Vulnerability from csaf_suse
Published
2019-10-25 12:25
Modified
2019-10-25 12:25
Summary
Security update for binutils

Notes

Title of the patch
Security update for binutils
Description of the patch
This update for binutils fixes the following issues: binutils was updated to current 2.32 branch [jsc#ECO-368]. Includes following security fixes: - CVE-2018-17358: Fixed invalid memory access in _bfd_stab_section_find_nearest_line in syms.c (bsc#1109412) - CVE-2018-17359: Fixed invalid memory access exists in bfd_zalloc in opncls.c (bsc#1109413) - CVE-2018-17360: Fixed heap-based buffer over-read in bfd_getl32 in libbfd.c (bsc#1109414) - CVE-2018-17985: Fixed a stack consumption problem caused by the cplus_demangle_type (bsc#1116827) - CVE-2018-18309: Fixed an invalid memory address dereference was discovered in read_reloc in reloc.c (bsc#1111996) - CVE-2018-18483: Fixed get_count function provided by libiberty that allowed attackers to cause a denial of service or other unspecified impact (bsc#1112535) - CVE-2018-18484: Fixed stack exhaustion in the C++ demangling functions provided by libiberty, caused by recursive stack frames (bsc#1112534) - CVE-2018-18605: Fixed a heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup causing a denial of service (bsc#1113255) - CVE-2018-18606: Fixed a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments, causing denial of service (bsc#1113252) - CVE-2018-18607: Fixed a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section, causing denial of service (bsc#1113247) - CVE-2018-19931: Fixed a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h (bsc#1118831) - CVE-2018-19932: Fixed an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA (bsc#1118830) - CVE-2018-20623: Fixed a use-after-free in the error function in elfcomm.c (bsc#1121035) - CVE-2018-20651: Fixed a denial of service via a NULL pointer dereference in elf_link_add_object_symbols in elflink.c (bsc#1121034) - CVE-2018-20671: Fixed an integer overflow that can trigger a heap-based buffer overflow in load_specific_debug_section in objdump.c (bsc#1121056) - CVE-2018-1000876: Fixed integer overflow in bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc in objdump (bsc#1120640) - CVE-2019-1010180: Fixed an out of bound memory access that could lead to crashes (bsc#1142772) - enable xtensa architecture (Tensilica lc6 and related) - Use -ffat-lto-objects in order to provide assembly for static libs (bsc#1141913). - Fixed some LTO build issues (bsc#1133131 bsc#1133232). - riscv: Don't check ABI flags if no code section - Fixed a segfault in ld when building some versions of pacemaker (bsc#1154025, bsc#1154016). - Add avr, epiphany and rx to target_list so that the common binutils can handle all objects we can create with crosses (bsc#1152590). Update to binutils 2.32: * The binutils now support for the C-SKY processor series. * The x86 assembler now supports a -mvexwig=[0|1] option to control encoding of VEX.W-ignored (WIG) VEX instructions. It also has a new -mx86-used-note=[yes|no] option to generate (or not) x86 GNU property notes. * The MIPS assembler now supports the Loongson EXTensions R2 (EXT2), the Loongson EXTensions (EXT) instructions, the Loongson Content Address Memory (CAM) ASE and the Loongson MultiMedia extensions Instructions (MMI) ASE. * The addr2line, c++filt, nm and objdump tools now have a default limit on the maximum amount of recursion that is allowed whilst demangling strings. This limit can be disabled if necessary. * Objdump's --disassemble option can now take a parameter, specifying the starting symbol for disassembly. Disassembly will continue from this symbol up to the next symbol or the end of the function. * The BFD linker will now report property change in linker map file when merging GNU properties. * The BFD linker's -t option now doesn't report members within archives, unless -t is given twice. This makes it more useful when generating a list of files that should be packaged for a linker bug report. * The GOLD linker has improved warning messages for relocations that refer to discarded sections. - Improve relro support on s390 [fate#326356] - Fix broken debug symbols (bsc#1118644) - Handle ELF compressed header alignment correctly.
Patchnames
SUSE-2019-2780,SUSE-SLE-Module-Basesystem-15-2019-2780,SUSE-SLE-Module-Development-Tools-15-2019-2780,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2780,SUSE-SLE-Module-Packagehub-Subpackages-15-2019-2780
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
   document: {
      aggregate_severity: {
         namespace: "https://www.suse.com/support/security/rating/",
         text: "moderate",
      },
      category: "csaf_security_advisory",
      csaf_version: "2.0",
      distribution: {
         text: "Copyright 2024 SUSE LLC. All rights reserved.",
         tlp: {
            label: "WHITE",
            url: "https://www.first.org/tlp/",
         },
      },
      lang: "en",
      notes: [
         {
            category: "summary",
            text: "Security update for binutils",
            title: "Title of the patch",
         },
         {
            category: "description",
            text: "This update for binutils fixes the following issues:\n\nbinutils was updated to current 2.32 branch [jsc#ECO-368].\n\nIncludes following security fixes:\n\n- CVE-2018-17358: Fixed invalid memory access in _bfd_stab_section_find_nearest_line in syms.c (bsc#1109412)\n- CVE-2018-17359: Fixed invalid memory access exists in bfd_zalloc in opncls.c (bsc#1109413)\n- CVE-2018-17360: Fixed heap-based buffer over-read in bfd_getl32 in libbfd.c (bsc#1109414)\n- CVE-2018-17985: Fixed a stack consumption problem caused by the cplus_demangle_type (bsc#1116827)\n- CVE-2018-18309: Fixed an invalid memory address dereference was discovered in read_reloc in reloc.c (bsc#1111996)\n- CVE-2018-18483: Fixed get_count function provided by libiberty that allowed attackers to cause a denial of service or other unspecified impact (bsc#1112535)\n- CVE-2018-18484: Fixed stack exhaustion in the C++ demangling functions provided by libiberty, caused by recursive stack frames (bsc#1112534)\n- CVE-2018-18605: Fixed a heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup causing a denial of service (bsc#1113255)\n- CVE-2018-18606: Fixed a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments, causing denial of service (bsc#1113252)\n- CVE-2018-18607: Fixed a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section, causing denial of service (bsc#1113247)\n- CVE-2018-19931: Fixed a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h (bsc#1118831)\n- CVE-2018-19932: Fixed an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA (bsc#1118830)\n- CVE-2018-20623: Fixed a use-after-free in the error function in elfcomm.c (bsc#1121035)\n- CVE-2018-20651: Fixed a denial of service via a NULL pointer dereference in elf_link_add_object_symbols in elflink.c (bsc#1121034)\n- CVE-2018-20671: Fixed an integer overflow that can trigger a heap-based buffer overflow in  load_specific_debug_section in objdump.c (bsc#1121056)\n- CVE-2018-1000876: Fixed integer overflow in bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc in objdump (bsc#1120640)\n- CVE-2019-1010180: Fixed an out of bound memory access that could lead to crashes (bsc#1142772)\n\n- enable xtensa architecture (Tensilica lc6 and related)\n- Use -ffat-lto-objects in order to provide assembly for static libs\n  (bsc#1141913).\n- Fixed some LTO build issues (bsc#1133131 bsc#1133232).\n- riscv: Don't check ABI flags if no code section\n- Fixed a segfault in ld when building some versions of pacemaker (bsc#1154025, bsc#1154016).\n- Add avr, epiphany and rx to target_list so that the common binutils can handle all objects we can create with crosses (bsc#1152590).\n\nUpdate to binutils 2.32:\n\n* The binutils now support for the C-SKY processor series.\n* The x86 assembler now supports a -mvexwig=[0|1] option to control\n  encoding of VEX.W-ignored (WIG) VEX instructions.\n  It also has a new -mx86-used-note=[yes|no] option to generate (or\n  not) x86 GNU property notes.  \n* The MIPS assembler now supports the Loongson EXTensions R2 (EXT2),\n  the Loongson EXTensions (EXT) instructions, the Loongson Content\n  Address Memory (CAM) ASE and the Loongson MultiMedia extensions\n  Instructions (MMI) ASE.\n* The addr2line, c++filt, nm and objdump tools now have a default\n  limit on the maximum amount of recursion that is allowed whilst\n  demangling strings.  This limit can be disabled if necessary.\n* Objdump's --disassemble option can now take a parameter,\n  specifying the starting symbol for disassembly.  Disassembly will\n  continue from this symbol up to the next symbol or the end of the\n  function.\n* The BFD linker will now report property change in linker map file\n  when merging GNU properties.\n* The BFD linker's -t option now doesn't report members within\n  archives, unless -t is given twice.  This makes it more useful\n  when generating a list of files that should be packaged for a\n  linker bug report.\n* The GOLD linker has improved warning messages for relocations that\n  refer to discarded sections.\n\n- Improve relro support on s390 [fate#326356]\n- Fix broken debug symbols (bsc#1118644)\n- Handle ELF compressed header alignment correctly.\n\n",
            title: "Description of the patch",
         },
         {
            category: "details",
            text: "SUSE-2019-2780,SUSE-SLE-Module-Basesystem-15-2019-2780,SUSE-SLE-Module-Development-Tools-15-2019-2780,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2780,SUSE-SLE-Module-Packagehub-Subpackages-15-2019-2780",
            title: "Patchnames",
         },
         {
            category: "legal_disclaimer",
            text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
            title: "Terms of use",
         },
      ],
      publisher: {
         category: "vendor",
         contact_details: "https://www.suse.com/support/security/contact/",
         name: "SUSE Product Security Team",
         namespace: "https://www.suse.com/",
      },
      references: [
         {
            category: "external",
            summary: "SUSE ratings",
            url: "https://www.suse.com/support/security/rating/",
         },
         {
            category: "self",
            summary: "URL of this CSAF notice",
            url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2780-1.json",
         },
         {
            category: "self",
            summary: "URL for SUSE-SU-2019:2780-1",
            url: "https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1/",
         },
         {
            category: "self",
            summary: "E-Mail link for SUSE-SU-2019:2780-1",
            url: "https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html",
         },
         {
            category: "self",
            summary: "SUSE Bug 1109412",
            url: "https://bugzilla.suse.com/1109412",
         },
         {
            category: "self",
            summary: "SUSE Bug 1109413",
            url: "https://bugzilla.suse.com/1109413",
