- CVE-2018-18605: Fixed a heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup causing a denial of service (bsc#1113255)\n- CVE-2018-18606: Fixed a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments, causing denial of service (bsc#1113252)\n- CVE-2018-18607: Fixed a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section, causing denial of service (bsc#1113247)\n- CVE-2018-19931: Fixed a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h (bsc#1118831)\n- CVE-2018-19932: Fixed an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA (bsc#1118830)\n- CVE-2018-20623: Fixed a use-after-free in the error function in elfcomm.c (bsc#1121035)\n- CVE-2018-20651: Fixed a denial of service via a NULL pointer dereference in elf_link_add_object_symbols in elflink.c (bsc#1121034)\n- CVE-2018-20671: Fixed an integer overflow that can trigger a heap-based buffer overflow in load_specific_debug_section in objdump.c (bsc#1121056)\n- CVE-2018-1000876: Fixed integer overflow in bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc in objdump (bsc#1120640)\n- CVE-2019-1010180: Fixed an out of bound memory access that could lead to crashes (bsc#1142772)\n\n- enable xtensa architecture (Tensilica lc6 and related)\n- Use -ffat-lto-objects in order to provide assembly for static libs\n (bsc#1141913).\n- Fixed some LTO build issues (bsc#1133131 bsc#1133232).\n- riscv: Don\u0027t check ABI flags if no code section\n- Fixed a segfault in ld when building some versions of pacemaker (bsc#1154025, bsc#1154016).\n- Add avr, epiphany and rx to target_list so that the common binutils can handle all objects we can create with crosses (bsc#1152590).\n\nUpdate to binutils 2.32:\n\n* The binutils now support for the C-SKY processor series.\n* The x86 assembler now supports a -mvexwig=[0|1] option to control\n encoding of VEX.W-ignored (WIG) VEX instructions.\n It also has a new -mx86-used-note=[yes|no] option to generate (or\n not) x86 GNU property notes. \n* The MIPS assembler now supports the Loongson EXTensions R2 (EXT2),\n the Loongson EXTensions (EXT) instructions, the Loongson Content\n Address Memory (CAM) ASE and the Loongson MultiMedia extensions\n Instructions (MMI) ASE.\n* The addr2line, c++filt, nm and objdump tools now have a default\n limit on the maximum amount of recursion that is allowed whilst\n demangling strings. This limit can be disabled if necessary.\n* Objdump\u0027s --disassemble option can now take a parameter,\n specifying the starting symbol for disassembly. Disassembly will\n continue from this symbol up to the next symbol or the end of the\n function.\n* The BFD linker will now report property change in linker map file\n when merging GNU properties.\n* The BFD linker\u0027s -t option now doesn\u0027t report members within\n archives, unless -t is given twice. This makes it more useful\n when generating a list of files that should be packaged for a\n linker bug report.\n* The GOLD linker has improved warning messages for relocations that\n refer to discarded sections.\n\n- Improve relro support on s390 [fate#326356]\n- Fix broken debug symbols (bsc#1118644)\n- Handle ELF compressed header alignment correctly.\n\n\nThis update was imported from the SUSE:SLE-15:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2019-2415",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2415-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2019:2415-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z3JUZNUB5MLFYPANGJ7Z7AR432VRY6KN/#Z3JUZNUB5MLFYPANGJ7Z7AR432VRY6KN"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2019:2415-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z3JUZNUB5MLFYPANGJ7Z7AR432VRY6KN/#Z3JUZNUB5MLFYPANGJ7Z7AR432VRY6KN"
},
{
"category": "self",
"summary": "SUSE Bug 1109412",
"url": "https://bugzilla.suse.com/1109412"
},
{
"category": "self",
"summary": "SUSE Bug 1109413",
"url": "https://bugzilla.suse.com/1109413"
},
{
"category": "self",
"summary": "SUSE Bug 1109414",
"url": "https://bugzilla.suse.com/1109414"
},
{
"category": "self",
"summary": "SUSE Bug 1111996",
"url": "https://bugzilla.suse.com/1111996"
},
{
"category": "self",
"summary": "SUSE Bug 1112534",
"url": "https://bugzilla.suse.com/1112534"
},
{
"category": "self",
"summary": "SUSE Bug 1112535",
"url": "https://bugzilla.suse.com/1112535"
},
{
"category": "self",
"summary": "SUSE Bug 1113247",
"url": "https://bugzilla.suse.com/1113247"
},
{
"category": "self",
"summary": "SUSE Bug 1113252",
"url": "https://bugzilla.suse.com/1113252"
},
{
"category": "self",
"summary": "SUSE Bug 1113255",
"url": "https://bugzilla.suse.com/1113255"
},
{
"category": "self",
"summary": "SUSE Bug 1116827",
"url": "https://bugzilla.suse.com/1116827"
},
{
"category": "self",
"summary": "SUSE Bug 1118644",
"url": "https://bugzilla.suse.com/1118644"
},
{
"category": "self",
"summary": "SUSE Bug 1118830",
"url": "https://bugzilla.suse.com/1118830"
},
{
"category": "self",
"summary": "SUSE Bug 1118831",
"url": "https://bugzilla.suse.com/1118831"
},
{
"category": "self",
"summary": "SUSE Bug 1120640",
"url": "https://bugzilla.suse.com/1120640"
},
{
"category": "self",
"summary": "SUSE Bug 1121034",
"url": "https://bugzilla.suse.com/1121034"
},
{
"category": "self",
"summary": "SUSE Bug 1121035",
"url": "https://bugzilla.suse.com/1121035"
},
{
"category": "self",
"summary": "SUSE Bug 1121056",
"url": "https://bugzilla.suse.com/1121056"
},
{
"category": "self",
"summary": "SUSE Bug 1133131",
"url": "https://bugzilla.suse.com/1133131"
},
{
"category": "self",
"summary": "SUSE Bug 1133232",
"url": "https://bugzilla.suse.com/1133232"
},
{
"category": "self",
"summary": "SUSE Bug 1141913",
"url": "https://bugzilla.suse.com/1141913"
},
{
"category": "self",
"summary": "SUSE Bug 1142772",
"url": "https://bugzilla.suse.com/1142772"
},
{
"category": "self",
"summary": "SUSE Bug 1152590",
"url": "https://bugzilla.suse.com/1152590"
},
{
"category": "self",
"summary": "SUSE Bug 1154016",
"url": "https://bugzilla.suse.com/1154016"
},
{
"category": "self",
"summary": "SUSE Bug 1154025",
"url": "https://bugzilla.suse.com/1154025"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000876 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000876/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-17358 page",
"url": "https://www.suse.com/security/cve/CVE-2018-17358/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-17359 page",
"url": "https://www.suse.com/security/cve/CVE-2018-17359/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-17360 page",
"url": "https://www.suse.com/security/cve/CVE-2018-17360/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-17985 page",
"url": "https://www.suse.com/security/cve/CVE-2018-17985/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18309 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18309/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18483 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18483/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18484 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18484/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18605 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18605/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18606 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18606/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18607 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18607/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-19931 page",
"url": "https://www.suse.com/security/cve/CVE-2018-19931/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-19932 page",
"url": "https://www.suse.com/security/cve/CVE-2018-19932/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20623 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20623/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20651 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20651/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20671 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20671/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-6323 page",
"url": "https://www.suse.com/security/cve/CVE-2018-6323/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-6543 page",
"url": "https://www.suse.com/security/cve/CVE-2018-6543/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-6759 page",
"url": "https://www.suse.com/security/cve/CVE-2018-6759/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-6872 page",
"url": "https://www.suse.com/security/cve/CVE-2018-6872/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7208 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7208/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7568 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7568/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7569 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7570 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7570/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7642 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7642/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7643 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7643/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-8945 page",
"url": "https://www.suse.com/security/cve/CVE-2018-8945/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-1010180 page",
"url": "https://www.suse.com/security/cve/CVE-2019-1010180/"
}
],
"title": "Security update for binutils",
"tracking": {
"current_release_date": "2019-10-30T17:25:53Z",
"generator": {
"date": "2019-10-30T17:25:53Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2019:2415-1",
"initial_release_date": "2019-10-30T17:25:53Z",
"revision_history": [
{
"date": "2019-10-30T17:25:53Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "binutils-2.32-lp150.10.1.i586",
"product": {
"name": "binutils-2.32-lp150.10.1.i586",
"product_id": "binutils-2.32-lp150.10.1.i586"
}
},
{
"category": "product_version",
"name": "binutils-devel-2.32-lp150.10.1.i586",
"product": {
"name": "binutils-devel-2.32-lp150.10.1.i586",
"product_id": "binutils-devel-2.32-lp150.10.1.i586"
}
},
{
"category": "product_version",
"name": "binutils-gold-2.32-lp150.10.1.i586",
"product": {
"name": "binutils-gold-2.32-lp150.10.1.i586",
"product_id": "binutils-gold-2.32-lp150.10.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-2.32-lp150.10.1.x86_64",
"product": {
"name": "binutils-2.32-lp150.10.1.x86_64",
"product_id": "binutils-2.32-lp150.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "binutils-devel-2.32-lp150.10.1.x86_64",
"product": {
"name": "binutils-devel-2.32-lp150.10.1.x86_64",
"product_id": "binutils-devel-2.32-lp150.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"product": {
"name": "binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"product_id": "binutils-devel-32bit-2.32-lp150.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "binutils-gold-2.32-lp150.10.1.x86_64",
"product": {
"name": "binutils-gold-2.32-lp150.10.1.x86_64",
"product_id": "binutils-gold-2.32-lp150.10.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.0",
"product": {
"name": "openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-lp150.10.1.i586 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586"
},
"product_reference": "binutils-2.32-lp150.10.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.32-lp150.10.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64"
},
"product_reference": "binutils-2.32-lp150.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.32-lp150.10.1.i586 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586"
},
"product_reference": "binutils-devel-2.32-lp150.10.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.32-lp150.10.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64"
},
"product_reference": "binutils-devel-2.32-lp150.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-32bit-2.32-lp150.10.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64"
},
"product_reference": "binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-gold-2.32-lp150.10.1.i586 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586"
},
"product_reference": "binutils-gold-2.32-lp150.10.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-gold-2.32-lp150.10.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
},
"product_reference": "binutils-gold-2.32-lp150.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-1000876",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000876"
}
],
"notes": [
{
"category": "general",
"text": "binutils version 2.32 and earlier contains a Integer Overflow vulnerability in objdump, bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc that can result in Integer overflow trigger heap overflow. Successful exploitation allows execution of arbitrary code.. This attack appear to be exploitable via Local. This vulnerability appears to have been fixed in after commit 3a551c7a1b80fca579461774860574eabfd7f18f.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000876",
"url": "https://www.suse.com/security/cve/CVE-2018-1000876"
},
{
"category": "external",
"summary": "SUSE Bug 1120640 for CVE-2018-1000876",
"url": "https://bugzilla.suse.com/1120640"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-30T17:25:53Z",
"details": "moderate"
}
],
"title": "CVE-2018-1000876"
},
{
"cve": "CVE-2018-17358",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-17358"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory access exists in _bfd_stab_section_find_nearest_line in syms.c. Attackers could leverage this vulnerability to cause a denial of service (application crash) via a crafted ELF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-17358",
"url": "https://www.suse.com/security/cve/CVE-2018-17358"
},
{
"category": "external",
"summary": "SUSE Bug 1109412 for CVE-2018-17358",
"url": "https://bugzilla.suse.com/1109412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-30T17:25:53Z",
"details": "low"
}
],
"title": "CVE-2018-17358"
},
{
"cve": "CVE-2018-17359",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-17359"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory access exists in bfd_zalloc in opncls.c. Attackers could leverage this vulnerability to cause a denial of service (application crash) via a crafted ELF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-17359",
"url": "https://www.suse.com/security/cve/CVE-2018-17359"
},
{
"category": "external",
"summary": "SUSE Bug 1109413 for CVE-2018-17359",
"url": "https://bugzilla.suse.com/1109413"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-30T17:25:53Z",
"details": "low"
}
],
"title": "CVE-2018-17359"
},
{
"cve": "CVE-2018-17360",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-17360"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. a heap-based buffer over-read in bfd_getl32 in libbfd.c allows an attacker to cause a denial of service through a crafted PE file. This vulnerability can be triggered by the executable objdump.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-17360",
"url": "https://www.suse.com/security/cve/CVE-2018-17360"
},
{
"category": "external",
"summary": "SUSE Bug 1109414 for CVE-2018-17360",
"url": "https://bugzilla.suse.com/1109414"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-30T17:25:53Z",
"details": "low"
}
],
"title": "CVE-2018-17360"
},
{
"cve": "CVE-2018-17985",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-17985"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. There is a stack consumption problem caused by the cplus_demangle_type function making recursive calls to itself in certain scenarios involving many \u0027P\u0027 characters.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-17985",
"url": "https://www.suse.com/security/cve/CVE-2018-17985"
},
{
"category": "external",
"summary": "SUSE Bug 1116827 for CVE-2018-17985",
"url": "https://bugzilla.suse.com/1116827"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-30T17:25:53Z",
"details": "moderate"
}
],
"title": "CVE-2018-17985"
},
{
"cve": "CVE-2018-18309",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18309"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory address dereference was discovered in read_reloc in reloc.c. The vulnerability causes a segmentation fault and application crash, which leads to denial of service, as demonstrated by objdump, because of missing _bfd_clear_contents bounds checking.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18309",
"url": "https://www.suse.com/security/cve/CVE-2018-18309"
},
{
"category": "external",
"summary": "SUSE Bug 1111996 for CVE-2018-18309",
"url": "https://bugzilla.suse.com/1111996"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-30T17:25:53Z",
"details": "low"
}
],
"title": "CVE-2018-18309"
},
{
"cve": "CVE-2018-18483",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18483"
}
],
"notes": [
{
"category": "general",
"text": "The get_count function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31, allows remote attackers to cause a denial of service (malloc called with the result of an integer-overflowing calculation) or possibly have unspecified other impact via a crafted string, as demonstrated by c++filt.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18483",
"url": "https://www.suse.com/security/cve/CVE-2018-18483"
},
{
"category": "external",
"summary": "SUSE Bug 1112535 for CVE-2018-18483",
"url": "https://bugzilla.suse.com/1112535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-30T17:25:53Z",
"details": "moderate"
}
],
"title": "CVE-2018-18483"
},
{
"cve": "CVE-2018-18484",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18484"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there is a stack consumption problem caused by recursive stack frames: cplus_demangle_type, d_bare_function_type, d_function_type.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18484",
"url": "https://www.suse.com/security/cve/CVE-2018-18484"
},
{
"category": "external",
"summary": "SUSE Bug 1112534 for CVE-2018-18484",
"url": "https://bugzilla.suse.com/1112534"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-30T17:25:53Z",
"details": "moderate"
}
],
"title": "CVE-2018-18484"
},
{
"cve": "CVE-2018-18605",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18605"
}
],
"notes": [
{
"category": "general",
"text": "A heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup in merge.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31, because _bfd_add_merge_section mishandles section merges when size is not a multiple of entsize. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18605",
"url": "https://www.suse.com/security/cve/CVE-2018-18605"
},
{
"category": "external",
"summary": "SUSE Bug 1113255 for CVE-2018-18605",
"url": "https://bugzilla.suse.com/1113255"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-30T17:25:53Z",
"details": "moderate"
}
],
"title": "CVE-2018-18605"
},
{
"cve": "CVE-2018-18606",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18606"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the merge_strings function in merge.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18606",
"url": "https://www.suse.com/security/cve/CVE-2018-18606"
},
{
"category": "external",
"summary": "SUSE Bug 1113252 for CVE-2018-18606",
"url": "https://bugzilla.suse.com/1113252"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-30T17:25:53Z",
"details": "low"
}
],
"title": "CVE-2018-18606"
},
{
"cve": "CVE-2018-18607",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18607"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in elf_link_input_bfd in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18607",
"url": "https://www.suse.com/security/cve/CVE-2018-18607"
},
{
"category": "external",
"summary": "SUSE Bug 1113247 for CVE-2018-18607",
"url": "https://bugzilla.suse.com/1113247"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-30T17:25:53Z",
"details": "low"
}
],
"title": "CVE-2018-18607"
},
{
"cve": "CVE-2018-19931",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-19931"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h because the number of program headers is not restricted.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-19931",
"url": "https://www.suse.com/security/cve/CVE-2018-19931"
},
{
"category": "external",
"summary": "SUSE Bug 1118830 for CVE-2018-19931",
"url": "https://bugzilla.suse.com/1118830"
},
{
"category": "external",
"summary": "SUSE Bug 1118831 for CVE-2018-19931",
"url": "https://bugzilla.suse.com/1118831"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-30T17:25:53Z",
"details": "low"
}
],
"title": "CVE-2018-19931"
},
{
"cve": "CVE-2018-19932",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-19932"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA macro in elf.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-19932",
"url": "https://www.suse.com/security/cve/CVE-2018-19932"
},
{
"category": "external",
"summary": "SUSE Bug 1118830 for CVE-2018-19932",
"url": "https://bugzilla.suse.com/1118830"
},
{
"category": "external",
"summary": "SUSE Bug 1118831 for CVE-2018-19932",
"url": "https://bugzilla.suse.com/1118831"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-30T17:25:53Z",
"details": "low"
}
],
"title": "CVE-2018-19932"
},
{
"cve": "CVE-2018-20623",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20623"
