| Revision Date: | 2020-12-01 | Version: | 1 |
| Title: | Security update for binutils (Moderate) |
| Description: |
This update for binutils fixes the following issues:
binutils was updated to current 2.32 branch @7b468db3 [jsc#ECO-368]:
Includes the following security fixes:
- CVE-2018-17358: Fixed invalid memory access in _bfd_stab_section_find_nearest_line in syms.c (bsc#1109412) - CVE-2018-17359: Fixed invalid memory access exists in bfd_zalloc in opncls.c (bsc#1109413) - CVE-2018-17360: Fixed heap-based buffer over-read in bfd_getl32 in libbfd.c (bsc#1109414) - CVE-2018-17985: Fixed a stack consumption problem caused by the cplus_demangle_type (bsc#1116827) - CVE-2018-18309: Fixed an invalid memory address dereference was discovered in read_reloc in reloc.c (bsc#1111996) - CVE-2018-18483: Fixed get_count function provided by libiberty that allowed attackers to cause a denial of service or other unspecified impact (bsc#1112535) - CVE-2018-18484: Fixed stack exhaustion in the C++ demangling functions provided by libiberty, caused by recursive stack frames (bsc#1112534) - CVE-2018-18605: Fixed a heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup causing a denial of service (bsc#1113255) - CVE-2018-18606: Fixed a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments, causing denial of service (bsc#1113252) - CVE-2018-18607: Fixed a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section, causing denial of service (bsc#1113247) - CVE-2018-19931: Fixed a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h (bsc#1118831) - CVE-2018-19932: Fixed an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA (bsc#1118830) - CVE-2018-20623: Fixed a use-after-free in the error function in elfcomm.c (bsc#1121035) - CVE-2018-20651: Fixed a denial of service via a NULL pointer dereference in elf_link_add_object_symbols in elflink.c (bsc#1121034) - CVE-2018-20671: Fixed an integer overflow that can trigger a heap-based buffer overflow in load_specific_debug_section in objdump.c (bsc#1121056) - CVE-2018-1000876: Fixed integer overflow in bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc in objdump (bsc#1120640) - CVE-2019-1010180: Fixed an out of bound memory access that could lead to crashes (bsc#1142772)
- Enable xtensa architecture (Tensilica lc6 and related) - Use -ffat-lto-objects in order to provide assembly for static libs (bsc#1141913). - Fixed some LTO problems (bsc#1133131 bsc#1133232). - riscv: Don't check ABI flags if no code section
Update to binutils 2.32:
The binutils now support for the C-SKY processor series. * The x86 assembler now supports a -mvexwig=[0|1] option to control encoding of VEX.W-ignored (WIG) VEX instructions. It also has a new -mx86-used-note=[yes|no] option to generate (or not) x86 GNU property notes. * The MIPS assembler now supports the Loongson EXTensions R2 (EXT2), the Loongson EXTensions (EXT) instructions, the Loongson Content Address Memory (CAM) ASE and the Loongson MultiMedia extensions Instructions (MMI) ASE. * The addr2line, c++filt, nm and objdump tools now have a default limit on the maximum amount of recursion that is allowed whilst demangling strings. This limit can be disabled if necessary. * Objdump's --disassemble option can now take a parameter, specifying the starting symbol for disassembly. Disassembly will continue from this symbol up to the next symbol or the end of the function. * The BFD linker will now report property change in linker map file when merging GNU properties. * The BFD linker's -t option now doesn't report members within archives, unless -t is given twice. This makes it more useful when generating a list of files that should be packaged for a linker bug report. * The GOLD linker has improved warning messages for relocations that refer to discarded sections.
- Improve relro support on s390 [fate#326356] - Handle ELF compressed header alignment correctly.