         },
         {
            category: "self",
            summary: "SUSE Bug 1109414",
            url: "https://bugzilla.suse.com/1109414",
         },
         {
            category: "self",
            summary: "SUSE Bug 1111996",
            url: "https://bugzilla.suse.com/1111996",
         },
         {
            category: "self",
            summary: "SUSE Bug 1112534",
            url: "https://bugzilla.suse.com/1112534",
         },
         {
            category: "self",
            summary: "SUSE Bug 1112535",
            url: "https://bugzilla.suse.com/1112535",
         },
         {
            category: "self",
            summary: "SUSE Bug 1113247",
            url: "https://bugzilla.suse.com/1113247",
         },
         {
            category: "self",
            summary: "SUSE Bug 1113252",
            url: "https://bugzilla.suse.com/1113252",
         },
         {
            category: "self",
            summary: "SUSE Bug 1113255",
            url: "https://bugzilla.suse.com/1113255",
         },
         {
            category: "self",
            summary: "SUSE Bug 1116827",
            url: "https://bugzilla.suse.com/1116827",
         },
         {
            category: "self",
            summary: "SUSE Bug 1118644",
            url: "https://bugzilla.suse.com/1118644",
         },
         {
            category: "self",
            summary: "SUSE Bug 1118830",
            url: "https://bugzilla.suse.com/1118830",
         },
         {
            category: "self",
            summary: "SUSE Bug 1118831",
            url: "https://bugzilla.suse.com/1118831",
         },
         {
            category: "self",
            summary: "SUSE Bug 1120640",
            url: "https://bugzilla.suse.com/1120640",
         },
         {
            category: "self",
            summary: "SUSE Bug 1121034",
            url: "https://bugzilla.suse.com/1121034",
         },
         {
            category: "self",
            summary: "SUSE Bug 1121035",
            url: "https://bugzilla.suse.com/1121035",
         },
         {
            category: "self",
            summary: "SUSE Bug 1121056",
            url: "https://bugzilla.suse.com/1121056",
         },
         {
            category: "self",
            summary: "SUSE Bug 1133131",
            url: "https://bugzilla.suse.com/1133131",
         },
         {
            category: "self",
            summary: "SUSE Bug 1133232",
            url: "https://bugzilla.suse.com/1133232",
         },
         {
            category: "self",
            summary: "SUSE Bug 1141913",
            url: "https://bugzilla.suse.com/1141913",
         },
         {
            category: "self",
            summary: "SUSE Bug 1142772",
            url: "https://bugzilla.suse.com/1142772",
         },
         {
            category: "self",
            summary: "SUSE Bug 1152590",
            url: "https://bugzilla.suse.com/1152590",
         },
         {
            category: "self",
            summary: "SUSE Bug 1154016",
            url: "https://bugzilla.suse.com/1154016",
         },
         {
            category: "self",
            summary: "SUSE Bug 1154025",
            url: "https://bugzilla.suse.com/1154025",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-1000876 page",
            url: "https://www.suse.com/security/cve/CVE-2018-1000876/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-17358 page",
            url: "https://www.suse.com/security/cve/CVE-2018-17358/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-17359 page",
            url: "https://www.suse.com/security/cve/CVE-2018-17359/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-17360 page",
            url: "https://www.suse.com/security/cve/CVE-2018-17360/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-17985 page",
            url: "https://www.suse.com/security/cve/CVE-2018-17985/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-18309 page",
            url: "https://www.suse.com/security/cve/CVE-2018-18309/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-18483 page",
            url: "https://www.suse.com/security/cve/CVE-2018-18483/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-18484 page",
            url: "https://www.suse.com/security/cve/CVE-2018-18484/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-18605 page",
            url: "https://www.suse.com/security/cve/CVE-2018-18605/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-18606 page",
            url: "https://www.suse.com/security/cve/CVE-2018-18606/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-18607 page",
            url: "https://www.suse.com/security/cve/CVE-2018-18607/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-19931 page",
            url: "https://www.suse.com/security/cve/CVE-2018-19931/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-19932 page",
            url: "https://www.suse.com/security/cve/CVE-2018-19932/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-20623 page",
            url: "https://www.suse.com/security/cve/CVE-2018-20623/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-20651 page",
            url: "https://www.suse.com/security/cve/CVE-2018-20651/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-20671 page",
            url: "https://www.suse.com/security/cve/CVE-2018-20671/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-6323 page",
            url: "https://www.suse.com/security/cve/CVE-2018-6323/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-6543 page",
            url: "https://www.suse.com/security/cve/CVE-2018-6543/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-6759 page",
            url: "https://www.suse.com/security/cve/CVE-2018-6759/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-6872 page",
            url: "https://www.suse.com/security/cve/CVE-2018-6872/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-7208 page",
            url: "https://www.suse.com/security/cve/CVE-2018-7208/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-7568 page",
            url: "https://www.suse.com/security/cve/CVE-2018-7568/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-7569 page",
            url: "https://www.suse.com/security/cve/CVE-2018-7569/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-7570 page",
            url: "https://www.suse.com/security/cve/CVE-2018-7570/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-7642 page",
            url: "https://www.suse.com/security/cve/CVE-2018-7642/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-7643 page",
            url: "https://www.suse.com/security/cve/CVE-2018-7643/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-8945 page",
            url: "https://www.suse.com/security/cve/CVE-2018-8945/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-1010180 page",
            url: "https://www.suse.com/security/cve/CVE-2019-1010180/",
         },
         {
            category: "self",
            summary: "SUSE Bug ECO-368",
            url: "https://bugzilla.suse.com/ECO-368",
         },
         {
            category: "self",
            summary: "SUSE Bug SLE-6206",
            url: "https://bugzilla.suse.com/SLE-6206",
         },
      ],
      title: "Security update for binutils",
      tracking: {
         current_release_date: "2019-10-25T12:25:52Z",
         generator: {
            date: "2019-10-25T12:25:52Z",
            engine: {
               name: "cve-database.git:bin/generate-csaf.pl",
               version: "1",
            },
         },
         id: "SUSE-SU-2019:2780-1",
         initial_release_date: "2019-10-25T12:25:52Z",
         revision_history: [
            {
               date: "2019-10-25T12:25:52Z",
               number: "1",
               summary: "Current version",
            },
         ],
         status: "final",
         version: "1",
      },
   },
   product_tree: {
      branches: [
         {
            branches: [
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "binutils-2.32-6.8.1.aarch64",
                        product: {
                           name: "binutils-2.32-6.8.1.aarch64",
                           product_id: "binutils-2.32-6.8.1.aarch64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "binutils-devel-2.32-6.8.1.aarch64",
                        product: {
                           name: "binutils-devel-2.32-6.8.1.aarch64",
                           product_id: "binutils-devel-2.32-6.8.1.aarch64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "binutils-gold-2.32-6.8.1.aarch64",
                        product: {
                           name: "binutils-gold-2.32-6.8.1.aarch64",
                           product_id: "binutils-gold-2.32-6.8.1.aarch64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-arm-binutils-2.32-6.8.1.aarch64",
                        product: {
                           name: "cross-arm-binutils-2.32-6.8.1.aarch64",
                           product_id: "cross-arm-binutils-2.32-6.8.1.aarch64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-avr-binutils-2.32-6.8.1.aarch64",
                        product: {
                           name: "cross-avr-binutils-2.32-6.8.1.aarch64",
                           product_id: "cross-avr-binutils-2.32-6.8.1.aarch64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-epiphany-binutils-2.32-6.8.1.aarch64",
                        product: {
                           name: "cross-epiphany-binutils-2.32-6.8.1.aarch64",
                           product_id: "cross-epiphany-binutils-2.32-6.8.1.aarch64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-hppa-binutils-2.32-6.8.1.aarch64",
                        product: {
                           name: "cross-hppa-binutils-2.32-6.8.1.aarch64",
                           product_id: "cross-hppa-binutils-2.32-6.8.1.aarch64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-hppa64-binutils-2.32-6.8.1.aarch64",
                        product: {
                           name: "cross-hppa64-binutils-2.32-6.8.1.aarch64",
                           product_id: "cross-hppa64-binutils-2.32-6.8.1.aarch64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-i386-binutils-2.32-6.8.1.aarch64",
                        product: {
                           name: "cross-i386-binutils-2.32-6.8.1.aarch64",
                           product_id: "cross-i386-binutils-2.32-6.8.1.aarch64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-ia64-binutils-2.32-6.8.1.aarch64",
                        product: {
                           name: "cross-ia64-binutils-2.32-6.8.1.aarch64",
                           product_id: "cross-ia64-binutils-2.32-6.8.1.aarch64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-m68k-binutils-2.32-6.8.1.aarch64",
                        product: {
                           name: "cross-m68k-binutils-2.32-6.8.1.aarch64",
                           product_id: "cross-m68k-binutils-2.32-6.8.1.aarch64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-mips-binutils-2.32-6.8.1.aarch64",