}
],
"notes": [
{
"category": "general",
"text": "In GNU Binutils 2.31.1, there is a use-after-free in the error function in elfcomm.c when called from the process_archive function in readelf.c via a crafted ELF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20623",
"url": "https://www.suse.com/security/cve/CVE-2018-20623"
},
{
"category": "external",
"summary": "SUSE Bug 1121035 for CVE-2018-20623",
"url": "https://bugzilla.suse.com/1121035"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-30T17:25:53Z",
"details": "moderate"
}
],
"title": "CVE-2018-20623"
},
{
"cve": "CVE-2018-20651",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20651"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference was discovered in elf_link_add_object_symbols in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31.1. This occurs for a crafted ET_DYN with no program headers. A specially crafted ELF file allows remote attackers to cause a denial of service, as demonstrated by ld.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20651",
"url": "https://www.suse.com/security/cve/CVE-2018-20651"
},
{
"category": "external",
"summary": "SUSE Bug 1121034 for CVE-2018-20651",
"url": "https://bugzilla.suse.com/1121034"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-30T17:25:53Z",
"details": "low"
}
],
"title": "CVE-2018-20651"
},
{
"cve": "CVE-2018-20671",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20671"
}
],
"notes": [
{
"category": "general",
"text": "load_specific_debug_section in objdump.c in GNU Binutils through 2.31.1 contains an integer overflow vulnerability that can trigger a heap-based buffer overflow via a crafted section size.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20671",
"url": "https://www.suse.com/security/cve/CVE-2018-20671"
},
{
"category": "external",
"summary": "SUSE Bug 1121056 for CVE-2018-20671",
"url": "https://bugzilla.suse.com/1121056"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-30T17:25:53Z",
"details": "low"
}
],
"title": "CVE-2018-20671"
},
{
"cve": "CVE-2018-6323",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-6323"
}
],
"notes": [
{
"category": "general",
"text": "The elf_object_p function in elfcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, has an unsigned integer overflow because bfd_size_type multiplication is not used. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-6323",
"url": "https://www.suse.com/security/cve/CVE-2018-6323"
},
{
"category": "external",
"summary": "SUSE Bug 1077745 for CVE-2018-6323",
"url": "https://bugzilla.suse.com/1077745"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-30T17:25:53Z",
"details": "low"
}
],
"title": "CVE-2018-6323"
},
{
"cve": "CVE-2018-6543",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-6543"
}
],
"notes": [
{
"category": "general",
"text": "In GNU Binutils 2.30, there\u0027s an integer overflow in the function load_specific_debug_section() in objdump.c, which results in `malloc()` with 0 size. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-6543",
"url": "https://www.suse.com/security/cve/CVE-2018-6543"
},
{
"category": "external",
"summary": "SUSE Bug 1079103 for CVE-2018-6543",
"url": "https://bugzilla.suse.com/1079103"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-30T17:25:53Z",
"details": "moderate"
}
],
"title": "CVE-2018-6543"
},
{
"cve": "CVE-2018-6759",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-6759"
}
],
"notes": [
{
"category": "general",
"text": "The bfd_get_debug_link_info_1 function in opncls.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, has an unchecked strnlen operation. Remote attackers could leverage this vulnerability to cause a denial of service (segmentation fault) via a crafted ELF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-6759",
"url": "https://www.suse.com/security/cve/CVE-2018-6759"
},
{
"category": "external",
"summary": "SUSE Bug 1079741 for CVE-2018-6759",
"url": "https://bugzilla.suse.com/1079741"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-30T17:25:53Z",
"details": "moderate"
}
],
"title": "CVE-2018-6759"
},
{
"cve": "CVE-2018-6872",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-6872"
}
],
"notes": [
{
"category": "general",
"text": "The elf_parse_notes function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (out-of-bounds read and segmentation violation) via a note with a large alignment.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-6872",
"url": "https://www.suse.com/security/cve/CVE-2018-6872"
},
{
"category": "external",
"summary": "SUSE Bug 1080556 for CVE-2018-6872",
"url": "https://bugzilla.suse.com/1080556"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-30T17:25:53Z",
"details": "moderate"
}
],
"title": "CVE-2018-6872"
},
{
"cve": "CVE-2018-7208",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7208"
}
],
"notes": [
{
"category": "general",
"text": "In the coff_pointerize_aux function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, an index is not validated, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted file, as demonstrated by objcopy of a COFF object.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7208",
"url": "https://www.suse.com/security/cve/CVE-2018-7208"
},
{
"category": "external",
"summary": "SUSE Bug 1081527 for CVE-2018-7208",
"url": "https://bugzilla.suse.com/1081527"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-30T17:25:53Z",
"details": "low"
}
],
"title": "CVE-2018-7208"
},
{
"cve": "CVE-2018-7568",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7568"
}
],
"notes": [
{
"category": "general",
"text": "The parse_die function in dwarf1.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer overflow and application crash) via an ELF file with corrupt dwarf1 debug information, as demonstrated by nm.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7568",
"url": "https://www.suse.com/security/cve/CVE-2018-7568"
},
{
"category": "external",
"summary": "SUSE Bug 1086788 for CVE-2018-7568",
"url": "https://bugzilla.suse.com/1086788"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-30T17:25:53Z",
"details": "low"
}
],
"title": "CVE-2018-7568"
},
{
"cve": "CVE-2018-7569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7569"
}
],
"notes": [
{
"category": "general",
"text": "dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer underflow or overflow, and application crash) via an ELF file with a corrupt DWARF FORM block, as demonstrated by nm.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7569",
"url": "https://www.suse.com/security/cve/CVE-2018-7569"
},
{
"category": "external",
"summary": "SUSE Bug 1083532 for CVE-2018-7569",
"url": "https://bugzilla.suse.com/1083532"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-30T17:25:53Z",
"details": "low"
}
],
"title": "CVE-2018-7569"
},
{
"cve": "CVE-2018-7570",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7570"
}
],
"notes": [
{
"category": "general",
"text": "The assign_file_positions_for_non_load_sections function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an ELF file with a RELRO segment that lacks a matching LOAD segment, as demonstrated by objcopy.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7570",
"url": "https://www.suse.com/security/cve/CVE-2018-7570"
},
{
"category": "external",
"summary": "SUSE Bug 1083528 for CVE-2018-7570",
"url": "https://bugzilla.suse.com/1083528"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-30T17:25:53Z",
"details": "low"
}
],
"title": "CVE-2018-7570"
},
{
"cve": "CVE-2018-7642",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7642"
}
],
"notes": [
{
"category": "general",
"text": "The swap_std_reloc_in function in aoutx.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (aout_32_swap_std_reloc_out NULL pointer dereference and application crash) via a crafted ELF file, as demonstrated by objcopy.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7642",
"url": "https://www.suse.com/security/cve/CVE-2018-7642"
},
{
"category": "external",
"summary": "SUSE Bug 1086786 for CVE-2018-7642",
"url": "https://bugzilla.suse.com/1086786"
},
{
"category": "external",
"summary": "SUSE Bug 1128518 for CVE-2018-7642",
"url": "https://bugzilla.suse.com/1128518"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-30T17:25:53Z",
"details": "low"
}
],
"title": "CVE-2018-7642"
},
{
"cve": "CVE-2018-7643",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7643"
}
],
"notes": [
{
"category": "general",
"text": "The display_debug_ranges function in dwarf.c in GNU Binutils 2.30 allows remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, as demonstrated by objdump.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7643",
"url": "https://www.suse.com/security/cve/CVE-2018-7643"
},
{
"category": "external",
"summary": "SUSE Bug 1086784 for CVE-2018-7643",
"url": "https://bugzilla.suse.com/1086784"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-30T17:25:53Z",
"details": "moderate"
}
],
"title": "CVE-2018-7643"
},
{
"cve": "CVE-2018-8945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-8945"
}
],
"notes": [
{
"category": "general",
"text": "The bfd_section_from_shdr function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (segmentation fault) via a large attribute section.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-8945",
"url": "https://www.suse.com/security/cve/CVE-2018-8945"
},
{
"category": "external",
"summary": "SUSE Bug 1086608 for CVE-2018-8945",
"url": "https://bugzilla.suse.com/1086608"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-30T17:25:53Z",
"details": "low"
}
],
"title": "CVE-2018-8945"
},
{
"cve": "CVE-2019-1010180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-1010180"
}
],
"notes": [
{
"category": "general",
"text": "GNU gdb All versions is affected by: Buffer Overflow - Out of bound memory access. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. The component is: The main gdb module. The attack vector is: Open an ELF for debugging. The fixed version is: Not fixed yet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-1010180",
"url": "https://www.suse.com/security/cve/CVE-2019-1010180"
},
{
"category": "external",
"summary": "SUSE Bug 1142772 for CVE-2019-1010180",
"url": "https://bugzilla.suse.com/1142772"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586",
"openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-30T17:25:53Z",
"details": "important"
}
],
"title": "CVE-2019-1010180"
}
]
}
ncsc-2025-0382
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Siemens heeft kwetsbaarheden verholpen in diverse producten als Building X, COMOS, Energy Services, Gridscale X, NX, RUGGEDCOM, SICAM, SIMATIC, SINEC, SINEMA, SIPLUS en Solid Edge.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden stellen een kwaadwillende mogelijk in staat aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipulatie van gegevens\n- Omzeilen van een beveiligingsmaatregel\n- (Remote) code execution (root/admin rechten)\n- Toegang tot systeemgegevens\n- Toegang tot gevoelige gegevens\n- Verhogen van rechten\n\nDe kwaadwillende heeft hiervoor toegang nodig tot de productieomgeving. Het is goed gebruik een dergelijke omgeving niet publiek toegankelijk te hebben.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Siemens heeft beveiligingsupdates uitgebracht om de kwetsbaarheden te verhelpen. Voor de kwetsbaarheden waar nog geen updates voor zijn, heeft Siemens mitigerende maatregelen gepubliceerd om de risico\u0027s zoveel als mogelijk te beperken. Zie de bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "general",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "general",
"text": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)",
"title": "CWE-96"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "general",
"text": "Improper Validation of Array Index",
"title": "CWE-129"
},
{
"category": "general",
"text": "Improper Neutralization of Parameter/Argument Delimiters",
"title": "CWE-141"
},
{
"category": "general",
"text": "Improper Neutralization of Escape, Meta, or Control Sequences",
"title": "CWE-150"
},
{
"category": "general",
"text": "Improper Handling of Case Sensitivity",
"title": "CWE-178"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
},
{
"category": "general",
"text": "Integer Coercion Error",
"title": "CWE-192"
},
{
"category": "general",
"text": "Off-by-one Error",
"title": "CWE-193"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Insertion of Sensitive Information Into Sent Data",
"title": "CWE-201"
},
{
"category": "general",
"text": "Observable Discrepancy",
"title": "CWE-203"
},
{
"category": "general",
"text": "Observable Response Discrepancy",
"title": "CWE-204"
},
{
"category": "general",
"text": "Improper Removal of Sensitive Information Before Storage or Transfer",
"title": "CWE-212"
},
{
"category": "general",
"text": "CWE-264",
"title": "CWE-264"
},
{
"category": "general",
"text": "Privilege Chaining",
"title": "CWE-268"
},
{
"category": "general",
"text": "Privilege Dropping / Lowering Errors",
"title": "CWE-271"
},
{
"category": "general",
"text": "Incorrect Default Permissions",
"title": "CWE-276"
},
{
"category": "general",
"text": "Improper Preservation of Permissions",
"title": "CWE-281"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Authorization",
"title": "CWE-285"
},
{
"category": "general",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "general",
"text": "Authentication Bypass Using an Alternate Path or Channel",
"title": "CWE-288"
},
{
"category": "general",
"text": "Authentication Bypass by Capture-replay",
"title": "CWE-294"
},
{
"category": "general",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "general",
"text": "Incorrect Implementation of Authentication Algorithm",
"title": "CWE-303"
},
{
"category": "general",
"text": "Missing Authentication for Critical Function",
"title": "CWE-306"
},
{
"category": "general",
"text": "CWE-310",
"title": "CWE-310"
},
{
"category": "general",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "general",
"text": "Cleartext Transmission of Sensitive Information",
"title": "CWE-319"
},
{
"category": "general",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "general",
"text": "Use of Weak Hash",
"title": "CWE-328"
},
{
"category": "general",
"text": "Generation of Predictable Numbers or Identifiers",
"title": "CWE-340"
},
{
"category": "general",
"text": "Improper Verification of Cryptographic Signature",
"title": "CWE-347"
},
{
"category": "general",
"text": "Cross-Site Request Forgery (CSRF)",
"title": "CWE-352"
},
{
"category": "general",
"text": "Improper Validation of Integrity Check Value",
"title": "CWE-354"
},
{
"category": "general",
"text": "Improperly Implemented Security Check for Standard",
"title": "CWE-358"
},
{
"category": "general",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "general",
"text": "Session Fixation",
"title": "CWE-384"
},
{
"category": "general",
"text": "Covert Timing Channel",
"title": "CWE-385"
},
{
"category": "general",
"text": "CWE-399",
"title": "CWE-399"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
},
{
"category": "general",
"text": "Missing Lock Check",
"title": "CWE-414"
},
{
"category": "general",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "Expected Behavior Violation",
"title": "CWE-440"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Improper Initialization",
"title": "CWE-665"
},
{
"category": "general",
"text": "Improper Locking",
"title": "CWE-667"
},
{
"category": "general",
"text": "Exposure of Resource to Wrong Sphere",
"title": "CWE-668"
},
{
"category": "general",
"text": "Incorrect Conversion between Numeric Types",
"title": "CWE-681"
},
{
"category": "general",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
},
{
"category": "general",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "general",
"text": "Release of Invalid Pointer or Reference",
"title": "CWE-763"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Use of Hard-coded Credentials",
"title": "CWE-798"
},
{
"category": "general",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "general",
"text": "Missing Authorization",
"title": "CWE-862"
},
{
"category": "general",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "general",
"text": "Missing Initialization of Resource",
"title": "CWE-909"
},
{
"category": "general",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "general",
"text": "Improper Verification of Source of a Communication Channel",
"title": "CWE-940"
},
{
"category": "general",
"text": "CWE-1214",
"title": "CWE-1214"
},
{
"category": "general",
"text": "Improper Validation of Specified Type of Input",
"title": "CWE-1287"
},
{
"category": "general",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-202008.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-212953.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-356310.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-416652.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-420375.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-471761.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-626856.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-710408.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-734261.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-763474.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-868571.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-882673.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-912274.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-915282.html"
}
],
"title": "Kwetsbaarheden verholpen in Siemens producten",
"tracking": {
"current_release_date": "2025-12-09T13:15:05.391966Z",
"generator": {
"date": "2025-08-04T16:30:00Z",
"engine": {
"name": "V.A.",
"version": "1.3"
}
},
"id": "NCSC-2025-0382",
"initial_release_date": "2025-12-09T13:15:05.391966Z",
"revision_history": [
{
"date": "2025-12-09T13:15:05.391966Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-1"
}
}
],
"category": "product_name",
"name": "Building X - Security Manager Edge Controller (ACC-AP)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-2"
}
}
],
"category": "product_name",
"name": "COMOS V10.4"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-3"
}
}
],
"category": "product_name",
"name": "COMOS V10.4.5"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-4"
}
}
],
"category": "product_name",
"name": "COMOS V10.5"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-5"
}
}
],
"category": "product_name",
"name": "COMOS V10.5.2"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-6"
}
}
],
"category": "product_name",
"name": "COMOS V10.6"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-7"
}
}
],
"category": "product_name",
"name": "Energy Services"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-8"
}
}
],
"category": "product_name",
"name": "Gridscale X Prepay"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-9"
}
}
],
"category": "product_name",
"name": "NX V2412"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-10"
}
}
],
"category": "product_name",
"name": "NX V2506"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-11"
}
}
],
"category": "product_name",
"name": "SICAM"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-12"
}
}
],
"category": "product_name",
"name": "SIMATIC CFU DIQ"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-13"
}
}
],
"category": "product_name",
"name": "SIMATIC CFU PA"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-14"
}
}
],
"category": "product_name",
"name": "SIMATIC CN 4100"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-15"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200AL IM 157-1 PN"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-16"
}
}
],
"category": "product_name",
"name": "SIMATIC MV540 H Firmware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-17"
}
}
],
"category": "product_name",
"name": "SIMATIC PN/PN Coupler"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-18"
}
}
],
"category": "product_name",
"name": "SIMATIC S7"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-19"
}
}
],
"category": "product_name",
"name": "SINEC INS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-20"
}
}
],
"category": "product_name",
"name": "SINEC NMS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-21"
}
}
],
"category": "product_name",
"name": "SINEC PNI"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-22"
}
}
],
"category": "product_name",
"name": "SINEMA Remote Connect Server"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-23"
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200MP IM 155-5 PN HF"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-24"
}
}
],
"category": "product_name",
"name": "SIPLUS HCS4200 CIM4210"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-25"
}
}
],
"category": "product_name",
"name": "SIPLUS NET PN/PN Coupler"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-26"
}
}
],
"category": "product_name",
"name": "SIPLUS S7-1200 CPU 1212 AC/DC/RLY"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-27"
}
}
],
"category": "product_name",
"name": "SIPLUS S7-1200 CPU 1214 AC/DC/RLY"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-28"
}
}
],
"category": "product_name",
"name": "SIPLUS S7-1200 CPU 1215 AC/DC/RLY"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-29"