|
| Family: | unix | Class: | patch |
| Status: | | Reference(s): | 1040311 1040312 1040313 1050577 1050578 1050579 1050581 1055960 1087200 1094851 1094971 1097356 1102662 1102920 1109412 1109413 1109414 1109465 1111996 1112534 1112535 1113247 1113252 1113255 1116827 1117473 1118830 1118831 1120640 1121034 1121035 1121056 1122292 1122293 1122299 1123482 1124525 1128158 1129231 1133131 1133232 1133810 1140868 1141913 1142772 1144504 1145665 1149323 1149458 1151839 1160467 1160468 1160888 1171252 1171254 1173100 1173659 1173661 1173663 1173664 1173665 1173666 1173867 1173869 1173942 1173963 1174247 1175534 1176343 1176344 1176345 1176346 1176347 1176348 1176349 1176350 1176496 1176764 1178593 CVE-2002-2443 CVE-2009-0844 CVE-2009-0845 CVE-2009-0846 CVE-2009-0847 CVE-2009-3295 CVE-2009-4212 CVE-2010-0283 CVE-2010-0628 CVE-2010-1320 CVE-2010-1321 CVE-2010-1322 CVE-2010-1323 CVE-2010-1324 CVE-2010-4020 CVE-2010-4021 CVE-2010-4022 CVE-2011-0281 CVE-2011-0282 CVE-2011-0284 CVE-2011-0285 CVE-2011-1527 CVE-2011-1528 CVE-2011-1529 CVE-2011-1530 CVE-2012-1012 CVE-2012-1013 CVE-2012-1016 CVE-2013-1415 CVE-2013-1417 CVE-2013-1418 CVE-2013-7490 CVE-2014-4341 CVE-2014-4342 CVE-2014-4343 CVE-2014-4344 CVE-2014-4345 CVE-2014-5351 CVE-2014-5352 CVE-2014-5353 CVE-2014-5354 CVE-2014-5355 CVE-2014-9421 CVE-2014-9422 CVE-2014-9423 CVE-2015-2694 CVE-2015-2695 CVE-2015-2696 CVE-2015-2697 CVE-2015-2698 CVE-2015-8629 CVE-2015-8630 CVE-2015-8631 CVE-2016-3119 CVE-2016-3120 CVE-2017-11624 CVE-2017-11625 CVE-2017-11626 CVE-2017-11627 CVE-2017-12595 CVE-2017-18926 CVE-2017-9208 CVE-2017-9209 CVE-2017-9210 CVE-2018-1000876 CVE-2018-11212 CVE-2018-1288 CVE-2018-17358 CVE-2018-17359 CVE-2018-17360 CVE-2018-17985 CVE-2018-18309 CVE-2018-18483 CVE-2018-18484 CVE-2018-18605 CVE-2018-18606 CVE-2018-18607 CVE-2018-1890 CVE-2018-19931 CVE-2018-19932 CVE-2018-20623 CVE-2018-20651 CVE-2018-20671 CVE-2018-5848 CVE-2019-0155 CVE-2019-1010180 CVE-2019-11709 CVE-2019-11710 CVE-2019-11711 CVE-2019-11712 CVE-2019-11713 CVE-2019-11714 CVE-2019-11715 CVE-2019-11716 CVE-2019-11717 CVE-2019-11718 CVE-2019-11719 CVE-2019-11720 CVE-2019-11721 CVE-2019-11723 CVE-2019-11724 CVE-2019-11725 CVE-2019-11727 CVE-2019-11728 CVE-2019-11729 CVE-2019-11730 CVE-2019-11733 CVE-2019-11735 CVE-2019-11736 CVE-2019-11738 CVE-2019-11740 CVE-2019-11742 CVE-2019-11743 CVE-2019-11744 CVE-2019-11746 CVE-2019-11747 CVE-2019-11748 CVE-2019-11749 CVE-2019-11750 CVE-2019-11751 CVE-2019-11752 CVE-2019-11753 CVE-2019-12625 CVE-2019-12900 CVE-2019-14814 CVE-2019-14815 CVE-2019-14816 CVE-2019-14895 CVE-2019-14896 CVE-2019-14897 CVE-2019-14901 CVE-2019-14907 CVE-2019-16746 CVE-2019-18680 CVE-2019-19447 CVE-2019-20919 CVE-2019-2422 CVE-2019-2449 CVE-2019-9458 CVE-2019-9811 CVE-2019-9812 CVE-2020-11668 CVE-2020-12653 CVE-2020-12654 CVE-2020-14331 CVE-2020-14364 CVE-2020-25595 CVE-2020-25596 CVE-2020-25597 CVE-2020-25599 CVE-2020-25600 CVE-2020-25601 CVE-2020-25603 CVE-2020-25604 SUSE-SU-2018:3066-2 SUSE-SU-2018:3563-1 SUSE-SU-2019:0736-1 SUSE-SU-2019:2620-1 SUSE-SU-2019:2650-1 SUSE-SU-2019:3066-1 SUSE-SU-2020:0204-1 SUSE-SU-2020:0233-1 SUSE-SU-2020:2787-1 SUSE-SU-2020:2856-1 SUSE-SU-2020:3351-1
|