                        product: {
                           name: "cross-mips-binutils-2.32-6.8.1.aarch64",
                           product_id: "cross-mips-binutils-2.32-6.8.1.aarch64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-ppc-binutils-2.32-6.8.1.aarch64",
                        product: {
                           name: "cross-ppc-binutils-2.32-6.8.1.aarch64",
                           product_id: "cross-ppc-binutils-2.32-6.8.1.aarch64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-ppc64-binutils-2.32-6.8.1.aarch64",
                        product: {
                           name: "cross-ppc64-binutils-2.32-6.8.1.aarch64",
                           product_id: "cross-ppc64-binutils-2.32-6.8.1.aarch64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-ppc64le-binutils-2.32-6.8.1.aarch64",
                        product: {
                           name: "cross-ppc64le-binutils-2.32-6.8.1.aarch64",
                           product_id: "cross-ppc64le-binutils-2.32-6.8.1.aarch64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-riscv64-binutils-2.32-6.8.1.aarch64",
                        product: {
                           name: "cross-riscv64-binutils-2.32-6.8.1.aarch64",
                           product_id: "cross-riscv64-binutils-2.32-6.8.1.aarch64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-rx-binutils-2.32-6.8.1.aarch64",
                        product: {
                           name: "cross-rx-binutils-2.32-6.8.1.aarch64",
                           product_id: "cross-rx-binutils-2.32-6.8.1.aarch64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-s390-binutils-2.32-6.8.1.aarch64",
                        product: {
                           name: "cross-s390-binutils-2.32-6.8.1.aarch64",
                           product_id: "cross-s390-binutils-2.32-6.8.1.aarch64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-s390x-binutils-2.32-6.8.1.aarch64",
                        product: {
                           name: "cross-s390x-binutils-2.32-6.8.1.aarch64",
                           product_id: "cross-s390x-binutils-2.32-6.8.1.aarch64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-sparc-binutils-2.32-6.8.1.aarch64",
                        product: {
                           name: "cross-sparc-binutils-2.32-6.8.1.aarch64",
                           product_id: "cross-sparc-binutils-2.32-6.8.1.aarch64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-sparc64-binutils-2.32-6.8.1.aarch64",
                        product: {
                           name: "cross-sparc64-binutils-2.32-6.8.1.aarch64",
                           product_id: "cross-sparc64-binutils-2.32-6.8.1.aarch64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-spu-binutils-2.32-6.8.1.aarch64",
                        product: {
                           name: "cross-spu-binutils-2.32-6.8.1.aarch64",
                           product_id: "cross-spu-binutils-2.32-6.8.1.aarch64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-x86_64-binutils-2.32-6.8.1.aarch64",
                        product: {
                           name: "cross-x86_64-binutils-2.32-6.8.1.aarch64",
                           product_id: "cross-x86_64-binutils-2.32-6.8.1.aarch64",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "aarch64",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "binutils-devel-64bit-2.32-6.8.1.aarch64_ilp32",
                        product: {
                           name: "binutils-devel-64bit-2.32-6.8.1.aarch64_ilp32",
                           product_id: "binutils-devel-64bit-2.32-6.8.1.aarch64_ilp32",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "aarch64_ilp32",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "binutils-2.32-6.8.1.i586",
                        product: {
                           name: "binutils-2.32-6.8.1.i586",
                           product_id: "binutils-2.32-6.8.1.i586",
                        },
                     },
                     {
                        category: "product_version",
                        name: "binutils-devel-2.32-6.8.1.i586",
                        product: {
                           name: "binutils-devel-2.32-6.8.1.i586",
                           product_id: "binutils-devel-2.32-6.8.1.i586",
                        },
                     },
                     {
                        category: "product_version",
                        name: "binutils-gold-2.32-6.8.1.i586",
                        product: {
                           name: "binutils-gold-2.32-6.8.1.i586",
                           product_id: "binutils-gold-2.32-6.8.1.i586",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-aarch64-binutils-2.32-6.8.1.i586",
                        product: {
                           name: "cross-aarch64-binutils-2.32-6.8.1.i586",
                           product_id: "cross-aarch64-binutils-2.32-6.8.1.i586",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-arm-binutils-2.32-6.8.1.i586",
                        product: {
                           name: "cross-arm-binutils-2.32-6.8.1.i586",
                           product_id: "cross-arm-binutils-2.32-6.8.1.i586",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-avr-binutils-2.32-6.8.1.i586",
                        product: {
                           name: "cross-avr-binutils-2.32-6.8.1.i586",
                           product_id: "cross-avr-binutils-2.32-6.8.1.i586",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-epiphany-binutils-2.32-6.8.1.i586",
                        product: {
                           name: "cross-epiphany-binutils-2.32-6.8.1.i586",
                           product_id: "cross-epiphany-binutils-2.32-6.8.1.i586",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-hppa-binutils-2.32-6.8.1.i586",
                        product: {
                           name: "cross-hppa-binutils-2.32-6.8.1.i586",
                           product_id: "cross-hppa-binutils-2.32-6.8.1.i586",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-hppa64-binutils-2.32-6.8.1.i586",
                        product: {
                           name: "cross-hppa64-binutils-2.32-6.8.1.i586",
                           product_id: "cross-hppa64-binutils-2.32-6.8.1.i586",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-ia64-binutils-2.32-6.8.1.i586",
                        product: {
                           name: "cross-ia64-binutils-2.32-6.8.1.i586",
                           product_id: "cross-ia64-binutils-2.32-6.8.1.i586",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-m68k-binutils-2.32-6.8.1.i586",
                        product: {
                           name: "cross-m68k-binutils-2.32-6.8.1.i586",
                           product_id: "cross-m68k-binutils-2.32-6.8.1.i586",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-mips-binutils-2.32-6.8.1.i586",
                        product: {
                           name: "cross-mips-binutils-2.32-6.8.1.i586",
                           product_id: "cross-mips-binutils-2.32-6.8.1.i586",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-ppc-binutils-2.32-6.8.1.i586",
                        product: {
                           name: "cross-ppc-binutils-2.32-6.8.1.i586",
                           product_id: "cross-ppc-binutils-2.32-6.8.1.i586",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-ppc64-binutils-2.32-6.8.1.i586",
                        product: {
                           name: "cross-ppc64-binutils-2.32-6.8.1.i586",
                           product_id: "cross-ppc64-binutils-2.32-6.8.1.i586",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-ppc64le-binutils-2.32-6.8.1.i586",
                        product: {
                           name: "cross-ppc64le-binutils-2.32-6.8.1.i586",
                           product_id: "cross-ppc64le-binutils-2.32-6.8.1.i586",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-riscv64-binutils-2.32-6.8.1.i586",
                        product: {
                           name: "cross-riscv64-binutils-2.32-6.8.1.i586",
                           product_id: "cross-riscv64-binutils-2.32-6.8.1.i586",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-rx-binutils-2.32-6.8.1.i586",
                        product: {
                           name: "cross-rx-binutils-2.32-6.8.1.i586",
                           product_id: "cross-rx-binutils-2.32-6.8.1.i586",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-s390-binutils-2.32-6.8.1.i586",
                        product: {
                           name: "cross-s390-binutils-2.32-6.8.1.i586",
                           product_id: "cross-s390-binutils-2.32-6.8.1.i586",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-s390x-binutils-2.32-6.8.1.i586",
                        product: {
                           name: "cross-s390x-binutils-2.32-6.8.1.i586",
                           product_id: "cross-s390x-binutils-2.32-6.8.1.i586",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-sparc-binutils-2.32-6.8.1.i586",
                        product: {
                           name: "cross-sparc-binutils-2.32-6.8.1.i586",
                           product_id: "cross-sparc-binutils-2.32-6.8.1.i586",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-sparc64-binutils-2.32-6.8.1.i586",
                        product: {
                           name: "cross-sparc64-binutils-2.32-6.8.1.i586",
                           product_id: "cross-sparc64-binutils-2.32-6.8.1.i586",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-spu-binutils-2.32-6.8.1.i586",
                        product: {
                           name: "cross-spu-binutils-2.32-6.8.1.i586",
                           product_id: "cross-spu-binutils-2.32-6.8.1.i586",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-x86_64-binutils-2.32-6.8.1.i586",
                        product: {
                           name: "cross-x86_64-binutils-2.32-6.8.1.i586",
                           product_id: "cross-x86_64-binutils-2.32-6.8.1.i586",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "i586",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "binutils-2.32-6.8.1.ppc64le",
                        product: {
                           name: "binutils-2.32-6.8.1.ppc64le",
                           product_id: "binutils-2.32-6.8.1.ppc64le",
                        },
                     },
                     {
                        category: "product_version",
                        name: "binutils-devel-2.32-6.8.1.ppc64le",
                        product: {
                           name: "binutils-devel-2.32-6.8.1.ppc64le",
                           product_id: "binutils-devel-2.32-6.8.1.ppc64le",
                        },
                     },
                     {
                        category: "product_version",
                        name: "binutils-gold-2.32-6.8.1.ppc64le",
                        product: {
                           name: "binutils-gold-2.32-6.8.1.ppc64le",