}
}
],
"category": "product_name",
"name": "SIPLUS S7-1500 CPU 1511-1 PN"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-30"
}
}
],
"category": "product_name",
"name": "SIPLUS S7-300 CPU 314C-2 PN/DP"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-31"
}
}
],
"category": "product_name",
"name": "Solid Edge SE2025"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-32"
}
}
],
"category": "product_name",
"name": "Solid Edge SE2026"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-7169",
"cwe": {
"id": "CWE-271",
"name": "Privilege Dropping / Lowering Errors"
},
"notes": [
{
"category": "other",
"text": "Privilege Dropping / Lowering Errors",
"title": "CWE-271"
},
{
"category": "description",
"text": "A vulnerability in shadow 4.5\u0027s newgidmap allows unprivileged users to exploit user namespaces, potentially bypassing access restrictions set by administrators.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2018-7169 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2018/cve-2018-7169.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2018-7169"
},
{
"cve": "CVE-2018-9234",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "GnuPG versions 2.2.4 and 2.2.5 have a vulnerability (CVE-2018-9234) that allows remote attackers to bypass security restrictions by using a signing subkey for key certification without enforcing the offline master Certify key.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2018-9234 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2018/cve-2018-9234.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2018-9234"
},
{
"cve": "CVE-2018-12934",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "description",
"text": "The \u0027remember_Ktype\u0027 function in cplus-dem.c of GNU libiberty, present in GNU Binutils 2.30, is susceptible to excessive memory consumption, which may result in out-of-memory conditions during cxxfilt execution.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2018-12934 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2018/cve-2018-12934.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2018-12934"
},
{
"cve": "CVE-2019-9893",
"cwe": {
"id": "CWE-358",
"name": "Improperly Implemented Security Check for Standard"
},
"notes": [
{
"category": "other",
"text": "Improperly Implemented Security Check for Standard",
"title": "CWE-358"
},
{
"category": "other",
"text": "Covert Timing Channel",
"title": "CWE-385"
},
{
"category": "description",
"text": "The libseccomp 2.4.1 update resolves a BPF generation bug, enhances syscall tables, addresses CVE-2019-9893, and improves support for various architectures while fixing prior 64-bit syscall argument comparison issues.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2019-9893 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2019/cve-2019-9893.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2019-9893"
},
{
"cve": "CVE-2019-12900",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "other",
"text": "CWE-1214",
"title": "CWE-1214"
},
{
"category": "description",
"text": "The updates for ClamAV version 0.103.0 and bzip2 address multiple security vulnerabilities, including non-blocking database reloads in ClamAV and out-of-bounds writes in bzip2, enhancing overall functionality and security.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2019-12900 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2019/cve-2019-12900.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2019-12900"
},
{
"cve": "CVE-2019-14866",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "Versions of cpio prior to 2.13 have a vulnerability due to improper input validation when generating TAR archives, allowing unauthorized file permissions and paths that could compromise systems upon extraction by high-privilege users.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2019-14866 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2019/cve-2019-14866.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2019-14866"
},
{
"cve": "CVE-2020-12762",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "description",
"text": "Red Hat Enterprise Linux and its components, including json-c and libfastjson, have multiple vulnerabilities, particularly an integer overflow and out-of-bounds write issue (CVE-2020-12762) affecting large JSON files, allowing potential arbitrary code execution.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-12762 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2020/cve-2020-12762.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2020-12762"
},
{
"cve": "CVE-2020-21047",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "The libcpu component of elfutils version 0.177 has a denial-of-service vulnerability that can be exploited by attackers through specially crafted ELF files, leading to application crashes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-21047 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2020/cve-2020-21047.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2020-21047"
},
{
"cve": "CVE-2020-22217",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "C-ares versions before 1.16.1 and up to 1.17.0 have a buffer overflow vulnerability in the ares_parse_soa_reply function, addressed by the libcares2 update for CVE-2020-22217.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-22217 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2020/cve-2020-22217.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2020-22217"
},
{
"cve": "CVE-2020-35525",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "A NULL pointer dereference vulnerability in SQLite 3.31.1 can cause out-of-memory errors during INTERSECT query processing, potentially leading to Denial of Service attacks in affected NetApp products.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-35525 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2020/cve-2020-35525.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2020-35525"
},
{
"cve": "CVE-2021-35550",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"notes": [
{
"category": "other",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "description",
"text": "Recent updates for OpenJDK versions 1.7, 1.8, and 11 address multiple vulnerabilities related to TLS ciphers, memory allocation, and keystore corruption, while Oracle Java SE and GraalVM have critical vulnerabilities allowing unauthorized access to sensitive data.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-35550 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-35550.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-35550"
},
{
"cve": "CVE-2021-35556",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "description",
"text": "Recent updates for various Java versions, including IBM and OpenJDK, address multiple vulnerabilities related to memory allocation, weak cipher preferences, and denial of service risks, while enhancing functionality and security.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-35556 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-35556.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-35556"
},
{
"cve": "CVE-2021-35559",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "description",
"text": "Multiple updates for Java versions, including IBM and OpenJDK, address various vulnerabilities such as memory allocation issues and weak cipher preferences, while also enhancing functionalities and updating to newer service refreshes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-35559 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-35559.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-35559"
},
{
"cve": "CVE-2021-35561",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "description",
"text": "Recent updates for OpenJDK and Oracle Java SE address multiple vulnerabilities, including weak TLS ciphers, excessive memory allocations, and denial of service risks across various versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-35561 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-35561.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-35561"
},
{
"cve": "CVE-2021-35564",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "Multiple updates for IBM and OpenJDK Java versions address various vulnerabilities, including excessive memory allocation and weak cipher preferences, while also enhancing functionality and security across several releases.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-35564 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-35564.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-35564"
},
{
"cve": "CVE-2021-35565",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "description",
"text": "Recent updates for various Java versions, including IBM and OpenJDK, address multiple vulnerabilities related to memory allocation, weak cipher preferences, and denial of service risks, while enhancing functionality and security.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-35565 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-35565.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-35565"
},
{
"cve": "CVE-2021-35567",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"notes": [
{
"category": "other",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "description",
"text": "Recent updates for Java, including OpenJDK and Oracle Java SE, address multiple vulnerabilities related to memory allocation, TLS issues, and unauthorized access, with CVSS scores indicating significant risks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-35567 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-35567.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-35567"
},
{
"cve": "CVE-2021-35578",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Recent updates for Java SE, OpenJDK, and Oracle GraalVM address multiple vulnerabilities, including memory allocation issues, weak TLS ciphers, and denial of service risks, affecting various supported versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-35578 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-35578.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-35578"
},
{
"cve": "CVE-2021-35586",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "description",
"text": "Multiple updates for Java versions, including IBM and OpenJDK, address various vulnerabilities such as excessive memory allocation and weak cipher preferences, while also enhancing functionality and security across several versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-35586 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-35586.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-35586"
},
{
"cve": "CVE-2021-35588",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "Recent updates for IBM Java and OpenJDK address multiple vulnerabilities, including memory allocation issues and weak cipher preferences, while also enhancing versions to Java 7.1 SR5, Java 8.0 SR7, and OpenJDK 8u312 and 7u321.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-35588 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-35588.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-35588"
},
{
"cve": "CVE-2021-35603",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"notes": [
{
"category": "other",
"text": "Observable Discrepancy",
"title": "CWE-203"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "Recent updates for OpenJDK versions 1.7, 1.8, and 11 address multiple vulnerabilities, including TLS cipher issues and memory allocation problems, while Oracle Java SE and GraalVM Enterprise Edition have vulnerabilities that could compromise data confidentiality.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-35603 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-35603.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-35603"
},
{
"cve": "CVE-2021-36084",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Red Hat Enterprise Linux and SELinux versions up to 3.2 have multiple vulnerabilities, including use-after-free and Denial of Service risks, potentially allowing attackers to execute arbitrary code or cause service disruptions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-36084 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-36084.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-36084"
},
{
"cve": "CVE-2021-36085",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Red Hat Enterprise Linux and SELinux versions up to 3.2 have multiple vulnerabilities, including denial of service and arbitrary code execution risks, affecting various components and products, particularly those utilizing SELinux.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-36085 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-36085.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-36085"
},
{
"cve": "CVE-2021-36086",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Red Hat Enterprise Linux and SELinux versions up to 3.2 have multiple vulnerabilities, including denial of service and arbitrary code execution, affecting various components and requiring user interaction or elevated privileges for exploitation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-36086 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-36086.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-36086"
},
{
"cve": "CVE-2021-36087",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Red Hat Enterprise Linux and SELinux 3.2 have multiple vulnerabilities, including denial of service and arbitrary code execution risks, affecting various components and requiring user interaction or elevated privileges for exploitation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-36087 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-36087.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-36087"
},
{
"cve": "CVE-2021-38185",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "description",
"text": "GNU cpio version 2.13 is vulnerable to remote code execution due to an integer overflow in the ds_fgetstr function when processing specially crafted pattern files.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-38185 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-38185.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-38185"
},
{
"cve": "CVE-2021-47358",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "SUSE Linux Enterprise 15 SP4 and SP5 kernels were updated to address multiple security vulnerabilities, including memory leaks and use-after-free issues, across various kernel versions and components.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-47358 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-47358.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-47358"
},
{
"cve": "CVE-2021-47361",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "SUSE Linux Enterprise 12 and 15 SP5 kernels, including RT and Azure variants, were updated to address multiple security vulnerabilities such as memory leaks and use-after-free issues, enhancing overall system security.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-47361 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-47361.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-47361"
},
{
"cve": "CVE-2022-0435",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "SUSE Linux Enterprise kernels and Linux Kernel versions have been updated to address multiple security vulnerabilities, including memory corruption, race conditions, and remote stack overflow issues, alongside various non-security bug fixes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-0435 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-0435.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-0435"
},
{
"cve": "CVE-2022-0492",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "other",
"text": "Missing Authorization",
"title": "CWE-862"
},
{
"category": "other",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "description",
"text": "Recent updates to various SUSE Linux Enterprise kernels and Linux Kernel versions addressed multiple security vulnerabilities, including privilege escalation, memory corruption, and transient execution side-channel attacks across several service packs.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-0492 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-0492.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-0492"
},
{
"cve": "CVE-2022-0847",
"cwe": {
"id": "CWE-909",
"name": "Missing Initialization of Resource"
},
"notes": [
{
"category": "other",
"text": "Missing Initialization of Resource",
"title": "CWE-909"
},
{
"category": "other",
"text": "Improper Initialization",
"title": "CWE-665"
},
{
"category": "other",
"text": "Improper Preservation of Permissions",
"title": "CWE-281"
},
{
"category": "description",
"text": "SUSE Linux Enterprise kernels across various versions have been updated to address multiple security vulnerabilities, including privilege escalation and memory access issues, alongside mitigations for transient execution side-channel attacks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-0847 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-0847.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-0847"
},
{
"cve": "CVE-2022-0850",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise kernels (12 SP2, SP3, SP4, SP5, and 15 SP1, SP3) were updated to address various security vulnerabilities, including memory leaks, use-after-free, double free issues, and information leak flaws.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-0850 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-0850.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-0850"
},
{
"cve": "CVE-2022-1353",
"cwe": {
"id": "CWE-212",
"name": "Improper Removal of Sensitive Information Before Storage or Transfer"
},
"notes": [
{
"category": "other",
"text": "Improper Removal of Sensitive Information Before Storage or Transfer",
"title": "CWE-212"
},
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "description",
"text": "Multiple updates were released for SUSE Linux Enterprise kernels addressing various security vulnerabilities and non-security bugs, including memory management issues, privilege escalation risks, and access control flaws.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-1353 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-1353.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-1353"
},
{
"cve": "CVE-2022-1734",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "SUSE Linux Enterprise kernels across multiple versions have been updated to address various security vulnerabilities, including RETBLEED, use-after-free issues, and non-security bug fixes, enhancing overall system stability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-1734 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-1734.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-1734"
},
{
"cve": "CVE-2022-2639",
"cwe": {
"id": "CWE-681",
"name": "Incorrect Conversion between Numeric Types"
},
"notes": [
{
"category": "other",
"text": "Incorrect Conversion between Numeric Types",
"title": "CWE-681"
},
{
"category": "other",
"text": "Integer Coercion Error",
"title": "CWE-192"
},
{
"category": "other",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
},
{
"category": "description",
"text": "SUSE Linux Enterprise kernel updates across various versions address multiple security vulnerabilities, including race conditions, use-after-free issues, and denial of service, alongside non-security bug fixes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-2639 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-2639.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-2639"
},
{
"cve": "CVE-2022-2964",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "description",
"text": "Recent updates to various SUSE Linux Enterprise kernels addressed multiple security vulnerabilities, including use-after-free and memory corruption issues, across several versions and components.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-2964 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-2964.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-2964"
},
{
"cve": "CVE-2022-3424",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Recent updates to various SUSE Linux Enterprise kernels and Linux Kernel versions addressed multiple critical security vulnerabilities, including use-after-free and memory corruption issues, across several components and drivers.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-3424 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-3424.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-3424"
},
{
"cve": "CVE-2022-20141",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "other",
"text": "Improper Locking",
"title": "CWE-667"
},
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Multiple updates across SUSE Linux Enterprise and Linux Kernel versions addressed various security vulnerabilities, including buffer overflows, use-after-free issues, and the RETBLEED attack, alongside non-security bug fixes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-20141 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-20141.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-20141"
},
{