| Platform(s): | openSUSE Leap 15.0 openSUSE Leap 15.1 SUSE Linux Enterprise Server 12 SP2-BCL SUSE Linux Enterprise Server 12 SP2-ESPOS SUSE Linux Enterprise Server 12 SP2-LTSS SUSE Linux Enterprise Server 12 SP3 SUSE Linux Enterprise Server 12 SP3-BCL SUSE Linux Enterprise Server 12 SP3-ESPOS SUSE Linux Enterprise Server 12 SP3-LTSS SUSE Linux Enterprise Server 12 SP3-TERADATA SUSE Linux Enterprise Server 12 SP4 SUSE OpenStack Cloud 8 SUSE OpenStack Cloud Crowbar 8
| Product(s): | |
| Definition Synopsis |
| openSUSE Leap 15.0 is installed AND Package Information
gdm-3.26.2.1-lp150.10 is installed
OR gdm-lang-3.26.2.1-lp150.10 is installed
OR gdmflexiserver-3.26.2.1-lp150.10 is installed
OR libgdm1-3.26.2.1-lp150.10 is installed
OR typelib-1_0-Gdm-1_0-3.26.2.1-lp150.10 is installed
|
| Definition Synopsis |
| openSUSE Leap 15.1 is installed
AND Package Information
libvarnishapi2-6.2.1-lp151.3.3 is installed
OR varnish-6.2.1-lp151.3.3 is installed
OR varnish-devel-6.2.1-lp151.3.3 is installed
|
| Definition Synopsis |
| SUSE Linux Enterprise Server 12 SP2-BCL is installed
AND Package Information
cups-filters-1.0.58-15.2 is installed
OR cups-filters-cups-browsed-1.0.58-15.2 is installed
OR cups-filters-foomatic-rip-1.0.58-15.2 is installed
OR cups-filters-ghostscript-1.0.58-15.2 is installed
OR libqpdf18-7.1.1-3.3 is installed
OR qpdf-7.1.1-3.3 is installed
|
| Definition Synopsis |
| SUSE Linux Enterprise Server 12 SP2-ESPOS is installed
AND Package Information
kgraft-patch-4_4_114-92_64-default-10-2 is installed
OR kgraft-patch-SLE12-SP2_Update_18-10-2 is installed
|
| Definition Synopsis |
| SUSE Linux Enterprise Server 12 SP2-LTSS is installed
AND Package Information
binutils-2.32-9.33 is installed
OR binutils-devel-2.32-9.33 is installed
|
| Definition Synopsis |
| SUSE Linux Enterprise Server 12 SP3 is installed
AND Package Information
krb5-1.12.5-39 is installed
OR krb5-32bit-1.12.5-39 is installed
OR krb5-client-1.12.5-39 is installed
OR krb5-doc-1.12.5-39 is installed
OR krb5-plugin-kdb-ldap-1.12.5-39 is installed
OR krb5-plugin-preauth-otp-1.12.5-39 is installed
OR krb5-plugin-preauth-pkinit-1.12.5-39 is installed
OR krb5-server-1.12.5-39 is installed
|
| Definition Synopsis |
| SUSE Linux Enterprise Server 12 SP3-BCL is installed
AND Package Information
libdcerpc-binding0-4.6.16+git.169.064abe062be-3.46 is installed
OR libdcerpc-binding0-32bit-4.6.16+git.169.064abe062be-3.46 is installed
OR libdcerpc0-4.6.16+git.169.064abe062be-3.46 is installed
OR libdcerpc0-32bit-4.6.16+git.169.064abe062be-3.46 is installed
OR libndr-krb5pac0-4.6.16+git.169.064abe062be-3.46 is installed
OR libndr-krb5pac0-32bit-4.6.16+git.169.064abe062be-3.46 is installed
OR libndr-nbt0-4.6.16+git.169.064abe062be-3.46 is installed
OR libndr-nbt0-32bit-4.6.16+git.169.064abe062be-3.46 is installed
OR libndr-standard0-4.6.16+git.169.064abe062be-3.46 is installed
OR libndr-standard0-32bit-4.6.16+git.169.064abe062be-3.46 is installed
OR libndr0-4.6.16+git.169.064abe062be-3.46 is installed
OR libndr0-32bit-4.6.16+git.169.064abe062be-3.46 is installed
OR libnetapi0-4.6.16+git.169.064abe062be-3.46 is installed
OR libnetapi0-32bit-4.6.16+git.169.064abe062be-3.46 is installed
OR libsamba-credentials0-4.6.16+git.169.064abe062be-3.46 is installed