                           product_id: "binutils-gold-2.32-6.8.1.ppc64le",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-aarch64-binutils-2.32-6.8.1.ppc64le",
                        product: {
                           name: "cross-aarch64-binutils-2.32-6.8.1.ppc64le",
                           product_id: "cross-aarch64-binutils-2.32-6.8.1.ppc64le",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-arm-binutils-2.32-6.8.1.ppc64le",
                        product: {
                           name: "cross-arm-binutils-2.32-6.8.1.ppc64le",
                           product_id: "cross-arm-binutils-2.32-6.8.1.ppc64le",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-avr-binutils-2.32-6.8.1.ppc64le",
                        product: {
                           name: "cross-avr-binutils-2.32-6.8.1.ppc64le",
                           product_id: "cross-avr-binutils-2.32-6.8.1.ppc64le",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-epiphany-binutils-2.32-6.8.1.ppc64le",
                        product: {
                           name: "cross-epiphany-binutils-2.32-6.8.1.ppc64le",
                           product_id: "cross-epiphany-binutils-2.32-6.8.1.ppc64le",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-hppa-binutils-2.32-6.8.1.ppc64le",
                        product: {
                           name: "cross-hppa-binutils-2.32-6.8.1.ppc64le",
                           product_id: "cross-hppa-binutils-2.32-6.8.1.ppc64le",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-hppa64-binutils-2.32-6.8.1.ppc64le",
                        product: {
                           name: "cross-hppa64-binutils-2.32-6.8.1.ppc64le",
                           product_id: "cross-hppa64-binutils-2.32-6.8.1.ppc64le",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-i386-binutils-2.32-6.8.1.ppc64le",
                        product: {
                           name: "cross-i386-binutils-2.32-6.8.1.ppc64le",
                           product_id: "cross-i386-binutils-2.32-6.8.1.ppc64le",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-ia64-binutils-2.32-6.8.1.ppc64le",
                        product: {
                           name: "cross-ia64-binutils-2.32-6.8.1.ppc64le",
                           product_id: "cross-ia64-binutils-2.32-6.8.1.ppc64le",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-m68k-binutils-2.32-6.8.1.ppc64le",
                        product: {
                           name: "cross-m68k-binutils-2.32-6.8.1.ppc64le",
                           product_id: "cross-m68k-binutils-2.32-6.8.1.ppc64le",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-mips-binutils-2.32-6.8.1.ppc64le",
                        product: {
                           name: "cross-mips-binutils-2.32-6.8.1.ppc64le",
                           product_id: "cross-mips-binutils-2.32-6.8.1.ppc64le",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-ppc-binutils-2.32-6.8.1.ppc64le",
                        product: {
                           name: "cross-ppc-binutils-2.32-6.8.1.ppc64le",
                           product_id: "cross-ppc-binutils-2.32-6.8.1.ppc64le",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-ppc64-binutils-2.32-6.8.1.ppc64le",
                        product: {
                           name: "cross-ppc64-binutils-2.32-6.8.1.ppc64le",
                           product_id: "cross-ppc64-binutils-2.32-6.8.1.ppc64le",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-riscv64-binutils-2.32-6.8.1.ppc64le",
                        product: {
                           name: "cross-riscv64-binutils-2.32-6.8.1.ppc64le",
                           product_id: "cross-riscv64-binutils-2.32-6.8.1.ppc64le",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-rx-binutils-2.32-6.8.1.ppc64le",
                        product: {
                           name: "cross-rx-binutils-2.32-6.8.1.ppc64le",
                           product_id: "cross-rx-binutils-2.32-6.8.1.ppc64le",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-s390-binutils-2.32-6.8.1.ppc64le",
                        product: {
                           name: "cross-s390-binutils-2.32-6.8.1.ppc64le",
                           product_id: "cross-s390-binutils-2.32-6.8.1.ppc64le",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-s390x-binutils-2.32-6.8.1.ppc64le",
                        product: {
                           name: "cross-s390x-binutils-2.32-6.8.1.ppc64le",
                           product_id: "cross-s390x-binutils-2.32-6.8.1.ppc64le",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-sparc-binutils-2.32-6.8.1.ppc64le",
                        product: {
                           name: "cross-sparc-binutils-2.32-6.8.1.ppc64le",
                           product_id: "cross-sparc-binutils-2.32-6.8.1.ppc64le",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-sparc64-binutils-2.32-6.8.1.ppc64le",
                        product: {
                           name: "cross-sparc64-binutils-2.32-6.8.1.ppc64le",
                           product_id: "cross-sparc64-binutils-2.32-6.8.1.ppc64le",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-spu-binutils-2.32-6.8.1.ppc64le",
                        product: {
                           name: "cross-spu-binutils-2.32-6.8.1.ppc64le",
                           product_id: "cross-spu-binutils-2.32-6.8.1.ppc64le",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-x86_64-binutils-2.32-6.8.1.ppc64le",
                        product: {
                           name: "cross-x86_64-binutils-2.32-6.8.1.ppc64le",
                           product_id: "cross-x86_64-binutils-2.32-6.8.1.ppc64le",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "ppc64le",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "binutils-2.32-6.8.1.s390x",
                        product: {
                           name: "binutils-2.32-6.8.1.s390x",
                           product_id: "binutils-2.32-6.8.1.s390x",
                        },
                     },
                     {
                        category: "product_version",
                        name: "binutils-devel-2.32-6.8.1.s390x",
                        product: {
                           name: "binutils-devel-2.32-6.8.1.s390x",
                           product_id: "binutils-devel-2.32-6.8.1.s390x",
                        },
                     },
                     {
                        category: "product_version",
                        name: "binutils-gold-2.32-6.8.1.s390x",
                        product: {
                           name: "binutils-gold-2.32-6.8.1.s390x",
                           product_id: "binutils-gold-2.32-6.8.1.s390x",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-aarch64-binutils-2.32-6.8.1.s390x",
                        product: {
                           name: "cross-aarch64-binutils-2.32-6.8.1.s390x",
                           product_id: "cross-aarch64-binutils-2.32-6.8.1.s390x",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-arm-binutils-2.32-6.8.1.s390x",
                        product: {
                           name: "cross-arm-binutils-2.32-6.8.1.s390x",
                           product_id: "cross-arm-binutils-2.32-6.8.1.s390x",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-avr-binutils-2.32-6.8.1.s390x",
                        product: {
                           name: "cross-avr-binutils-2.32-6.8.1.s390x",
                           product_id: "cross-avr-binutils-2.32-6.8.1.s390x",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-epiphany-binutils-2.32-6.8.1.s390x",
                        product: {
                           name: "cross-epiphany-binutils-2.32-6.8.1.s390x",
                           product_id: "cross-epiphany-binutils-2.32-6.8.1.s390x",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-hppa-binutils-2.32-6.8.1.s390x",
                        product: {
                           name: "cross-hppa-binutils-2.32-6.8.1.s390x",
                           product_id: "cross-hppa-binutils-2.32-6.8.1.s390x",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-hppa64-binutils-2.32-6.8.1.s390x",
                        product: {
                           name: "cross-hppa64-binutils-2.32-6.8.1.s390x",
                           product_id: "cross-hppa64-binutils-2.32-6.8.1.s390x",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-i386-binutils-2.32-6.8.1.s390x",
                        product: {
                           name: "cross-i386-binutils-2.32-6.8.1.s390x",
                           product_id: "cross-i386-binutils-2.32-6.8.1.s390x",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-ia64-binutils-2.32-6.8.1.s390x",
                        product: {
                           name: "cross-ia64-binutils-2.32-6.8.1.s390x",
                           product_id: "cross-ia64-binutils-2.32-6.8.1.s390x",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-m68k-binutils-2.32-6.8.1.s390x",
                        product: {
                           name: "cross-m68k-binutils-2.32-6.8.1.s390x",
                           product_id: "cross-m68k-binutils-2.32-6.8.1.s390x",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-mips-binutils-2.32-6.8.1.s390x",
                        product: {
                           name: "cross-mips-binutils-2.32-6.8.1.s390x",
                           product_id: "cross-mips-binutils-2.32-6.8.1.s390x",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-ppc-binutils-2.32-6.8.1.s390x",
                        product: {
                           name: "cross-ppc-binutils-2.32-6.8.1.s390x",
                           product_id: "cross-ppc-binutils-2.32-6.8.1.s390x",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-ppc64-binutils-2.32-6.8.1.s390x",
                        product: {
                           name: "cross-ppc64-binutils-2.32-6.8.1.s390x",
                           product_id: "cross-ppc64-binutils-2.32-6.8.1.s390x",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-ppc64le-binutils-2.32-6.8.1.s390x",
                        product: {
                           name: "cross-ppc64le-binutils-2.32-6.8.1.s390x",
                           product_id: "cross-ppc64le-binutils-2.32-6.8.1.s390x",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-riscv64-binutils-2.32-6.8.1.s390x",
                        product: {
                           name: "cross-riscv64-binutils-2.32-6.8.1.s390x",
                           product_id: "cross-riscv64-binutils-2.32-6.8.1.s390x",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-rx-binutils-2.32-6.8.1.s390x",
                        product: {
                           name: "cross-rx-binutils-2.32-6.8.1.s390x",
                           product_id: "cross-rx-binutils-2.32-6.8.1.s390x",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-s390-binutils-2.32-6.8.1.s390x",
                        product: {
                           name: "cross-s390-binutils-2.32-6.8.1.s390x",