"cve": "CVE-2022-23039",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "description",
"text": "SUSE Linux Enterprise kernels across various versions have been updated to address multiple security vulnerabilities, including memory leaks, buffer overflows, and double free issues, alongside numerous non-security bug fixes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-23039 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-23039.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-23039"
},
{
"cve": "CVE-2022-23040",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "description",
"text": "SUSE Linux Enterprise kernels across various versions have been updated to address multiple security vulnerabilities, including memory leaks, buffer overflows, and double free issues, alongside numerous non-security bug fixes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-23040 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-23040.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-23040"
},
{
"cve": "CVE-2022-24958",
"cwe": {
"id": "CWE-763",
"name": "Release of Invalid Pointer or Reference"
},
"notes": [
{
"category": "other",
"text": "Release of Invalid Pointer or Reference",
"title": "CWE-763"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "Recent updates to SUSE Linux Enterprise kernels and Google Android address multiple security vulnerabilities, including privilege escalations and memory leaks, while NetApp products face risks from flaws in Linux Kernel versions up to 5.16.8.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-24958 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-24958.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-24958"
},
{
"cve": "CVE-2022-27223",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Array Index",
"title": "CWE-129"
},
{
"category": "description",
"text": "SUSE Linux Enterprise 15 SP3 and RT kernels were updated to address multiple security vulnerabilities, including CVEs for memory leaks, privilege escalations, and a specific out-of-array access issue in the udc-xilinx driver.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-27223 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-27223.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-27223"
},
{
"cve": "CVE-2022-28390",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise kernels (12 SP2, SP3, SP4, SP5, and 15 SP1, SP3) and various Linux Kernel versions were updated to address multiple security vulnerabilities, including memory leaks, use-after-free, and double free issues.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-28390 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-28390.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-28390"
},
{
"cve": "CVE-2022-29872",
"cwe": {
"id": "CWE-141",
"name": "Improper Neutralization of Parameter/Argument Delimiters"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Parameter/Argument Delimiters",
"title": "CWE-141"
},
{
"category": "description",
"text": "A vulnerability in SICAM T (versions \u003c V3.0) allows authenticated attackers to exploit improper validation of POST request parameters, potentially leading to denial of service or arbitrary code execution.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-29872 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-29872.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-29872"
},
{
"cve": "CVE-2022-29873",
"cwe": {
"id": "CWE-141",
"name": "Improper Neutralization of Parameter/Argument Delimiters"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Parameter/Argument Delimiters",
"title": "CWE-141"
},
{
"category": "description",
"text": "A vulnerability in SICAM T devices (versions \u003c V3.0) allows unauthenticated attackers to exploit improper validation of GET and POST request parameters, leading to potential denial of service or arbitrary code execution.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-29873 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-29873.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-29873"
},
{
"cve": "CVE-2022-29874",
"cwe": {
"id": "CWE-319",
"name": "Cleartext Transmission of Sensitive Information"
},
"notes": [
{
"category": "other",
"text": "Cleartext Transmission of Sensitive Information",
"title": "CWE-319"
},
{
"category": "description",
"text": "A vulnerability in SICAM T (versions \u003c V3.0) allows unauthenticated attackers to capture unencrypted HTTP web traffic, potentially disrupting device functionality.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-29874 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-29874.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-29874"
},
{
"cve": "CVE-2022-29876",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "description",
"text": "A vulnerability in SICAM T (versions \u003c V3.0) allows unauthenticated attackers to exploit reflected XSS attacks due to improper handling of GET request parameters reflected in the web server response.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-29876 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-29876.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-29876"
},
{
"cve": "CVE-2022-29878",
"cwe": {
"id": "CWE-294",
"name": "Authentication Bypass by Capture-replay"
},
"notes": [
{
"category": "other",
"text": "Authentication Bypass by Capture-replay",
"title": "CWE-294"
},
{
"category": "description",
"text": "A vulnerability in SICAM T (versions \u003c V3.0) allows unauthenticated attackers to exploit unencrypted challenge-response communication, potentially gaining access to the device\u0027s management interface.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-29878 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-29878.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-29878"
},
{
"cve": "CVE-2022-29879",
"cwe": {
"id": "CWE-306",
"name": "Missing Authentication for Critical Function"
},
"notes": [
{
"category": "other",
"text": "Missing Authentication for Critical Function",
"title": "CWE-306"
},
{
"category": "description",
"text": "A vulnerability in SICAM T (versions \u003c V3.0) allows authenticated users to access critical device information due to inadequate access protection in the web-based management interface.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-29879 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-29879.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-29879"
},
{
"cve": "CVE-2022-29880",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "description",
"text": "A vulnerability in SICAM T (versions \u003c V3.0) allows authenticated attackers to exploit improper input validation in the configuration interface, enabling persistent XSS attacks affecting logged-in users.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-29880 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-29880.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-29880"
},
{
"cve": "CVE-2022-29881",
"cwe": {
"id": "CWE-306",
"name": "Missing Authentication for Critical Function"
},
"notes": [
{
"category": "other",
"text": "Missing Authentication for Critical Function",
"title": "CWE-306"
},
{
"category": "description",
"text": "A vulnerability in SICAM T (versions \u003c V3.0) allows unauthenticated users to access internal configuration details due to inadequate access protection in the web-based management interface.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-29881 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-29881.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-29881"
},
{
"cve": "CVE-2022-29882",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "description",
"text": "A vulnerability in SICAM T (versions \u003c V3.0) allows unauthenticated attackers to exploit improper file handling for XSS attacks, potentially enabling actions on behalf of legitimate users via error logs.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-29882 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-29882.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-29882"
},
{
"cve": "CVE-2022-29883",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "other",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "description",
"text": "Vulnerabilities in SICAM P850, P855, and T devices (all versions \u003c V3.00) allow unauthenticated access to web interface pages, enabling attackers to delete log files without authentication.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-29883 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-29883.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-29883"
},
{
"cve": "CVE-2022-30594",
"cwe": {
"id": "CWE-276",
"name": "Incorrect Default Permissions"
},
"notes": [
{
"category": "other",
"text": "Incorrect Default Permissions",
"title": "CWE-276"
},
{
"category": "other",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "other",
"text": "Missing Authorization",
"title": "CWE-862"
},
{
"category": "description",
"text": "Recent kernel updates for SUSE Linux Enterprise and various Linux Kernel versions addressed multiple security vulnerabilities, including the RETBLEED attack, use-after-free issues, buffer overflows, and restriction bypasses related to the PT_SUSPEND_SECCOMP flag.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-30594 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-30594.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-30594"
},
{
"cve": "CVE-2022-31807",
"cwe": {
"id": "CWE-347",
"name": "Improper Verification of Cryptographic Signature"
},
"notes": [
{
"category": "other",
"text": "Improper Verification of Cryptographic Signature",
"title": "CWE-347"
},
{
"category": "description",
"text": "Vulnerabilities in SiPass integrated AC5102 and ACC-AP devices allow local and remote attackers to upload or modify firmware due to inadequate integrity checks during firmware updates.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-31807 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-31807.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-31807"
},
{
"cve": "CVE-2022-34903",
"cwe": {
"id": "CWE-347",
"name": "Improper Verification of Cryptographic Signature"
},
"notes": [
{
"category": "other",
"text": "Improper Verification of Cryptographic Signature",
"title": "CWE-347"
},
{
"category": "other",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
},
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "description",
"text": "GnuPGP has multiple vulnerabilities, including signature forgery and status injection issues, while recent updates to gpg2 and Docker images for Dagster-cloud and Spectrafit address these security concerns.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-34903 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-34903.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-34903"
},
{
"cve": "CVE-2022-36123",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "description",
"text": "The Linux kernel prior to version 5.18.13 contains a vulnerability in the block starting symbol (.bss) that may allow Xen PV guest OS users to perform denial of service attacks or escalate privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-36123 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-36123.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-36123"
},
{
"cve": "CVE-2022-37032",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Recent updates for Quagga and FRRouting address multiple vulnerabilities, including sensitive information disclosure and denial of service risks due to BGP processing issues and out-of-bounds read vulnerabilities.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-37032 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-37032.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-37032"
},
{
"cve": "CVE-2022-37434",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "description",
"text": "Recent updates to VLC, Oracle products, zlib, and Dagster-cloud address various vulnerabilities, including critical issues in Oracle systems and security fixes in zlib and opencv-python.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-37434 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-37434.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-37434"
},
{
"cve": "CVE-2022-40226",
"cwe": {
"id": "CWE-384",
"name": "Session Fixation"
},
"notes": [
{
"category": "other",
"text": "Session Fixation",
"title": "CWE-384"
},
{
"category": "description",
"text": "A vulnerability in SICAM P850, P855, and T devices allows session takeover due to the acceptance of user-defined session cookies without renewal after login/logout.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-40226 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-40226.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-40226"
},
{
"cve": "CVE-2022-41665",
"cwe": {
"id": "CWE-141",
"name": "Improper Neutralization of Parameter/Argument Delimiters"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Parameter/Argument Delimiters",
"title": "CWE-141"
},
{
"category": "description",
"text": "A vulnerability in SICAM P850, P855 (all versions \u003c V3.10) and SICAM T (all versions \u003c V3.0) devices allows unauthenticated attackers to execute arbitrary code or cause denial of service due to improper GET request parameter validation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-41665 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-41665.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-41665"
},
{
"cve": "CVE-2022-41858",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple updates across various SUSE Linux Enterprise kernels addressed critical security vulnerabilities, including stack overflows, denial of service, memory leaks, and use-after-free issues, enhancing overall system stability and security.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-41858 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-41858.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-41858"
},
{
"cve": "CVE-2022-43439",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "A vulnerability in POWER METER models SICAM Q100, P850, P855, and T allows authenticated remote attackers to crash the device or execute arbitrary code due to improper validation of the Language-parameter in web interface requests.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-43439 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-43439.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-43439"
},
{
"cve": "CVE-2022-48624",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "description",
"text": "Red Hat OpenShift and multiple NetApp products have vulnerabilities in components like \u0027less\u0027, allowing local attackers to execute arbitrary commands, manipulate files, or disclose sensitive information due to improper handling of shell metacharacters.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-48624 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-48624.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-48624"
},
{
"cve": "CVE-2022-48626",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "SUSE Linux Enterprise kernels across versions 12 SP5, 15 SP2, SP3, SP4, and SP5 were updated to address multiple security vulnerabilities, including use-after-free issues, memory leaks, and kernel panics.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-48626 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-48626.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-48626"
},
{
"cve": "CVE-2022-48919",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "SUSE Linux Enterprise kernels across various versions have been updated to address multiple security vulnerabilities, including memory leaks, null pointer dereferences, and race conditions, with numerous CVEs resolved.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-48919 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-48919.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-48919"
},
{
"cve": "CVE-2022-48926",
"cwe": {
"id": "CWE-414",
"name": "Missing Lock Check"
},
"notes": [
{
"category": "other",
"text": "Missing Lock Check",
"title": "CWE-414"
},
{
"category": "description",
"text": "SUSE Linux Enterprise 15 SP3, SP4, and SP5 kernels were updated to address multiple security vulnerabilities, including memory leaks, race conditions, and null pointer dereferences, along with various non-security bug fixes.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-48926 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-48926.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-48926"
},
{
"cve": "CVE-2022-48948",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "description",
"text": "SUSE Linux Enterprise 15 SP4 and SP5 kernels were updated to address multiple security vulnerabilities, including memory leaks, use-after-free issues, and a buffer overflow in the USB gadget\u0027s setup handler.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-48948 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-48948.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-48948"
},
{
"cve": "CVE-2022-48951",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "SUSE Linux Enterprise kernels across versions 12 SP5 and 15 SP4/SP5, including Azure and RT variants, received updates addressing multiple security vulnerabilities such as memory leaks and use-after-free issues, alongside driver-related fixes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-48951 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-48951.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-48951"
},
{
"cve": "CVE-2022-48960",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Multiple updates across various SUSE Linux Enterprise kernels, including 15 SP5, 15 SP4, and 12 SP5, addressed critical security vulnerabilities such as use-after-free and memory leaks in network and display drivers.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-48960 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-48960.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-48960"
},
{
"cve": "CVE-2022-48962",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Multiple updates across various SUSE Linux Enterprise kernels (15 SP5, 15 SP4, 15 SP3, 15 SP2, 12 SP5) addressed critical security vulnerabilities, including use-after-free and memory leak issues in network and display components.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-48962 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-48962.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-48962"
},
{
"cve": "CVE-2022-48966",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "SUSE Linux Enterprise 15 SP5 and 12 SP5 kernels received updates addressing multiple security vulnerabilities, including memory leaks, use-after-free issues, and out-of-bounds access across various components.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-48966 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-48966.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-48966"
},
{
"cve": "CVE-2022-48967",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Array Index",
"title": "CWE-129"
},
{
"category": "description",
"text": "SUSE Linux Enterprise kernels across various versions have been updated to address multiple security vulnerabilities, including use-after-free issues and memory leaks in networking and display components.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-48967 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-48967.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-48967"
},
{
"cve": "CVE-2022-49058",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "description",
"text": "SUSE Linux Enterprise kernels across versions 12 SP5 and 15 SP3 to SP5 have been updated to address multiple security vulnerabilities, including race conditions, buffer overflows, and memory management issues, alongside various non-security bug fixes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-49058 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-49058.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-49058"
},
{
"cve": "CVE-2023-4641",
"cwe": {
"id": "CWE-303",
"name": "Incorrect Implementation of Authentication Algorithm"
},
"notes": [
{
"category": "other",
"text": "Incorrect Implementation of Authentication Algorithm",
"title": "CWE-303"
},
{
"category": "other",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "description",
"text": "Recent updates address multiple vulnerabilities across various platforms, including Oracle Communications, Red Hat OpenShift, and shadow-utils, affecting user account management and potentially leading to unauthorized access and data leaks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-4641 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-4641.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2023-4641"
},
{
"cve": "CVE-2023-27043",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "Recent updates for Python 3.11 and earlier versions address multiple security vulnerabilities, particularly in email parsing and libexpat, alongside various non-security improvements and fixes for CVEs.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-27043 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-27043.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2023-27043"