OR libsamba-credentials0-32bit-4.6.16+git.169.064abe062be-3.46 is installed
OR libsamba-errors0-4.6.16+git.169.064abe062be-3.46 is installed
OR libsamba-errors0-32bit-4.6.16+git.169.064abe062be-3.46 is installed
OR libsamba-hostconfig0-4.6.16+git.169.064abe062be-3.46 is installed
OR libsamba-hostconfig0-32bit-4.6.16+git.169.064abe062be-3.46 is installed
OR libsamba-passdb0-4.6.16+git.169.064abe062be-3.46 is installed
OR libsamba-passdb0-32bit-4.6.16+git.169.064abe062be-3.46 is installed
OR libsamba-util0-4.6.16+git.169.064abe062be-3.46 is installed
OR libsamba-util0-32bit-4.6.16+git.169.064abe062be-3.46 is installed
OR libsamdb0-4.6.16+git.169.064abe062be-3.46 is installed
OR libsamdb0-32bit-4.6.16+git.169.064abe062be-3.46 is installed
OR libsmbclient0-4.6.16+git.169.064abe062be-3.46 is installed
OR libsmbclient0-32bit-4.6.16+git.169.064abe062be-3.46 is installed
OR libsmbconf0-4.6.16+git.169.064abe062be-3.46 is installed
OR libsmbconf0-32bit-4.6.16+git.169.064abe062be-3.46 is installed
OR libsmbldap0-4.6.16+git.169.064abe062be-3.46 is installed
OR libsmbldap0-32bit-4.6.16+git.169.064abe062be-3.46 is installed
OR libtevent-util0-4.6.16+git.169.064abe062be-3.46 is installed
OR libtevent-util0-32bit-4.6.16+git.169.064abe062be-3.46 is installed
OR libwbclient0-4.6.16+git.169.064abe062be-3.46 is installed
OR libwbclient0-32bit-4.6.16+git.169.064abe062be-3.46 is installed
OR samba-4.6.16+git.169.064abe062be-3.46 is installed
OR samba-client-4.6.16+git.169.064abe062be-3.46 is installed
OR samba-client-32bit-4.6.16+git.169.064abe062be-3.46 is installed
OR samba-doc-4.6.16+git.169.064abe062be-3.46 is installed
OR samba-libs-4.6.16+git.169.064abe062be-3.46 is installed
OR samba-libs-32bit-4.6.16+git.169.064abe062be-3.46 is installed
OR samba-winbind-4.6.16+git.169.064abe062be-3.46 is installed
OR samba-winbind-32bit-4.6.16+git.169.064abe062be-3.46 is installed
|
| Definition Synopsis |
| SUSE Linux Enterprise Server 12 SP3-ESPOS is installed
AND Package Information
kgraft-patch-4_4_156-94_57-default-8-2 is installed
OR kgraft-patch-SLE12-SP3_Update_18-8-2 is installed
|
| Definition Synopsis |
| SUSE Linux Enterprise Server 12 SP3-LTSS is installed
AND Package Information
kgraft-patch-4_4_156-94_57-default-7-2 is installed
OR kgraft-patch-SLE12-SP3_Update_18-7-2 is installed
|
| Definition Synopsis |
| SUSE Linux Enterprise Server 12 SP3-TERADATA is installed
AND Package Information
ovmf-2017+git1492060560.b6d11d7c46-4.12 is installed
OR ovmf-tools-2017+git1492060560.b6d11d7c46-4.12 is installed
OR qemu-ovmf-x86_64-2017+git1492060560.b6d11d7c46-4.12 is installed
|
| Definition Synopsis |
| SUSE Linux Enterprise Server 12 SP4 is installed
AND Package Information
ibus-chewing-1.4.14-4 is installed
OR ibus-pinyin-1.5.0-11 is installed
|
| Definition Synopsis |
| SUSE OpenStack Cloud 8 is installed
AND Package Information
ardana-monasca-8.0+git.1535031421.9262a47-3.12 is installed
OR ardana-spark-8.0+git.1534267176.a5f3a22-3.6 is installed
OR kafka-0.10.2.2-5.6 is installed
OR openstack-monasca-api-2.2.1~dev24-3.6 is installed
OR python-monasca-api-2.2.1~dev24-3.6 is installed
|
| Definition Synopsis |
| SUSE OpenStack Cloud Crowbar 8 is installed
AND squid-3.5.21-26.23 is installed
|