                           product_id: "cross-s390-binutils-2.32-6.8.1.s390x",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-sparc-binutils-2.32-6.8.1.s390x",
                        product: {
                           name: "cross-sparc-binutils-2.32-6.8.1.s390x",
                           product_id: "cross-sparc-binutils-2.32-6.8.1.s390x",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-sparc64-binutils-2.32-6.8.1.s390x",
                        product: {
                           name: "cross-sparc64-binutils-2.32-6.8.1.s390x",
                           product_id: "cross-sparc64-binutils-2.32-6.8.1.s390x",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-spu-binutils-2.32-6.8.1.s390x",
                        product: {
                           name: "cross-spu-binutils-2.32-6.8.1.s390x",
                           product_id: "cross-spu-binutils-2.32-6.8.1.s390x",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-x86_64-binutils-2.32-6.8.1.s390x",
                        product: {
                           name: "cross-x86_64-binutils-2.32-6.8.1.s390x",
                           product_id: "cross-x86_64-binutils-2.32-6.8.1.s390x",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "s390x",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "binutils-2.32-6.8.1.x86_64",
                        product: {
                           name: "binutils-2.32-6.8.1.x86_64",
                           product_id: "binutils-2.32-6.8.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "binutils-devel-2.32-6.8.1.x86_64",
                        product: {
                           name: "binutils-devel-2.32-6.8.1.x86_64",
                           product_id: "binutils-devel-2.32-6.8.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "binutils-devel-32bit-2.32-6.8.1.x86_64",
                        product: {
                           name: "binutils-devel-32bit-2.32-6.8.1.x86_64",
                           product_id: "binutils-devel-32bit-2.32-6.8.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "binutils-gold-2.32-6.8.1.x86_64",
                        product: {
                           name: "binutils-gold-2.32-6.8.1.x86_64",
                           product_id: "binutils-gold-2.32-6.8.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-aarch64-binutils-2.32-6.8.1.x86_64",
                        product: {
                           name: "cross-aarch64-binutils-2.32-6.8.1.x86_64",
                           product_id: "cross-aarch64-binutils-2.32-6.8.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-arm-binutils-2.32-6.8.1.x86_64",
                        product: {
                           name: "cross-arm-binutils-2.32-6.8.1.x86_64",
                           product_id: "cross-arm-binutils-2.32-6.8.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-avr-binutils-2.32-6.8.1.x86_64",
                        product: {
                           name: "cross-avr-binutils-2.32-6.8.1.x86_64",
                           product_id: "cross-avr-binutils-2.32-6.8.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-epiphany-binutils-2.32-6.8.1.x86_64",
                        product: {
                           name: "cross-epiphany-binutils-2.32-6.8.1.x86_64",
                           product_id: "cross-epiphany-binutils-2.32-6.8.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-hppa-binutils-2.32-6.8.1.x86_64",
                        product: {
                           name: "cross-hppa-binutils-2.32-6.8.1.x86_64",
                           product_id: "cross-hppa-binutils-2.32-6.8.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-hppa64-binutils-2.32-6.8.1.x86_64",
                        product: {
                           name: "cross-hppa64-binutils-2.32-6.8.1.x86_64",
                           product_id: "cross-hppa64-binutils-2.32-6.8.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-i386-binutils-2.32-6.8.1.x86_64",
                        product: {
                           name: "cross-i386-binutils-2.32-6.8.1.x86_64",
                           product_id: "cross-i386-binutils-2.32-6.8.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-ia64-binutils-2.32-6.8.1.x86_64",
                        product: {
                           name: "cross-ia64-binutils-2.32-6.8.1.x86_64",
                           product_id: "cross-ia64-binutils-2.32-6.8.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-m68k-binutils-2.32-6.8.1.x86_64",
                        product: {
                           name: "cross-m68k-binutils-2.32-6.8.1.x86_64",
                           product_id: "cross-m68k-binutils-2.32-6.8.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-mips-binutils-2.32-6.8.1.x86_64",
                        product: {
                           name: "cross-mips-binutils-2.32-6.8.1.x86_64",
                           product_id: "cross-mips-binutils-2.32-6.8.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-ppc-binutils-2.32-6.8.1.x86_64",
                        product: {
                           name: "cross-ppc-binutils-2.32-6.8.1.x86_64",
                           product_id: "cross-ppc-binutils-2.32-6.8.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-ppc64-binutils-2.32-6.8.1.x86_64",
                        product: {
                           name: "cross-ppc64-binutils-2.32-6.8.1.x86_64",
                           product_id: "cross-ppc64-binutils-2.32-6.8.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-ppc64le-binutils-2.32-6.8.1.x86_64",
                        product: {
                           name: "cross-ppc64le-binutils-2.32-6.8.1.x86_64",
                           product_id: "cross-ppc64le-binutils-2.32-6.8.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-riscv64-binutils-2.32-6.8.1.x86_64",
                        product: {
                           name: "cross-riscv64-binutils-2.32-6.8.1.x86_64",
                           product_id: "cross-riscv64-binutils-2.32-6.8.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-rx-binutils-2.32-6.8.1.x86_64",
                        product: {
                           name: "cross-rx-binutils-2.32-6.8.1.x86_64",
                           product_id: "cross-rx-binutils-2.32-6.8.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-s390-binutils-2.32-6.8.1.x86_64",
                        product: {
                           name: "cross-s390-binutils-2.32-6.8.1.x86_64",
                           product_id: "cross-s390-binutils-2.32-6.8.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-s390x-binutils-2.32-6.8.1.x86_64",
                        product: {
                           name: "cross-s390x-binutils-2.32-6.8.1.x86_64",
                           product_id: "cross-s390x-binutils-2.32-6.8.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-sparc-binutils-2.32-6.8.1.x86_64",
                        product: {
                           name: "cross-sparc-binutils-2.32-6.8.1.x86_64",
                           product_id: "cross-sparc-binutils-2.32-6.8.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-sparc64-binutils-2.32-6.8.1.x86_64",
                        product: {
                           name: "cross-sparc64-binutils-2.32-6.8.1.x86_64",
                           product_id: "cross-sparc64-binutils-2.32-6.8.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "cross-spu-binutils-2.32-6.8.1.x86_64",
                        product: {
                           name: "cross-spu-binutils-2.32-6.8.1.x86_64",
                           product_id: "cross-spu-binutils-2.32-6.8.1.x86_64",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "x86_64",
               },
               {
                  branches: [
                     {
                        category: "product_name",
                        name: "SUSE Linux Enterprise Module for Basesystem 15",
                        product: {
                           name: "SUSE Linux Enterprise Module for Basesystem 15",
                           product_id: "SUSE Linux Enterprise Module for Basesystem 15",
                           product_identification_helper: {
                              cpe: "cpe:/o:suse:sle-module-basesystem:15",
                           },
                        },
                     },
                     {
                        category: "product_name",
                        name: "SUSE Linux Enterprise Module for Development Tools 15",
                        product: {
                           name: "SUSE Linux Enterprise Module for Development Tools 15",
                           product_id: "SUSE Linux Enterprise Module for Development Tools 15",
                           product_identification_helper: {
                              cpe: "cpe:/o:suse:sle-module-development-tools:15",
                           },
                        },
                     },
                     {
                        category: "product_name",
                        name: "SUSE Linux Enterprise Module for Package Hub 15",
                        product: {
                           name: "SUSE Linux Enterprise Module for Package Hub 15",
                           product_id: "SUSE Linux Enterprise Module for Package Hub 15",
                           product_identification_helper: {
                              cpe: "cpe:/o:suse:packagehub:15",
                           },
                        },
                     },
                  ],
                  category: "product_family",
                  name: "SUSE Linux Enterprise",
               },
            ],
            category: "vendor",
            name: "SUSE",
         },
      ],
      relationships: [
         {
            category: "default_component_of",
            full_product_name: {
               name: "binutils-2.32-6.8.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
               product_id: "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
            },
            product_reference: "binutils-2.32-6.8.1.aarch64",
            relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "binutils-2.32-6.8.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
               product_id: "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
            },
            product_reference: "binutils-2.32-6.8.1.ppc64le",
            relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "binutils-2.32-6.8.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
               product_id: "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
            },
            product_reference: "binutils-2.32-6.8.1.s390x",
            relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "binutils-2.32-6.8.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
               product_id: "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
            },
            product_reference: "binutils-2.32-6.8.1.x86_64",
            relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "binutils-devel-2.32-6.8.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