},
{
"cve": "CVE-2023-28322",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"notes": [
{
"category": "other",
"text": "Expected Behavior Violation",
"title": "CWE-440"
},
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "description",
"text": "Recent updates for macOS Ventura, Monterey, and Big Sur address multiple security vulnerabilities, while curl updates fix various flaws, including use-after-free and information disclosure issues, alongside a critical vulnerability in Oracle Enterprise Manager.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-28322 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-28322.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2023-28322"
},
{
"cve": "CVE-2023-29383",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "The shadow update addresses CVE-2023-29383 related to /etc/shadow manipulation, resolves control character injection vulnerabilities in Shadow 4.13, and includes various non-security bug fixes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-29383 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-29383.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2023-29383"
},
{
"cve": "CVE-2023-29491",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Recent updates for macOS Ventura, Monterey, and Big Sur address critical vulnerabilities, while Oracle, Red Hat OpenShift, and ncurses have multiple security flaws that could lead to system compromise and denial-of-service conditions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-29491 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-29491.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2023-29491"
},
{
"cve": "CVE-2023-30901",
"cwe": {
"id": "CWE-352",
"name": "Cross-Site Request Forgery (CSRF)"
},
"notes": [
{
"category": "other",
"text": "Cross-Site Request Forgery (CSRF)",
"title": "CWE-352"
},
{
"category": "description",
"text": "SICAM P850 and P855 devices (all versions \u003c V3.11) are vulnerable to Cross-Site Request Forgery attacks, allowing unauthorized actions via malicious links targeting authenticated users.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-30901 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-30901.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2023-30901"
},
{
"cve": "CVE-2023-31238",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "other",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
},
{
"category": "description",
"text": "A vulnerability in SICAM P850 and P855 devices (all versions \u003c V3.11) allows attackers to impersonate legitimate users by exploiting missing cookie protection flags and accessing session tokens.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-31238 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-31238.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2023-31238"
},
{
"cve": "CVE-2023-41358",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "The frr and quagga updates address multiple vulnerabilities, including issues with BGP attributes, zero-length NLRIs, and denial of service risks, enhancing overall stability and security.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-41358 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-41358.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2023-41358"
},
{
"cve": "CVE-2023-46218",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"notes": [
{
"category": "other",
"text": "Insertion of Sensitive Information Into Sent Data",
"title": "CWE-201"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Improper Handling of Case Sensitivity",
"title": "CWE-178"
},
{
"category": "description",
"text": "Multiple vulnerabilities across Oracle Communications products, curl, and Siemens products allow unauthorized access, data manipulation, and potential Denial-of-Service, with CVSS scores of 6.5 for specific Oracle vulnerabilities.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-46218 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-46218.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2023-46218"
},
{
"cve": "CVE-2023-46753",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "description",
"text": "The FRRouting 8.5.6 update addresses multiple vulnerabilities, including crashes from crafted BGP UPDATE messages and malformed MP_REACH_NLRI data, while enhancing PIM/PIMv6/BGP and VRF support.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-46753 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-46753.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2023-46753"
},
{
"cve": "CVE-2023-47234",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "The frr 8.5.6 update addresses multiple vulnerabilities in BGP UPDATE processing, including denial-of-service issues and crashes from malformed messages and improper attribute handling.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-47234 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-47234.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2023-47234"
},
{
"cve": "CVE-2024-0397",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "description",
"text": "Recent updates for Python interpreters and Oracle Database Server address multiple security vulnerabilities, including denial of service risks and memory race conditions, alongside various bug fixes and enhancements.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-0397 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-0397.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-0397"
},
{
"cve": "CVE-2024-5642",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "Recent updates to Python address multiple security vulnerabilities, including buffer overreads and email header injection, affecting versions up to 3.9 and impacting various NetApp products.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5642 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-5642.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-5642"
},
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "description",
"text": "Recent updates to various Python versions address multiple vulnerabilities, including denial of service and excessive resource consumption, particularly in the tarfile and http.cookies modules, alongside Oracle Database patches for significant vulnerabilities.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6232 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-6232.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-6923",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "description",
"text": "Recent updates for various Python versions, including venv-salt-minion, address multiple security vulnerabilities, particularly email header injection and resource consumption issues, alongside numerous bug fixes and enhancements.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6923 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-6923.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-6923"
},
{
"cve": "CVE-2024-7592",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "description",
"text": "Recent updates for Python 3.x and Oracle products address multiple security vulnerabilities, including denial of service, excessive resource consumption, and email header injection, with varying severity levels across different versions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7592 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-7592.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-7592"
},
{
"cve": "CVE-2024-11053",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "description",
"text": "Multiple vulnerabilities in curl and Oracle products, including credential leakage and unauthorized data access, affect various versions of software, notably impacting cURL and Oracle Communications Unified Assurance.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-11053 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-11053.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-11053"
},
{
"cve": "CVE-2024-11168",
"cwe": {
"id": "CWE-1287",
"name": "Improper Validation of Specified Type of Input"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Specified Type of Input",
"title": "CWE-1287"
},
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "description",
"text": "Recent updates for Python address CVE-2024-11168, fixing improper validation of IPv6 and IPvFuture addresses, and resolving vulnerabilities in the `urllib.parse.urlsplit()` and `urlparse()` functions that could lead to SSRF exploits.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-11168 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-11168.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-11168"
},
{
"cve": "CVE-2024-12133",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "description",
"text": "Multiple vulnerabilities affecting Oracle Communications EAGLE LNP Application Processor, Oracle Cloud Native Core Policy, and GNU libtasn1 could lead to denial of service attacks, with CVSS scores of 5.3 for some products.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-12133 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-12133.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-12133"
},
{
"cve": "CVE-2024-12243",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "description",
"text": "A flaw in GnuTLS related to inefficient DER decoding in libtasn1 can lead to denial-of-service conditions, affecting multiple NetApp products and identified as CVE-2024-12243.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-12243 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-12243.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-12243"
},
{
"cve": "CVE-2024-28085",
"cwe": {
"id": "CWE-268",
"name": "Privilege Chaining"
},
"notes": [
{
"category": "other",
"text": "Privilege Chaining",
"title": "CWE-268"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Improper Neutralization of Escape, Meta, or Control Sequences",
"title": "CWE-150"
},
{
"category": "description",
"text": "The util-linux update addresses critical vulnerabilities, particularly in the \u0027wall\u0027 command, neutralizing escape sequences to prevent account takeover and other potential exploits in versions up to 2.40.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28085 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-28085.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-28085"
},
{
"cve": "CVE-2024-32487",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "other",
"text": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)",
"title": "CWE-96"
},
{
"category": "description",
"text": "The Less text file viewer has an OS command execution vulnerability due to mishandled newline characters in file names, affecting multiple NetApp products and allowing remote command execution when the LESSOPEN variable is set.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-32487 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-32487.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-32487"
},
{
"cve": "CVE-2024-47875",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "description",
"text": "DOMPurify has addressed a nesting-based mXSS vulnerability in versions 2.5.0 and 3.1.3, while HPE Private Cloud AI has identified remote exploit vulnerabilities.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:H/SA:H",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47875 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-47875.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-47875"
},
{
"cve": "CVE-2024-50602",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "description",
"text": "Multiple vulnerabilities across Oracle Communications Cloud Native Core services and libexpat allow unauthenticated denial of service attacks, with CVSS scores of 5.9, affecting various versions and components.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50602 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-50602.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-50602"
},
{
"cve": "CVE-2024-52533",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "other",
"text": "Off-by-one Error",
"title": "CWE-193"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Communications Cloud Native Core and Gnome Glib versions prior to 2.82.1 expose systems to unauthorized access and buffer overflow risks, potentially leading to data compromise and service disruptions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-52533 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-52533.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-52533"
},
{
"cve": "CVE-2024-56835",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
},
{
"category": "description",
"text": "A vulnerability in RUGGEDCOM ROX II (versions \u003c V2.17.0) allows code injection in the DHCP Server configuration file, enabling attackers to gain root access via a reverse shell.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-56835 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-56835.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-56835"
},
{
"cve": "CVE-2024-56836",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "description",
"text": "A vulnerability in RUGGEDCOM ROX II family versions prior to V2.17.0 allows attackers to inject parameters during Dynamic DNS configuration, potentially leading to root access via a reverse shell.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-56836 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-56836.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-56836"
},
{
"cve": "CVE-2024-56837",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "description",
"text": "A vulnerability in the RUGGEDCOM ROX II family (versions \u003c V2.17.0) allows attackers to gain root access through insufficient validation during configuration file handling.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-56837 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-56837.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-56837"
},
{
"cve": "CVE-2024-56838",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
},
{
"category": "description",
"text": "A vulnerability in RUGGEDCOM ROX II devices (versions \u003c V2.17.0) allows attackers to execute arbitrary code as root due to the SCEP client\u0027s failure to validate multiple fields during secure certificate enrollment.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-56838 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-56838.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-56838"
},
{
"cve": "CVE-2024-56839",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
},
{
"category": "description",
"text": "A vulnerability in RUGGEDCOM ROX II (versions \u003c V2.17.0) allows code injection via VRF, enabling attackers to execute arbitrary code with root privileges.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-56839 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-56839.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-56839"
},
{
"cve": "CVE-2024-56840",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
},
{
"category": "description",
"text": "A vulnerability in the RUGGEDCOM ROX II family (versions \u003c V2.17.0) allows code injection via IPsec, enabling attackers to execute arbitrary code with root privileges.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-56840 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-56840.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-56840"
},
{
"cve": "CVE-2025-0938",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "Recent updates to Python versions 3.6, 3.11, 3.12, and 3.13.5 address security vulnerabilities related to improper URL parsing of domain names with square brackets, which violate RFC 3986 and could lead to unauthorized data manipulation.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-0938 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-0938.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-0938"
},
{
"cve": "CVE-2025-2783",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "Palo Alto Networks has addressed vulnerabilities in Prisma\u00ae Access Browser and highlighted a high-severity sandbox escape flaw in Google Chrome on Windows, linked to an incorrect handle in Mojo.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:U/AU:N/R:U/V:D/RE:L/U:Amber",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-2783 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-2783.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-2783"
},
{
"cve": "CVE-2025-10148",
"cwe": {
"id": "CWE-340",
"name": "Generation of Predictable Numbers or Identifiers"
},
"notes": [
{
"category": "other",
"text": "Generation of Predictable Numbers or Identifiers",
"title": "CWE-340"
},
{
"category": "description",
"text": "Recent updates to curl (version 8.14.1) address critical security vulnerabilities, including cache poisoning risks in WebSocket code and a denial of service flaw in Oracle Communications Unified Inventory Management.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-10148 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-10148.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-10148"
},
{
"cve": "CVE-2025-40800",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "description",
"text": "A vulnerability in various versions of COMOS, NX, Simcenter 3D, Simcenter Femap, and Solid Edge products allows for potential man-in-the-middle attacks due to the IAM client not validating server certificates for TLS connections.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40800 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40800.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-40800"
},
{
"cve": "CVE-2025-40801",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "description",
"text": "A vulnerability in COMOS, NX, Simcenter, and Tecnomatix products arises from the SALT SDK\u0027s failure to validate server certificates for TLS connections, risking man-in-the-middle attacks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40801 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40801.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-40801"
},
{
"cve": "CVE-2025-40806",
"cwe": {
"id": "CWE-204",
"name": "Observable Response Discrepancy"
},
"notes": [
{
"category": "other",
"text": "Observable Response Discrepancy",
"title": "CWE-204"
},
{
"category": "description",
"text": "A vulnerability in Gridscale X Prepay (versions \u003c V4.2.1) allows unauthenticated remote attackers to perform user enumeration, potentially facilitating brute force attacks on valid users.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40806 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40806.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-40806"
},
{
"cve": "CVE-2025-40807",
"cwe": {
"id": "CWE-294",
"name": "Authentication Bypass by Capture-replay"
},
"notes": [
{
"category": "other",
"text": "Authentication Bypass by Capture-replay",
"title": "CWE-294"
},
{
"category": "description",
"text": "A vulnerability in Gridscale X Prepay (versions \u003c V4.2.1) allows locked-out users to exploit capture-replay of authentication tokens, enabling them to establish valid sessions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40807 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40807.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-40807"
},
{
"cve": "CVE-2025-40818",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "other",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
},
{
"category": "description",
"text": "A vulnerability in SINEMA Remote Connect Server (versions \u003c V3.2 SP4) allows unauthorized access to private SSL/TLS keys, enabling attackers to impersonate the server and conduct man-in-the-middle attacks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40818 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40818.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-40818"
},
{
"cve": "CVE-2025-40819",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"notes": [
{
"category": "other",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "description",
"text": "A vulnerability in SINEMA Remote Connect Server (versions \u003c V3.2 SP4) allows unauthorized modification of the system_ticketinfo table, enabling database users to bypass licensing restrictions and modify database values directly.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40819 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40819.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-40819"
},
{
"cve": "CVE-2025-40820",
"cwe": {
"id": "CWE-940",
"name": "Improper Verification of Source of a Communication Channel"
},
"notes": [
{
"category": "other",
"text": "Improper Verification of Source of a Communication Channel",
"title": "CWE-940"
},
{
"category": "description",
"text": "The document outlines a vulnerability in certain products that lack TCP sequence number validation, enabling unauthenticated remote attackers to disrupt TCP-based services through the injection of spoofed IP packets.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40820 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40820.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-40820"
},
{
"cve": "CVE-2025-40830",
"cwe": {
"id": "CWE-285",