               product_id: "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
            },
            product_reference: "binutils-devel-2.32-6.8.1.aarch64",
            relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "binutils-devel-2.32-6.8.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
               product_id: "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
            },
            product_reference: "binutils-devel-2.32-6.8.1.ppc64le",
            relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "binutils-devel-2.32-6.8.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
               product_id: "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
            },
            product_reference: "binutils-devel-2.32-6.8.1.s390x",
            relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "binutils-devel-2.32-6.8.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
               product_id: "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
            },
            product_reference: "binutils-devel-2.32-6.8.1.x86_64",
            relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "binutils-devel-32bit-2.32-6.8.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15",
               product_id: "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
            },
            product_reference: "binutils-devel-32bit-2.32-6.8.1.x86_64",
            relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "binutils-gold-2.32-6.8.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15",
               product_id: "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
            },
            product_reference: "binutils-gold-2.32-6.8.1.aarch64",
            relates_to_product_reference: "SUSE Linux Enterprise Module for Package Hub 15",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "binutils-gold-2.32-6.8.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15",
               product_id: "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
            },
            product_reference: "binutils-gold-2.32-6.8.1.ppc64le",
            relates_to_product_reference: "SUSE Linux Enterprise Module for Package Hub 15",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "binutils-gold-2.32-6.8.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15",
               product_id: "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
            },
            product_reference: "binutils-gold-2.32-6.8.1.s390x",
            relates_to_product_reference: "SUSE Linux Enterprise Module for Package Hub 15",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "binutils-gold-2.32-6.8.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15",
               product_id: "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
            },
            product_reference: "binutils-gold-2.32-6.8.1.x86_64",
            relates_to_product_reference: "SUSE Linux Enterprise Module for Package Hub 15",
         },
      ],
   },
   vulnerabilities: [
      {
         cve: "CVE-2018-1000876",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-1000876",
            },
         ],
         notes: [
            {
               category: "general",
               text: "binutils version 2.32 and earlier contains a Integer Overflow vulnerability in objdump, bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc that can result in Integer overflow trigger heap overflow. Successful exploitation allows execution of arbitrary code.. This attack appear to be exploitable via Local. This vulnerability appears to have been fixed in after commit 3a551c7a1b80fca579461774860574eabfd7f18f.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-1000876",
               url: "https://www.suse.com/security/cve/CVE-2018-1000876",
            },
            {
               category: "external",
               summary: "SUSE Bug 1120640 for CVE-2018-1000876",
               url: "https://bugzilla.suse.com/1120640",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.3,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
                  version: "3.0",
               },
               products: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2019-10-25T12:25:52Z",
               details: "moderate",
            },
         ],
         title: "CVE-2018-1000876",
      },
      {
         cve: "CVE-2018-17358",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-17358",
            },
         ],
         notes: [
            {
               category: "general",
               text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory access exists in _bfd_stab_section_find_nearest_line in syms.c. Attackers could leverage this vulnerability to cause a denial of service (application crash) via a crafted ELF file.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-17358",
               url: "https://www.suse.com/security/cve/CVE-2018-17358",
            },
            {
               category: "external",
               summary: "SUSE Bug 1109412 for CVE-2018-17358",
               url: "https://bugzilla.suse.com/1109412",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 3.3,
                  baseSeverity: "LOW",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2019-10-25T12:25:52Z",
               details: "low",
            },
         ],
         title: "CVE-2018-17358",
      },
      {
         cve: "CVE-2018-17359",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-17359",
            },
         ],
         notes: [
            {
               category: "general",
               text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory access exists in bfd_zalloc in opncls.c. Attackers could leverage this vulnerability to cause a denial of service (application crash) via a crafted ELF file.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-17359",
               url: "https://www.suse.com/security/cve/CVE-2018-17359",
            },
            {
               category: "external",
               summary: "SUSE Bug 1109413 for CVE-2018-17359",
               url: "https://bugzilla.suse.com/1109413",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
                  version: "3.0",
               },
               products: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2019-10-25T12:25:52Z",
               details: "low",
            },
         ],
         title: "CVE-2018-17359",
      },
      {
         cve: "CVE-2018-17360",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-17360",
            },
         ],
         notes: [
            {
               category: "general",
               text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. a heap-based buffer over-read in bfd_getl32 in libbfd.c allows an attacker to cause a denial of service through a crafted PE file. This vulnerability can be triggered by the executable objdump.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-17360",
               url: "https://www.suse.com/security/cve/CVE-2018-17360",
            },
            {
               category: "external",
               summary: "SUSE Bug 1109414 for CVE-2018-17360",
               url: "https://bugzilla.suse.com/1109414",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
                  version: "3.0",
               },
               products: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2019-10-25T12:25:52Z",
               details: "low",
            },
         ],
         title: "CVE-2018-17360",
      },
      {
         cve: "CVE-2018-17985",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-17985",
            },
         ],
         notes: [
            {
               category: "general",
               text: "An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. There is a stack consumption problem caused by the cplus_demangle_type function making recursive calls to itself in certain scenarios involving many 'P' characters.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-17985",
               url: "https://www.suse.com/security/cve/CVE-2018-17985",
            },
            {
               category: "external",
               summary: "SUSE Bug 1116827 for CVE-2018-17985",
               url: "https://bugzilla.suse.com/1116827",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
                  version: "3.0",
               },
               products: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2019-10-25T12:25:52Z",
               details: "moderate",
            },
         ],
         title: "CVE-2018-17985",
      },
      {
         cve: "CVE-2018-18309",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-18309",
            },
         ],
         notes: [
            {
               category: "general",
               text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory address dereference was discovered in read_reloc in reloc.c. The vulnerability causes a segmentation fault and application crash, which leads to denial of service, as demonstrated by objdump, because of missing _bfd_clear_contents bounds checking.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-18309",
               url: "https://www.suse.com/security/cve/CVE-2018-18309",
            },
            {
               category: "external",
               summary: "SUSE Bug 1111996 for CVE-2018-18309",
               url: "https://bugzilla.suse.com/1111996",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 3.3,
                  baseSeverity: "LOW",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
                  version: "3.0",
               },
               products: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2019-10-25T12:25:52Z",
               details: "low",
            },
         ],
         title: "CVE-2018-18309",
      },
      {
         cve: "CVE-2018-18483",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-18483",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The get_count function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31, allows remote attackers to cause a denial of service (malloc called with the result of an integer-overflowing calculation) or possibly have unspecified other impact via a crafted string, as demonstrated by c++filt.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-18483",
               url: "https://www.suse.com/security/cve/CVE-2018-18483",
            },
            {
               category: "external",
               summary: "SUSE Bug 1112535 for CVE-2018-18483",
               url: "https://bugzilla.suse.com/1112535",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2019-10-25T12:25:52Z",
               details: "moderate",
            },
         ],
         title: "CVE-2018-18483",
      },
      {
         cve: "CVE-2018-18484",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-18484",
            },
         ],
         notes: [
            {
               category: "general",