"name": "Improper Authorization"
},
"notes": [
{
"category": "other",
"text": "Improper Authorization",
"title": "CWE-285"
},
{
"category": "description",
"text": "A vulnerability in SINEC Security Monitor (versions \u003c V4.10.0) allows lowly privileged authenticated local attackers to read or write any file on the server or sensor due to inadequate authorization checks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40830 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40830.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-40830"
},
{
"cve": "CVE-2025-40831",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "A vulnerability in SINEC Security Monitor versions prior to V4.10.0 allows lowly privileged authenticated attackers to exploit input validation issues in the date parameter during report generation, potentially causing a denial of service.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40831 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40831.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-40831"
},
{
"cve": "CVE-2025-40935",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "A vulnerability in RUGGEDCOM devices (versions below V5.10.1) allows authenticated remote attackers to exploit improper input validation during TLS certificate uploads, potentially leading to device crashes and Denial of Service.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40935 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40935.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-40935"
},
{
"cve": "CVE-2025-40938",
"cwe": {
"id": "CWE-798",
"name": "Use of Hard-coded Credentials"
},
"notes": [
{
"category": "other",
"text": "Use of Hard-coded Credentials",
"title": "CWE-798"
},
{
"category": "description",
"text": "A vulnerability in SIMATIC CN 4100 (versions \u003c V4.0.1) exposes sensitive firmware information, compromising the device\u0027s confidentiality, integrity, and availability.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40938 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40938.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-40938"
},
{
"cve": "CVE-2025-40939",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "description",
"text": "A vulnerability in SIMATIC CN 4100 (versions \u003c V4.0.1) allows an attacker with physical access to exploit an unauthenticated USB port, potentially causing a denial of service by triggering a reboot.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40939 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40939.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-40939"
},
{
"cve": "CVE-2025-40940",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "description",
"text": "A vulnerability in SIMATIC CN 4100 (versions \u003c V4.0.1) leads to inconsistent SNMP behavior, potentially allowing unauthorized access to sensitive data and compromising confidentiality.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40940 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40940.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-40940"
},
{
"cve": "CVE-2025-40941",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "description",
"text": "A vulnerability in SIMATIC CN 4100 (all versions \u003c V4.0.1) allows affected devices to expose server information in their responses, potentially aiding attackers with network access in targeted attacks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40941 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40941.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-40941"
},
{
"cve": "CVE-2025-59392",
"cwe": {
"id": "CWE-288",
"name": "Authentication Bypass Using an Alternate Path or Channel"
},
"notes": [
{
"category": "other",
"text": "Authentication Bypass Using an Alternate Path or Channel",
"title": "CWE-288"
},
{
"category": "description",
"text": "Elspec G5 devices up to version 1.2.2.19 have a vulnerability that allows physical access to reset the Admin password using a USB drive with a specific reset string.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-59392 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59392.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-59392"
},
{
"cve": "CVE-2018-1000876",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "description",
"text": "The update for binutils version 2.32 addresses multiple security vulnerabilities, including memory access issues and buffer overflows, while also introducing support for new architectures.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2018-1000876 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2018/cve-2018-1000876.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2018-1000876"
}
]
}
wid-sec-w-2022-0517
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Red Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Red Hat Enterprise Linux ausnutzen, um dadurch die Integrit\u00e4t, Vertraulichkeit und Verf\u00fcgbarkeit zu gef\u00e4hrden.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-0517 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2019/wid-sec-w-2022-0517.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-0517 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0517"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2332 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2332"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2336 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2336"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2308 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2308"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2285 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2285"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2290 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2290"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2280 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2280"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2283 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2283"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2272 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2272"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2276 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2276"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2258 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2258"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2229 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2229"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2237 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2237"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2196 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2196"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2197 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2197"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2189 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2189"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2177 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2177"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2178 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2178"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2162 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2162"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2157 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2157"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2137 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2137"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2125 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2125"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2126 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2126"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2112 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2112"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2101 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2101"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2075 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2075"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2049 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2049"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2052 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2052"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2047 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2047"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2048 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2048"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2035 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2035"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2037 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2037"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2017 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2017"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0471 vom 2020-02-11",
"url": "https://access.redhat.com/errata/RHSA-2020:0471"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2020:0471 vom 2020-02-11",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2020-0471-Moderate-CentOS-6-spice-gtk-Security-Update-tp4645840.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2437 vom 2019-08-12",
"url": "https://access.redhat.com/errata/RHSA-2019:2437"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-2285 vom 2019-08-14",
"url": "http://linux.oracle.com/errata/ELSA-2019-2285.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-2052 vom 2019-08-14",
"url": "http://linux.oracle.com/errata/ELSA-2019-2052.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-2258 vom 2019-08-14",
"url": "http://linux.oracle.com/errata/ELSA-2019-2258.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-2178 vom 2019-08-14",
"url": "http://linux.oracle.com/errata/ELSA-2019-2178.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-2229 vom 2019-08-14",
"url": "http://linux.oracle.com/errata/ELSA-2019-2229.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-2177 vom 2019-08-16",
"url": "http://linux.oracle.com/errata/ELSA-2019-2177.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-2283 vom 2019-08-19",
"url": "http://linux.oracle.com/errata/ELSA-2019-2283.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-2189 vom 2019-08-21",
"url": "http://linux.oracle.com/errata/ELSA-2019-2189.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-2280 vom 2019-08-21",
"url": "http://linux.oracle.com/errata/ELSA-2019-2280.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-2332 vom 2019-08-21",
"url": "http://linux.oracle.com/errata/ELSA-2019-2332.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2267-1 vom 2019-09-02",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192267-1.html"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2019:2101 vom 2019-09-18",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-2101-Low-CentOS-7-exiv2-Security-Update-tp4645686.html"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2019:2258 vom 2019-09-18",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-2258-Moderate-CentOS-7-http-parser-Security-Update-tp4645679.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2730-1 vom 2019-10-22",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192730-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2750-1 vom 2019-10-23",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192750-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3338 vom 2019-11-05",
"url": "https://access.redhat.com/errata/RHSA-2019:3338"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3651 vom 2019-11-05",
"url": "https://access.redhat.com/errata/RHSA-2019:3651"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3575 vom 2019-11-05",
"url": "https://access.redhat.com/errata/RHSA-2019:3575"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3583 vom 2019-11-06",
"url": "https://access.redhat.com/errata/RHSA-2019:3583"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3590 vom 2019-11-05",
"url": "https://access.redhat.com/errata/RHSA-2019:3590"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3345 vom 2019-11-06",
"url": "https://access.redhat.com/errata/RHSA-2019:3345"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3497 vom 2019-11-05",
"url": "https://access.redhat.com/errata/RHSA-2019:3497"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3335 vom 2019-11-05",
"url": "https://access.redhat.com/errata/RHSA-2019:3335"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3705 vom 2019-11-05",
"url": "https://access.redhat.com/errata/RHSA-2019:3705"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2019-209 vom 2019-12-22",
"url": "https://downloads.avaya.com/css/P8/documents/101060434"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2019-205 vom 2019-12-22",
"url": "https://downloads.avaya.com/css/P8/documents/101060432"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0595 vom 2020-02-25",
"url": "https://access.redhat.com/errata/RHSA-2020:0595"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:0555-1 vom 2020-03-02",
"url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200555-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0850 vom 2020-03-17",
"url": "https://access.redhat.com/errata/RHSA-2020:0850"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0851 vom 2020-03-17",
"url": "https://access.redhat.com/errata/RHSA-2020:0851"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2020:0851 vom 2020-03-25",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2020-0851-Moderate-CentOS-7-python-virtualenv-Security-Update-tp4645882.html"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2020:0850 vom 2020-03-25",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2020-0850-Moderate-CentOS-7-python-pip-Security-Update-tp4645865.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:1265 vom 2020-04-01",
"url": "https://access.redhat.com/errata/RHSA-2020:1265"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:0921-1 vom 2020-04-04",
"url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200921-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:1471 vom 2020-04-14",
"url": "https://access.redhat.com/errata/RHSA-2020:1471"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:1464 vom 2020-04-14",
"url": "https://access.redhat.com/errata/RHSA-2020:1464"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:1461 vom 2020-04-14",
"url": "https://access.redhat.com/errata/RHSA-2020:1461"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:1577 vom 2020-04-28",
"url": "https://access.redhat.com/errata/RHSA-2020:1577"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:1916 vom 2020-04-28",
"url": "https://access.redhat.com/errata/RHSA-2020:1916"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:1605 vom 2020-04-28",
"url": "https://access.redhat.com/errata/RHSA-2020:1605"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:2068 vom 2020-05-12",
"url": "https://access.redhat.com/errata/RHSA-2020:2068"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:2081 vom 2020-05-12",
"url": "https://access.redhat.com/errata/RHSA-2020:2081"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:1792-1 vom 2020-06-26",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/007049.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:3194 vom 2020-07-28",
"url": "https://access.redhat.com/errata/RHSA-2020:3194"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2711-1 vom 2020-09-22",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007450.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2942-1 vom 2020-10-16",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-October/007582.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:4999 vom 2020-11-10",
"url": "https://access.redhat.com/errata/RHSA-2020:4999"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-2470 vom 2020-12-01",
"url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00000.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:3842-1 vom 2020-12-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-December/008077.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:3841-1 vom 2020-12-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-December/008078.html"
},
{
"category": "external",
"summary": "F5 Security Advisory K00409335 vom 2020-12-29",
"url": "https://support.f5.com/csp/article/K00409335?utm_source=f5support\u0026utm_medium=RSS"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-2645 vom 2021-04-29",
"url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00032.html"
},
{
"category": "external",
"summary": "Gentoo Linux Security Advisory GLSA-202107-15 vom 2021-07-08",
"url": "https://www.cybersecurity-help.cz/vdb/SB2021070803"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-2802 vom 2021-10-31",
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:1819-1 vom 2022-05-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-May/011137.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:1448-1 vom 2022-04-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-April/010858.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5497-1 vom 2022-06-30",
"url": "https://ubuntu.com/security/notices/USN-5497-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:2614-1 vom 2022-08-01",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5553-1 vom 2022-08-08",
"url": "https://ubuntu.com/security/notices/USN-5553-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5631-1 vom 2022-09-22",
"url": "https://ubuntu.com/security/notices/USN-5631-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5671-1 vom 2022-10-12",
"url": "https://ubuntu.com/security/notices/USN-5671-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4252-1 vom 2022-11-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/013131.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2023-1939 vom 2023-02-22",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2023-1939.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2023-1940 vom 2023-02-22",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2023-1940.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-6980 vom 2023-11-21",
"url": "https://linux.oracle.com/errata/ELSA-2023-6980.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12605 vom 2024-09-02",
"url": "https://linux.oracle.com/errata/ELSA-2024-12605.html"
}
],
"source_lang": "en-US",
"title": "Red Hat Enterprise Linux: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-09-02T22:00:00.000+00:00",
"generator": {
"date": "2024-09-03T08:16:21.549+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.6"
}
},
"id": "WID-SEC-W-2022-0517",
"initial_release_date": "2019-08-06T22:00:00.000+00:00",
"revision_history": [
{
"date": "2019-08-06T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2019-08-12T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2019-08-13T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2019-08-18T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2019-08-19T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2019-08-21T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2019-09-02T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-09-18T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von CentOS aufgenommen"
},
{
"date": "2019-10-09T22:00:00.000+00:00",
"number": "9",
"summary": "Referenz(en) aufgenommen: SUSE-SU-2019:1487-2"
},
{
"date": "2019-10-15T22:00:00.000+00:00",
"number": "10",
"summary": "Referenz(en) aufgenommen: FEDORA-2019-7B06F18A10, FEDORA-2019-A25D5DF3B4, FEDORA-2019-23638D42F3"
},
{
"date": "2019-10-21T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-10-23T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-11-05T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2019-12-22T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von AVAYA aufgenommen"
},
{
"date": "2020-01-30T23:00:00.000+00:00",
"number": "15",
"summary": "Referenz(en) aufgenommen: FEDORA-2020-CB7B7181A0, FEDORA-2020-1DFAA1963B"
},
{
"date": "2020-02-10T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-02-11T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von CentOS aufgenommen"
},
{
"date": "2020-02-24T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-03-02T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2020-03-17T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-03-25T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von CentOS aufgenommen"
},
{
"date": "2020-03-31T22:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-04-05T22:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2020-04-14T22:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-04-28T22:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-05-03T22:00:00.000+00:00",
"number": "26",
"summary": "Referenz(en) aufgenommen: USN-4349-1"
},
{
"date": "2020-05-12T22:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-06-28T22:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2020-07-28T22:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-09-22T22:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2020-10-18T22:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2020-11-09T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-11-30T23:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2020-12-16T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2020-12-28T23:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von F5 aufgenommen"