               text: "An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there is a stack consumption problem caused by recursive stack frames: cplus_demangle_type, d_bare_function_type, d_function_type.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-18484",
               url: "https://www.suse.com/security/cve/CVE-2018-18484",
            },
            {
               category: "external",
               summary: "SUSE Bug 1112534 for CVE-2018-18484",
               url: "https://bugzilla.suse.com/1112534",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2019-10-25T12:25:52Z",
               details: "moderate",
            },
         ],
         title: "CVE-2018-18484",
      },
      {
         cve: "CVE-2018-18605",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-18605",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup in merge.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31, because _bfd_add_merge_section mishandles section merges when size is not a multiple of entsize. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-18605",
               url: "https://www.suse.com/security/cve/CVE-2018-18605",
            },
            {
               category: "external",
               summary: "SUSE Bug 1113255 for CVE-2018-18605",
               url: "https://bugzilla.suse.com/1113255",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.4,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L",
                  version: "3.0",
               },
               products: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2019-10-25T12:25:52Z",
               details: "moderate",
            },
         ],
         title: "CVE-2018-18605",
      },
      {
         cve: "CVE-2018-18606",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-18606",
            },
         ],
         notes: [
            {
               category: "general",
               text: "An issue was discovered in the merge_strings function in merge.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-18606",
               url: "https://www.suse.com/security/cve/CVE-2018-18606",
            },
            {
               category: "external",
               summary: "SUSE Bug 1113252 for CVE-2018-18606",
               url: "https://bugzilla.suse.com/1113252",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 3.3,
                  baseSeverity: "LOW",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
                  version: "3.0",
               },
               products: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2019-10-25T12:25:52Z",
               details: "low",
            },
         ],
         title: "CVE-2018-18606",
      },
      {
         cve: "CVE-2018-18607",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-18607",
            },
         ],
         notes: [
            {
               category: "general",
               text: "An issue was discovered in elf_link_input_bfd in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-18607",
               url: "https://www.suse.com/security/cve/CVE-2018-18607",
            },
            {
               category: "external",
               summary: "SUSE Bug 1113247 for CVE-2018-18607",
               url: "https://bugzilla.suse.com/1113247",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 3.3,
                  baseSeverity: "LOW",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
                  version: "3.0",
               },
               products: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2019-10-25T12:25:52Z",
               details: "low",
            },
         ],
         title: "CVE-2018-18607",
      },
      {
         cve: "CVE-2018-19931",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-19931",
            },
         ],
         notes: [
            {
               category: "general",
               text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h because the number of program headers is not restricted.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-19931",
               url: "https://www.suse.com/security/cve/CVE-2018-19931",
            },
            {
               category: "external",
               summary: "SUSE Bug 1118830 for CVE-2018-19931",
               url: "https://bugzilla.suse.com/1118830",
            },
            {
               category: "external",
               summary: "SUSE Bug 1118831 for CVE-2018-19931",
               url: "https://bugzilla.suse.com/1118831",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
                  version: "3.0",
               },
               products: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2019-10-25T12:25:52Z",
               details: "low",
            },
         ],
         title: "CVE-2018-19931",
      },
      {
         cve: "CVE-2018-19932",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-19932",
            },
         ],
         notes: [
            {
               category: "general",
               text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA macro in elf.c.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-19932",
               url: "https://www.suse.com/security/cve/CVE-2018-19932",
            },
            {
               category: "external",
               summary: "SUSE Bug 1118830 for CVE-2018-19932",
               url: "https://bugzilla.suse.com/1118830",
            },
            {
               category: "external",
               summary: "SUSE Bug 1118831 for CVE-2018-19932",
               url: "https://bugzilla.suse.com/1118831",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 3.3,
                  baseSeverity: "LOW",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
                  version: "3.0",
               },
               products: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2019-10-25T12:25:52Z",
               details: "low",
            },
         ],
         title: "CVE-2018-19932",
      },
      {
         cve: "CVE-2018-20623",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-20623",
            },
         ],
         notes: [
            {
               category: "general",
               text: "In GNU Binutils 2.31.1, there is a use-after-free in the error function in elfcomm.c when called from the process_archive function in readelf.c via a crafted ELF file.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-20623",
               url: "https://www.suse.com/security/cve/CVE-2018-20623",
            },
            {
               category: "external",
               summary: "SUSE Bug 1121035 for CVE-2018-20623",
               url: "https://bugzilla.suse.com/1121035",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.9,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
                  version: "3.0",
               },
               products: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2019-10-25T12:25:52Z",
               details: "moderate",
            },
         ],
         title: "CVE-2018-20623",
      },
      {
         cve: "CVE-2018-20651",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-20651",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A NULL pointer dereference was discovered in elf_link_add_object_symbols in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31.1. This occurs for a crafted ET_DYN with no program headers. A specially crafted ELF file allows remote attackers to cause a denial of service, as demonstrated by ld.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-20651",
               url: "https://www.suse.com/security/cve/CVE-2018-20651",
            },
            {
               category: "external",
               summary: "SUSE Bug 1121034 for CVE-2018-20651",
               url: "https://bugzilla.suse.com/1121034",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
                  version: "3.0",
               },
               products: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2019-10-25T12:25:52Z",
               details: "low",
            },
         ],
         title: "CVE-2018-20651",
      },
      {
         cve: "CVE-2018-20671",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-20671",
            },
         ],
         notes: [
            {
               category: "general",
               text: "load_specific_debug_section in objdump.c in GNU Binutils through 2.31.1 contains an integer overflow vulnerability that can trigger a heap-based buffer overflow via a crafted section size.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-20671",
               url: "https://www.suse.com/security/cve/CVE-2018-20671",
            },
            {
               category: "external",
               summary: "SUSE Bug 1121056 for CVE-2018-20671",
               url: "https://bugzilla.suse.com/1121056",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 3.3,
                  baseSeverity: "LOW",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
                  version: "3.0",
               },
               products: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2019-10-25T12:25:52Z",
               details: "low",
            },
         ],
         title: "CVE-2018-20671",
      },
      {
         cve: "CVE-2018-6323",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-6323",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The elf_object_p function in elfcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, has an unsigned integer overflow because bfd_size_type multiplication is not used. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-6323",
               url: "https://www.suse.com/security/cve/CVE-2018-6323",
            },
            {
               category: "external",
               summary: "SUSE Bug 1077745 for CVE-2018-6323",
               url: "https://bugzilla.suse.com/1077745",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               products: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2019-10-25T12:25:52Z",
               details: "low",
            },
         ],
         title: "CVE-2018-6323",
      },
      {
         cve: "CVE-2018-6543",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-6543",
            },
         ],
         notes: [
            {
               category: "general",
               text: "In GNU Binutils 2.30, there's an integer overflow in the function load_specific_debug_section() in objdump.c, which results in `malloc()` with 0 size. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-6543",
               url: "https://www.suse.com/security/cve/CVE-2018-6543",
            },
            {
               category: "external",
               summary: "SUSE Bug 1079103 for CVE-2018-6543",
               url: "https://bugzilla.suse.com/1079103",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.3,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
                  version: "3.0",
               },
               products: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2019-10-25T12:25:52Z",
               details: "moderate",
            },
         ],
         title: "CVE-2018-6543",
      },
      {