},
{
"date": "2021-04-29T22:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2021-07-07T22:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von Gentoo aufgenommen"
},
{
"date": "2021-09-08T22:00:00.000+00:00",
"number": "38",
"summary": "Referenz(en) aufgenommen: USN-5067-1"
},
{
"date": "2021-10-31T23:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2022-04-28T22:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-05-23T22:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-06-30T22:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-08-01T22:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-08-08T22:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-09-22T22:00:00.000+00:00",
"number": "45",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-10-11T22:00:00.000+00:00",
"number": "46",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-11-28T23:00:00.000+00:00",
"number": "47",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-02-22T23:00:00.000+00:00",
"number": "48",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2023-11-21T23:00:00.000+00:00",
"number": "49",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-09-02T22:00:00.000+00:00",
"number": "50",
"summary": "Neue Updates von Oracle Linux aufgenommen"
}
],
"status": "final",
"version": "50"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "F5 BIG-IP",
"product": {
"name": "F5 BIG-IP",
"product_id": "T001663",
"product_identification_helper": {
"cpe": "cpe:/a:f5:big-ip:-"
}
}
}
],
"category": "vendor",
"name": "F5"
},
{
"branches": [
{
"category": "product_name",
"name": "Gentoo Linux",
"product": {
"name": "Gentoo Linux",
"product_id": "T012167",
"product_identification_helper": {
"cpe": "cpe:/o:gentoo:linux:-"
}
}
}
],
"category": "vendor",
"name": "Gentoo"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source CentOS",
"product": {
"name": "Open Source CentOS",
"product_id": "1727",
"product_identification_helper": {
"cpe": "cpe:/o:centos:centos:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "7",
"product": {
"name": "Red Hat Enterprise Linux 7",
"product_id": "T006054",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-3616",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2016-3616"
},
{
"cve": "CVE-2017-15111",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2017-15111"
},
{
"cve": "CVE-2017-15112",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2017-15112"
},
{
"cve": "CVE-2017-17724",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2017-17724"
},
{
"cve": "CVE-2017-18189",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2017-18189"
},
{
"cve": "CVE-2017-18233",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2017-18233"
},
{
"cve": "CVE-2017-18234",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2017-18234"
},
{
"cve": "CVE-2017-18236",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2017-18236"
},
{
"cve": "CVE-2017-18238",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2017-18238"
},
{
"cve": "CVE-2017-5731",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2017-5731"
},
{
"cve": "CVE-2017-5732",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2017-5732"
},
{
"cve": "CVE-2017-5733",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2017-5733"
},
{
"cve": "CVE-2017-5734",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2017-5734"
},
{
"cve": "CVE-2017-5735",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2017-5735"
},
{
"cve": "CVE-2017-6059",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2017-6059"
},
{
"cve": "CVE-2017-6413",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2017-6413"
},
{
"cve": "CVE-2018-0495",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-0495"
},
{
"cve": "CVE-2018-1000132",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-1000132"
},
{
"cve": "CVE-2018-1000852",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-1000852"
},
{
"cve": "CVE-2018-1000876",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-1000876"
},
{
"cve": "CVE-2018-10689",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-10689"
},
{
"cve": "CVE-2018-10772",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-10772"
},
{
"cve": "CVE-2018-10893",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-10893"
},
{
"cve": "CVE-2018-10958",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-10958"
},
{
"cve": "CVE-2018-10998",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-10998"
},
{
"cve": "CVE-2018-11037",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-11037"
},
{
"cve": "CVE-2018-11212",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-11212"
},
{
"cve": "CVE-2018-11213",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-11213"
},
{
"cve": "CVE-2018-11214",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-11214"
},
{
"cve": "CVE-2018-1122",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-1122"
},
{
"cve": "CVE-2018-11813",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-11813"
},
{
"cve": "CVE-2018-12121",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-12121"
},
{
"cve": "CVE-2018-12181",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-12181"
},
{
"cve": "CVE-2018-12264",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-12264"
},
{
"cve": "CVE-2018-12265",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-12265"
},
{
"cve": "CVE-2018-12404",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-12404"
},
{
"cve": "CVE-2018-12641",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-12641"
},
{
"cve": "CVE-2018-12697",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-12697"
},
{
"cve": "CVE-2018-13259",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-13259"
},
{
"cve": "CVE-2018-13346",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-13346"
},
{
"cve": "CVE-2018-13347",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-13347"
},
{
"cve": "CVE-2018-14046",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-14046"
},
{
"cve": "CVE-2018-14348",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-14348"
},
{
"cve": "CVE-2018-14498",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-14498"
},
{
"cve": "CVE-2018-16062",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-16062"
},
{
"cve": "CVE-2018-16402",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-16402"
},
{
"cve": "CVE-2018-16403",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-16403"
},
{
"cve": "CVE-2018-16548",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-16548"
},
{
"cve": "CVE-2018-16838",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-16838"
},
{
"cve": "CVE-2018-17282",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-17282"
},
{
"cve": "CVE-2018-17336",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-17336"
},
{
"cve": "CVE-2018-17581",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-17581"
},
{
"cve": "CVE-2018-18074",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-18074"
},
{
"cve": "CVE-2018-18310",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-18310"
},
{
"cve": "CVE-2018-18520",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-18520"
},
{
"cve": "CVE-2018-18521",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-18521"
},
{
"cve": "CVE-2018-18584",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-18584"
},
{
"cve": "CVE-2018-18585",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-18585"
},
{
"cve": "CVE-2018-18915",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-18915"
},
{
"cve": "CVE-2018-19044",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-19044"
},
{
"cve": "CVE-2018-19107",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-19107"
},
{
"cve": "CVE-2018-19108",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-19108"
},
{
"cve": "CVE-2018-19198",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-19198"
},
{
"cve": "CVE-2018-19199",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-19199"
},
{
"cve": "CVE-2018-19208",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-19208"
},
{
"cve": "CVE-2018-19535",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-19535"
},
{
"cve": "CVE-2018-19607",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-19607"
},
{
"cve": "CVE-2018-20060",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-20060"
},
{
"cve": "CVE-2018-20096",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-20096"
},
{
"cve": "CVE-2018-20097",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-20097"
},
{
"cve": "CVE-2018-20098",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-20098"
},
{
"cve": "CVE-2018-20099",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-20099"
},
{
"cve": "CVE-2018-20532",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-20532"
},
{
"cve": "CVE-2018-20533",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-20533"
},
{
"cve": "CVE-2018-20534",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-20534"
},
{
"cve": "CVE-2018-3613",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-3613"
},
{
"cve": "CVE-2018-5407",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-5407"
},
{
"cve": "CVE-2018-6541",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-6541"
},
{
"cve": "CVE-2018-7159",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-7159"
},
{
"cve": "CVE-2018-7409",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-7409"
},
{
"cve": "CVE-2018-7485",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-7485"
},
{
"cve": "CVE-2018-7730",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-7730"
},
{
"cve": "CVE-2018-8976",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-8976"
},
{
"cve": "CVE-2018-8977",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-8977"
},
{
"cve": "CVE-2018-9305",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-9305"
},
{
"cve": "CVE-2019-0160",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2019-0160"
},
{
"cve": "CVE-2019-0161",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2019-0161"
},
{
"cve": "CVE-2019-10153",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2019-10153"
},
{
"cve": "CVE-2019-10192",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2019-10192"
},
{
"cve": "CVE-2019-10193",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2019-10193"
},
{
"cve": "CVE-2019-11236",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2019-11236"
},
{
"cve": "CVE-2019-3811",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2019-3811"
},
{
"cve": "CVE-2019-7149",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2019-7149"
},
{
"cve": "CVE-2019-7150",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2019-7150"
},
{
"cve": "CVE-2019-7664",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2019-7664"
},
{
"cve": "CVE-2019-7665",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2019-7665"
},
{
"cve": "CVE-2019-8379",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2019-8379"
},
{
"cve": "CVE-2019-8383",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2019-8383"
},
{
"cve": "CVE-2019-9755",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2019-9755"
}
]
}
WID-SEC-W-2022-0517
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Red Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Red Hat Enterprise Linux ausnutzen, um dadurch die Integrit\u00e4t, Vertraulichkeit und Verf\u00fcgbarkeit zu gef\u00e4hrden.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-0517 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2019/wid-sec-w-2022-0517.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-0517 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0517"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2332 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2332"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2336 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2336"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2308 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2308"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2285 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2285"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2290 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2290"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2280 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2280"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2283 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2283"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2272 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2272"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2276 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2276"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2258 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2258"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2229 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2229"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2237 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2237"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2196 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2196"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2197 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2197"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2189 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2189"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2177 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2177"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2178 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2178"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2162 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2162"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2157 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2157"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2137 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2137"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2125 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2125"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2126 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2126"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2112 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2112"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2101 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2101"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2075 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2075"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2049 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2049"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2052 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2052"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2047 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2047"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2048 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2048"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2035 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2035"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2037 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2037"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2017 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2017"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0471 vom 2020-02-11",
"url": "https://access.redhat.com/errata/RHSA-2020:0471"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2020:0471 vom 2020-02-11",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2020-0471-Moderate-CentOS-6-spice-gtk-Security-Update-tp4645840.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2437 vom 2019-08-12",
"url": "https://access.redhat.com/errata/RHSA-2019:2437"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-2285 vom 2019-08-14",
"url": "http://linux.oracle.com/errata/ELSA-2019-2285.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-2052 vom 2019-08-14",
"url": "http://linux.oracle.com/errata/ELSA-2019-2052.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-2258 vom 2019-08-14",
"url": "http://linux.oracle.com/errata/ELSA-2019-2258.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-2178 vom 2019-08-14",
"url": "http://linux.oracle.com/errata/ELSA-2019-2178.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-2229 vom 2019-08-14",
"url": "http://linux.oracle.com/errata/ELSA-2019-2229.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-2177 vom 2019-08-16",
"url": "http://linux.oracle.com/errata/ELSA-2019-2177.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-2283 vom 2019-08-19",
"url": "http://linux.oracle.com/errata/ELSA-2019-2283.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-2189 vom 2019-08-21",
"url": "http://linux.oracle.com/errata/ELSA-2019-2189.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-2280 vom 2019-08-21",
"url": "http://linux.oracle.com/errata/ELSA-2019-2280.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-2332 vom 2019-08-21",
"url": "http://linux.oracle.com/errata/ELSA-2019-2332.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2267-1 vom 2019-09-02",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192267-1.html"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2019:2101 vom 2019-09-18",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-2101-Low-CentOS-7-exiv2-Security-Update-tp4645686.html"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2019:2258 vom 2019-09-18",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-2258-Moderate-CentOS-7-http-parser-Security-Update-tp4645679.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2730-1 vom 2019-10-22",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192730-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2750-1 vom 2019-10-23",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192750-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3338 vom 2019-11-05",
"url": "https://access.redhat.com/errata/RHSA-2019:3338"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3651 vom 2019-11-05",
"url": "https://access.redhat.com/errata/RHSA-2019:3651"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3575 vom 2019-11-05",
"url": "https://access.redhat.com/errata/RHSA-2019:3575"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3583 vom 2019-11-06",
"url": "https://access.redhat.com/errata/RHSA-2019:3583"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3590 vom 2019-11-05",
"url": "https://access.redhat.com/errata/RHSA-2019:3590"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3345 vom 2019-11-06",
"url": "https://access.redhat.com/errata/RHSA-2019:3345"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3497 vom 2019-11-05",
"url": "https://access.redhat.com/errata/RHSA-2019:3497"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3335 vom 2019-11-05",
"url": "https://access.redhat.com/errata/RHSA-2019:3335"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3705 vom 2019-11-05",
"url": "https://access.redhat.com/errata/RHSA-2019:3705"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2019-209 vom 2019-12-22",
"url": "https://downloads.avaya.com/css/P8/documents/101060434"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2019-205 vom 2019-12-22",
"url": "https://downloads.avaya.com/css/P8/documents/101060432"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0595 vom 2020-02-25",
"url": "https://access.redhat.com/errata/RHSA-2020:0595"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:0555-1 vom 2020-03-02",
"url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200555-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0850 vom 2020-03-17",
"url": "https://access.redhat.com/errata/RHSA-2020:0850"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0851 vom 2020-03-17",
"url": "https://access.redhat.com/errata/RHSA-2020:0851"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2020:0851 vom 2020-03-25",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2020-0851-Moderate-CentOS-7-python-virtualenv-Security-Update-tp4645882.html"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2020:0850 vom 2020-03-25",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2020-0850-Moderate-CentOS-7-python-pip-Security-Update-tp4645865.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:1265 vom 2020-04-01",
"url": "https://access.redhat.com/errata/RHSA-2020:1265"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:0921-1 vom 2020-04-04",
"url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200921-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:1471 vom 2020-04-14",
"url": "https://access.redhat.com/errata/RHSA-2020:1471"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:1464 vom 2020-04-14",
"url": "https://access.redhat.com/errata/RHSA-2020:1464"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:1461 vom 2020-04-14",
"url": "https://access.redhat.com/errata/RHSA-2020:1461"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:1577 vom 2020-04-28",
"url": "https://access.redhat.com/errata/RHSA-2020:1577"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:1916 vom 2020-04-28",
"url": "https://access.redhat.com/errata/RHSA-2020:1916"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:1605 vom 2020-04-28",
"url": "https://access.redhat.com/errata/RHSA-2020:1605"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:2068 vom 2020-05-12",
"url": "https://access.redhat.com/errata/RHSA-2020:2068"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:2081 vom 2020-05-12",
"url": "https://access.redhat.com/errata/RHSA-2020:2081"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:1792-1 vom 2020-06-26",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/007049.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:3194 vom 2020-07-28",
"url": "https://access.redhat.com/errata/RHSA-2020:3194"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2711-1 vom 2020-09-22",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007450.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2942-1 vom 2020-10-16",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-October/007582.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:4999 vom 2020-11-10",
"url": "https://access.redhat.com/errata/RHSA-2020:4999"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-2470 vom 2020-12-01",
"url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00000.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:3842-1 vom 2020-12-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-December/008077.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:3841-1 vom 2020-12-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-December/008078.html"
},
{
"category": "external",
"summary": "F5 Security Advisory K00409335 vom 2020-12-29",
"url": "https://support.f5.com/csp/article/K00409335?utm_source=f5support\u0026utm_medium=RSS"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-2645 vom 2021-04-29",
"url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00032.html"
},
{
"category": "external",
"summary": "Gentoo Linux Security Advisory GLSA-202107-15 vom 2021-07-08",
"url": "https://www.cybersecurity-help.cz/vdb/SB2021070803"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-2802 vom 2021-10-31",
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:1819-1 vom 2022-05-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-May/011137.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:1448-1 vom 2022-04-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-April/010858.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5497-1 vom 2022-06-30",
"url": "https://ubuntu.com/security/notices/USN-5497-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:2614-1 vom 2022-08-01",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5553-1 vom 2022-08-08",
"url": "https://ubuntu.com/security/notices/USN-5553-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5631-1 vom 2022-09-22",
"url": "https://ubuntu.com/security/notices/USN-5631-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5671-1 vom 2022-10-12",
"url": "https://ubuntu.com/security/notices/USN-5671-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4252-1 vom 2022-11-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/013131.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2023-1939 vom 2023-02-22",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2023-1939.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2023-1940 vom 2023-02-22",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2023-1940.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-6980 vom 2023-11-21",
"url": "https://linux.oracle.com/errata/ELSA-2023-6980.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12605 vom 2024-09-02",
"url": "https://linux.oracle.com/errata/ELSA-2024-12605.html"
}
],
"source_lang": "en-US",
"title": "Red Hat Enterprise Linux: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-09-02T22:00:00.000+00:00",
"generator": {
"date": "2024-09-03T08:16:21.549+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.6"
}
},
"id": "WID-SEC-W-2022-0517",
"initial_release_date": "2019-08-06T22:00:00.000+00:00",
"revision_history": [
{
"date": "2019-08-06T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2019-08-12T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2019-08-13T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2019-08-18T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2019-08-19T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2019-08-21T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2019-09-02T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-09-18T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von CentOS aufgenommen"
},
{
"date": "2019-10-09T22:00:00.000+00:00",
"number": "9",
"summary": "Referenz(en) aufgenommen: SUSE-SU-2019:1487-2"
},
{
"date": "2019-10-15T22:00:00.000+00:00",
"number": "10",
"summary": "Referenz(en) aufgenommen: FEDORA-2019-7B06F18A10, FEDORA-2019-A25D5DF3B4, FEDORA-2019-23638D42F3"
},
{
"date": "2019-10-21T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-10-23T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-11-05T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2019-12-22T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von AVAYA aufgenommen"
},
{
"date": "2020-01-30T23:00:00.000+00:00",
"number": "15",
"summary": "Referenz(en) aufgenommen: FEDORA-2020-CB7B7181A0, FEDORA-2020-1DFAA1963B"
},
{
"date": "2020-02-10T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-02-11T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von CentOS aufgenommen"
},
{
"date": "2020-02-24T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-03-02T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2020-03-17T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-03-25T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von CentOS aufgenommen"
},
{
"date": "2020-03-31T22:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-04-05T22:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2020-04-14T22:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-04-28T22:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-05-03T22:00:00.000+00:00",
"number": "26",
"summary": "Referenz(en) aufgenommen: USN-4349-1"
},
{
"date": "2020-05-12T22:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-06-28T22:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2020-07-28T22:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-09-22T22:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2020-10-18T22:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2020-11-09T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-11-30T23:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2020-12-16T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2020-12-28T23:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von F5 aufgenommen"
},
{
"date": "2021-04-29T22:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2021-07-07T22:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von Gentoo aufgenommen"
},
{
"date": "2021-09-08T22:00:00.000+00:00",
"number": "38",
"summary": "Referenz(en) aufgenommen: USN-5067-1"
},
{
"date": "2021-10-31T23:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2022-04-28T22:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-05-23T22:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-06-30T22:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-08-01T22:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-08-08T22:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-09-22T22:00:00.000+00:00",
"number": "45",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-10-11T22:00:00.000+00:00",
"number": "46",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-11-28T23:00:00.000+00:00",
"number": "47",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-02-22T23:00:00.000+00:00",
"number": "48",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2023-11-21T23:00:00.000+00:00",
"number": "49",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-09-02T22:00:00.000+00:00",
"number": "50",
"summary": "Neue Updates von Oracle Linux aufgenommen"
}
],
"status": "final",
"version": "50"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "F5 BIG-IP",
"product": {
"name": "F5 BIG-IP",
"product_id": "T001663",
"product_identification_helper": {
"cpe": "cpe:/a:f5:big-ip:-"
}
}
}
],
"category": "vendor",
"name": "F5"
},
{
"branches": [
{
"category": "product_name",
"name": "Gentoo Linux",
"product": {
"name": "Gentoo Linux",
"product_id": "T012167",
"product_identification_helper": {
"cpe": "cpe:/o:gentoo:linux:-"
}
}
}
],
"category": "vendor",
"name": "Gentoo"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source CentOS",
"product": {
"name": "Open Source CentOS",
"product_id": "1727",
"product_identification_helper": {
"cpe": "cpe:/o:centos:centos:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "7",
"product": {
"name": "Red Hat Enterprise Linux 7",
"product_id": "T006054",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-3616",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2016-3616"
},
{
"cve": "CVE-2017-15111",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2017-15111"
},
{
"cve": "CVE-2017-15112",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2017-15112"
},
{
"cve": "CVE-2017-17724",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2017-17724"
},
{
"cve": "CVE-2017-18189",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2017-18189"
},
{
"cve": "CVE-2017-18233",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2017-18233"
},
{
"cve": "CVE-2017-18234",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2017-18234"
},
{
"cve": "CVE-2017-18236",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2017-18236"
},
{
"cve": "CVE-2017-18238",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2017-18238"
},
{
"cve": "CVE-2017-5731",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2017-5731"
},
{
"cve": "CVE-2017-5732",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2017-5732"
},
{
"cve": "CVE-2017-5733",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2017-5733"
},
{
"cve": "CVE-2017-5734",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2017-5734"
},
{
"cve": "CVE-2017-5735",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2017-5735"
},
{
"cve": "CVE-2017-6059",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2017-6059"
},
{
"cve": "CVE-2017-6413",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2017-6413"
},
{
"cve": "CVE-2018-0495",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-0495"
},
{
"cve": "CVE-2018-1000132",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-1000132"
},
{
"cve": "CVE-2018-1000852",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-1000852"
},
{
"cve": "CVE-2018-1000876",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-1000876"
},
{
"cve": "CVE-2018-10689",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-10689"
},
{
"cve": "CVE-2018-10772",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-10772"
},
{
"cve": "CVE-2018-10893",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-10893"
},
{
"cve": "CVE-2018-10958",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-10958"
},
{
"cve": "CVE-2018-10998",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-10998"
},
{
"cve": "CVE-2018-11037",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-11037"
},
{
"cve": "CVE-2018-11212",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-11212"
},
{
"cve": "CVE-2018-11213",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-11213"
},
{
"cve": "CVE-2018-11214",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-11214"
},
{
"cve": "CVE-2018-1122",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-1122"
},
{
"cve": "CVE-2018-11813",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-11813"
},
{
"cve": "CVE-2018-12121",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-12121"
},
{
"cve": "CVE-2018-12181",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-12181"
},
{
"cve": "CVE-2018-12264",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-12264"
},
{
"cve": "CVE-2018-12265",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-12265"
},
{
"cve": "CVE-2018-12404",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-12404"
},
{
"cve": "CVE-2018-12641",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-12641"
},
{
"cve": "CVE-2018-12697",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-12697"
},
{
"cve": "CVE-2018-13259",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-13259"
},
{
"cve": "CVE-2018-13346",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-13346"
},
{
"cve": "CVE-2018-13347",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-13347"
},
{
"cve": "CVE-2018-14046",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-14046"
},
{
"cve": "CVE-2018-14348",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-14348"
},
{
"cve": "CVE-2018-14498",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-14498"
},
{
"cve": "CVE-2018-16062",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-16062"
},
{
"cve": "CVE-2018-16402",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-16402"
},
{
"cve": "CVE-2018-16403",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-16403"
},
{
"cve": "CVE-2018-16548",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-16548"
},
{
"cve": "CVE-2018-16838",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-16838"
},
{
"cve": "CVE-2018-17282",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-17282"
},
{
"cve": "CVE-2018-17336",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-17336"
},
{
"cve": "CVE-2018-17581",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-17581"
},
{
"cve": "CVE-2018-18074",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-18074"
},
{
"cve": "CVE-2018-18310",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-18310"
},
{
"cve": "CVE-2018-18520",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-18520"
},
{
"cve": "CVE-2018-18521",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-18521"
},
{
"cve": "CVE-2018-18584",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-18584"
},
{
"cve": "CVE-2018-18585",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-18585"
},
{
"cve": "CVE-2018-18915",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-18915"
},
{
"cve": "CVE-2018-19044",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-19044"
},
{
"cve": "CVE-2018-19107",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-19107"
},
{
"cve": "CVE-2018-19108",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-19108"
},
{
"cve": "CVE-2018-19198",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-19198"
},
{
"cve": "CVE-2018-19199",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-19199"
},
{
"cve": "CVE-2018-19208",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-19208"
},
{
"cve": "CVE-2018-19535",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-19535"
},
{
"cve": "CVE-2018-19607",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-19607"
},
{
"cve": "CVE-2018-20060",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-20060"
},
{
"cve": "CVE-2018-20096",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-20096"
},
{
"cve": "CVE-2018-20097",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-20097"
},
{
"cve": "CVE-2018-20098",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-20098"
},
{
"cve": "CVE-2018-20099",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-20099"
},
{
"cve": "CVE-2018-20532",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-20532"
},
{
"cve": "CVE-2018-20533",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-20533"
},
{
"cve": "CVE-2018-20534",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-20534"
},
{
"cve": "CVE-2018-3613",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-3613"
},
{
"cve": "CVE-2018-5407",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-5407"
},
{
"cve": "CVE-2018-6541",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-6541"
},
{
"cve": "CVE-2018-7159",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-7159"
},
{
"cve": "CVE-2018-7409",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-7409"
},
{
"cve": "CVE-2018-7485",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-7485"
},
{
"cve": "CVE-2018-7730",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-7730"
},
{
"cve": "CVE-2018-8976",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-8976"
},
{
"cve": "CVE-2018-8977",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-8977"
},
{
"cve": "CVE-2018-9305",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-9305"
},
{
"cve": "CVE-2019-0160",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2019-0160"
},
{
"cve": "CVE-2019-0161",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2019-0161"
},
{
"cve": "CVE-2019-10153",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2019-10153"
},
{
"cve": "CVE-2019-10192",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2019-10192"
},
{
"cve": "CVE-2019-10193",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2019-10193"
},
{
"cve": "CVE-2019-11236",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2019-11236"
},
{
"cve": "CVE-2019-3811",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2019-3811"
},
{
"cve": "CVE-2019-7149",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2019-7149"
},
{
"cve": "CVE-2019-7150",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2019-7150"
},
{
"cve": "CVE-2019-7664",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2019-7664"
},
{
"cve": "CVE-2019-7665",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2019-7665"
},
{
"cve": "CVE-2019-8379",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2019-8379"
},
{
"cve": "CVE-2019-8383",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2019-8383"
},
{
"cve": "CVE-2019-9755",
"notes": [
{
"category": "description",
"text": "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2019-9755"
}
]
}
ghsa-qm5c-9m22-x97p
Vulnerability from github
binutils version 2.32 and earlier contains a Integer Overflow vulnerability in objdump, bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc that can result in Integer overflow trigger heap overflow. Successful exploitation allows execution of arbitrary code.. This attack appear to be exploitable via Local. This vulnerability appears to have been fixed in after commit 3a551c7a1b80fca579461774860574eabfd7f18f.
{
"affected": [],
"aliases": [
"CVE-2018-1000876"
],
"database_specific": {
"cwe_ids": [
"CWE-787"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2018-12-20T17:29:00Z",
"severity": "HIGH"
},
"details": "binutils version 2.32 and earlier contains a Integer Overflow vulnerability in objdump, bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc that can result in Integer overflow trigger heap overflow. Successful exploitation allows execution of arbitrary code.. This attack appear to be exploitable via Local. This vulnerability appears to have been fixed in after commit 3a551c7a1b80fca579461774860574eabfd7f18f.",
"id": "GHSA-qm5c-9m22-x97p",
"modified": "2022-05-13T01:18:47Z",
"published": "2022-05-13T01:18:47Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000876"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2019:2075"
},
{
"type": "WEB",
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23994"
},
{
"type": "WEB",
"url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=3a551c7a1b80fca579461774860574eabfd7f18f"
},
{
"type": "WEB",
"url": "https://usn.ubuntu.com/4336-1"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/106304"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
cnvd-2019-07024
Vulnerability from cnvd
目前厂商暂未发布修复措施解决此安全问题,建议使用此软件的用户随时关注厂商主页或参考网址以获取解决办法: https://www.gnu.org/
| Name | GNU Binutils <=2.32 |
|---|
{
"bids": {
"bid": {
"bidNumber": "106304"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2018-1000876",
"cveUrl": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000876"
}
},
"description": "GNU Binutils\uff08\u53c8\u540dGNU Binary Utilities\u6216binutils\uff09\u662fGNU\u8ba1\u5212\u5f00\u53d1\u7684\u4e00\u7ec4\u7f16\u7a0b\u8bed\u8a00\u5de5\u5177\u7a0b\u5e8f\uff0c\u5b83\u4e3b\u8981\u7528\u4e8e\u5904\u7406\u591a\u79cd\u683c\u5f0f\u7684\u76ee\u6807\u6587\u4ef6\uff0c\u5e76\u63d0\u4f9b\u6709\u8fde\u63a5\u5668\u3001\u6c47\u7f16\u5668\u548c\u5176\u4ed6\u7528\u4e8e\u76ee\u6807\u6587\u4ef6\u548c\u6863\u6848\u7684\u5de5\u5177\u3002\n\nGNU Binutils 2.32\u53ca\u4e4b\u524d\u7248\u672c\u4e2d\u7684objdump\u6587\u4ef6\u5b58\u5728\u6574\u6570\u6ea2\u51fa\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002",
"discovererName": "abo",
"formalWay": "\u76ee\u524d\u5382\u5546\u6682\u672a\u53d1\u5e03\u4fee\u590d\u63aa\u65bd\u89e3\u51b3\u6b64\u5b89\u5168\u95ee\u9898\uff0c\u5efa\u8bae\u4f7f\u7528\u6b64\u8f6f\u4ef6\u7684\u7528\u6237\u968f\u65f6\u5173\u6ce8\u5382\u5546\u4e3b\u9875\u6216\u53c2\u8003\u7f51\u5740\u4ee5\u83b7\u53d6\u89e3\u51b3\u529e\u6cd5\uff1a\r\nhttps://www.gnu.org/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2019-07024",
"openTime": "2019-03-13",
"products": {
"product": "GNU Binutils \u003c=2.32"
},
"referenceLink": "https://sourceware.org/bugzilla/show_bug.cgi?id=23994",
"serverity": "\u4e2d",
"submitTime": "2018-12-24",
"title": "GNU Binutils \u0027libbfd\u0027\u6574\u6570\u6ea2\u51fa\u6f0f\u6d1e"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.