         cve: "CVE-2018-6759",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-6759",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The bfd_get_debug_link_info_1 function in opncls.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, has an unchecked strnlen operation. Remote attackers could leverage this vulnerability to cause a denial of service (segmentation fault) via a crafted ELF file.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-6759",
               url: "https://www.suse.com/security/cve/CVE-2018-6759",
            },
            {
               category: "external",
               summary: "SUSE Bug 1079741 for CVE-2018-6759",
               url: "https://bugzilla.suse.com/1079741",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.3,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
                  version: "3.0",
               },
               products: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2019-10-25T12:25:52Z",
               details: "moderate",
            },
         ],
         title: "CVE-2018-6759",
      },
      {
         cve: "CVE-2018-6872",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-6872",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The elf_parse_notes function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (out-of-bounds read and segmentation violation) via a note with a large alignment.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-6872",
               url: "https://www.suse.com/security/cve/CVE-2018-6872",
            },
            {
               category: "external",
               summary: "SUSE Bug 1080556 for CVE-2018-6872",
               url: "https://bugzilla.suse.com/1080556",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               products: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2019-10-25T12:25:52Z",
               details: "moderate",
            },
         ],
         title: "CVE-2018-6872",
      },
      {
         cve: "CVE-2018-7208",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-7208",
            },
         ],
         notes: [
            {
               category: "general",
               text: "In the coff_pointerize_aux function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, an index is not validated, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted file, as demonstrated by objcopy of a COFF object.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-7208",
               url: "https://www.suse.com/security/cve/CVE-2018-7208",
            },
            {
               category: "external",
               summary: "SUSE Bug 1081527 for CVE-2018-7208",
               url: "https://bugzilla.suse.com/1081527",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 3.3,
                  baseSeverity: "LOW",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
                  version: "3.0",
               },
               products: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2019-10-25T12:25:52Z",
               details: "low",
            },
         ],
         title: "CVE-2018-7208",
      },
      {
         cve: "CVE-2018-7568",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-7568",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The parse_die function in dwarf1.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer overflow and application crash) via an ELF file with corrupt dwarf1 debug information, as demonstrated by nm.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-7568",
               url: "https://www.suse.com/security/cve/CVE-2018-7568",
            },
            {
               category: "external",
               summary: "SUSE Bug 1086788 for CVE-2018-7568",
               url: "https://bugzilla.suse.com/1086788",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 3.3,
                  baseSeverity: "LOW",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
                  version: "3.0",
               },
               products: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2019-10-25T12:25:52Z",
               details: "low",
            },
         ],
         title: "CVE-2018-7568",
      },
      {
         cve: "CVE-2018-7569",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-7569",
            },
         ],
         notes: [
            {
               category: "general",
               text: "dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer underflow or overflow, and application crash) via an ELF file with a corrupt DWARF FORM block, as demonstrated by nm.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-7569",
               url: "https://www.suse.com/security/cve/CVE-2018-7569",
            },
            {
               category: "external",
               summary: "SUSE Bug 1083532 for CVE-2018-7569",
               url: "https://bugzilla.suse.com/1083532",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 2.5,
                  baseSeverity: "LOW",
                  vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
                  version: "3.0",
               },
               products: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2019-10-25T12:25:52Z",
               details: "low",
            },
         ],
         title: "CVE-2018-7569",
      },
      {
         cve: "CVE-2018-7570",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-7570",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The assign_file_positions_for_non_load_sections function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an ELF file with a RELRO segment that lacks a matching LOAD segment, as demonstrated by objcopy.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-7570",
               url: "https://www.suse.com/security/cve/CVE-2018-7570",
            },
            {
               category: "external",
               summary: "SUSE Bug 1083528 for CVE-2018-7570",
               url: "https://bugzilla.suse.com/1083528",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 2.5,
                  baseSeverity: "LOW",
                  vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
                  version: "3.0",
               },
               products: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2019-10-25T12:25:52Z",
               details: "low",
            },
         ],
         title: "CVE-2018-7570",
      },
      {
         cve: "CVE-2018-7642",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-7642",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The swap_std_reloc_in function in aoutx.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (aout_32_swap_std_reloc_out NULL pointer dereference and application crash) via a crafted ELF file, as demonstrated by objcopy.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-7642",
               url: "https://www.suse.com/security/cve/CVE-2018-7642",
            },
            {
               category: "external",
               summary: "SUSE Bug 1086786 for CVE-2018-7642",
               url: "https://bugzilla.suse.com/1086786",
            },
            {
               category: "external",
               summary: "SUSE Bug 1128518 for CVE-2018-7642",
               url: "https://bugzilla.suse.com/1128518",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 3.3,
                  baseSeverity: "LOW",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
                  version: "3.0",
               },
               products: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2019-10-25T12:25:52Z",
               details: "low",
            },
         ],
         title: "CVE-2018-7642",
      },
      {
         cve: "CVE-2018-7643",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-7643",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The display_debug_ranges function in dwarf.c in GNU Binutils 2.30 allows remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, as demonstrated by objdump.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-7643",
               url: "https://www.suse.com/security/cve/CVE-2018-7643",
            },
            {
               category: "external",
               summary: "SUSE Bug 1086784 for CVE-2018-7643",
               url: "https://bugzilla.suse.com/1086784",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 3.3,
                  baseSeverity: "LOW",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
                  version: "3.0",
               },
               products: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2019-10-25T12:25:52Z",
               details: "moderate",
            },
         ],
         title: "CVE-2018-7643",
      },
      {
         cve: "CVE-2018-8945",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-8945",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The bfd_section_from_shdr function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (segmentation fault) via a large attribute section.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-8945",
               url: "https://www.suse.com/security/cve/CVE-2018-8945",
            },
            {
               category: "external",
               summary: "SUSE Bug 1086608 for CVE-2018-8945",
               url: "https://bugzilla.suse.com/1086608",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 3.3,
                  baseSeverity: "LOW",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
                  version: "3.0",
               },
               products: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2019-10-25T12:25:52Z",
               details: "low",
            },
         ],
         title: "CVE-2018-8945",
      },
      {
         cve: "CVE-2019-1010180",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-1010180",
            },
         ],
         notes: [
            {
               category: "general",
               text: "GNU gdb All versions is affected by: Buffer Overflow - Out of bound memory access. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. The component is: The main gdb module. The attack vector is: Open an ELF for debugging. The fixed version is: Not fixed yet.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
               "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-1010180",
               url: "https://www.suse.com/security/cve/CVE-2019-1010180",
            },
            {
               category: "external",
               summary: "SUSE Bug 1142772 for CVE-2019-1010180",
               url: "https://bugzilla.suse.com/1142772",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.3,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L",
                  version: "3.0",
               },
               products: [
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x",
                  "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2019-10-25T12:25:52Z",
               details: "important",
            },
         ],
         title: "CVE-2019-1010180",
      },
   ],
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.