<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for elfutils</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2019:1590-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2019-06-19T20:18:43Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2019-06-19T20:18:43Z</InitialReleaseDate>
    <CurrentReleaseDate>2019-06-19T20:18:43Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for elfutils</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for elfutils fixes the following issues:

Security issues fixed:  

- CVE-2017-7607: Fixed a heap-based buffer overflow in handle_gnu_hash (bsc#1033084)
- CVE-2017-7608: Fixed a heap-based buffer overflow in ebl_object_note_type_name() (bsc#1033085)
- CVE-2017-7609: Fixed a memory allocation failure in __libelf_decompress (bsc#1033086)
- CVE-2017-7610: Fixed a heap-based buffer overflow in check_group (bsc#1033087)
- CVE-2017-7611: Fixed a denial of service via a crafted ELF file (bsc#1033088)
- CVE-2017-7612: Fixed a denial of service in check_sysv_hash() via a crafted ELF file (bsc#1033089)
- CVE-2017-7613: Fixed denial of service caused by the missing validation of the number of sections and the number of segments in a crafted ELF file (bsc#1033090)
- CVE-2018-16062: Fixed a heap-buffer overflow in /elfutils/libdw/dwarf_getaranges.c:156 (bsc#1106390)
- CVE-2018-16402: Fixed a denial of service/double free on an attempt to decompress the same section twice (bsc#1107066)
- CVE-2018-16403: Fixed a heap buffer overflow in readelf (bsc#1107067)
- CVE-2018-18310: Fixed an invalid address read problem in dwfl_segment_report_module.c (bsc#1111973)
- CVE-2018-18520: Fixed bad handling of ar files inside are files (bsc#1112726)
- CVE-2018-18521: Fixed a denial of service vulnerabilities in the function arlib_add_symbols() used by eu-ranlib (bsc#1112723)
- CVE-2019-7150: dwfl_segment_report_module doesn't check whether the dyn data read from core file is truncated (bsc#1123685)
- CVE-2019-7665: NT_PLATFORM core file note should be a zero terminated string (bsc#1125007)

This update was imported from the SUSE:SLE-15:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2019-1590</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html</URL>
      <Description>E-Mail link for openSUSE-SU-2019:1590-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1033084</URL>
      <Description>SUSE Bug 1033084</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1033085</URL>
      <Description>SUSE Bug 1033085</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1033086</URL>
      <Description>SUSE Bug 1033086</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1033087</URL>
      <Description>SUSE Bug 1033087</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1033088</URL>
      <Description>SUSE Bug 1033088</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1033089</URL>
      <Description>SUSE Bug 1033089</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1033090</URL>
      <Description>SUSE Bug 1033090</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1106390</URL>
      <Description>SUSE Bug 1106390</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1107066</URL>
      <Description>SUSE Bug 1107066</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1107067</URL>
      <Description>SUSE Bug 1107067</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1111973</URL>
      <Description>SUSE Bug 1111973</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1112723</URL>
      <Description>SUSE Bug 1112723</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1112726</URL>
      <Description>SUSE Bug 1112726</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1123685</URL>
      <Description>SUSE Bug 1123685</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1125007</URL>
      <Description>SUSE Bug 1125007</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7607/</URL>
      <Description>SUSE CVE CVE-2017-7607 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7608/</URL>
      <Description>SUSE CVE CVE-2017-7608 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7609/</URL>
      <Description>SUSE CVE CVE-2017-7609 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7610/</URL>
      <Description>SUSE CVE CVE-2017-7610 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7611/</URL>
      <Description>SUSE CVE CVE-2017-7611 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7612/</URL>
      <Description>SUSE CVE CVE-2017-7612 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7613/</URL>
      <Description>SUSE CVE CVE-2017-7613 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16062/</URL>
      <Description>SUSE CVE CVE-2018-16062 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16402/</URL>
      <Description>SUSE CVE CVE-2018-16402 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16403/</URL>
      <Description>SUSE CVE CVE-2018-16403 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-18310/</URL>
      <Description>SUSE CVE CVE-2018-18310 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-18520/</URL>
      <Description>SUSE CVE CVE-2018-18520 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-18521/</URL>
      <Description>SUSE CVE CVE-2018-18521 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-7150/</URL>
      <Description>SUSE CVE CVE-2019-7150 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-7665/</URL>
      <Description>SUSE CVE CVE-2019-7665 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.0">
      <Branch Type="Product Name" Name="openSUSE Leap 15.0">
        <FullProductName ProductID="openSUSE Leap 15.0" CPE="cpe:/o:opensuse:leap:15.0">openSUSE Leap 15.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.1">
      <Branch Type="Product Name" Name="openSUSE Leap 15.1">
        <FullProductName ProductID="openSUSE Leap 15.1" CPE="cpe:/o:opensuse:leap:15.1">openSUSE Leap 15.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="elfutils-0.168-lp151.4.3.1">
      <FullProductName ProductID="elfutils-0.168-lp151.4.3.1">elfutils-0.168-lp151.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="elfutils-lang-0.168-lp151.4.3.1">
      <FullProductName ProductID="elfutils-lang-0.168-lp151.4.3.1">elfutils-lang-0.168-lp151.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libasm-devel-0.168-lp151.4.3.1">
      <FullProductName ProductID="libasm-devel-0.168-lp151.4.3.1">libasm-devel-0.168-lp151.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libasm1-0.168-lp151.4.3.1">
      <FullProductName ProductID="libasm1-0.168-lp151.4.3.1">libasm1-0.168-lp151.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libasm1-32bit-0.168-lp151.4.3.1">
      <FullProductName ProductID="libasm1-32bit-0.168-lp151.4.3.1">libasm1-32bit-0.168-lp151.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libdw-devel-0.168-lp151.4.3.1">
      <FullProductName ProductID="libdw-devel-0.168-lp151.4.3.1">libdw-devel-0.168-lp151.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libdw1-0.168-lp151.4.3.1">
      <FullProductName ProductID="libdw1-0.168-lp151.4.3.1">libdw1-0.168-lp151.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libdw1-32bit-0.168-lp151.4.3.1">
      <FullProductName ProductID="libdw1-32bit-0.168-lp151.4.3.1">libdw1-32bit-0.168-lp151.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libebl-devel-0.168-lp151.4.3.1">
      <FullProductName ProductID="libebl-devel-0.168-lp151.4.3.1">libebl-devel-0.168-lp151.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libebl-plugins-0.168-lp151.4.3.1">
      <FullProductName ProductID="libebl-plugins-0.168-lp151.4.3.1">libebl-plugins-0.168-lp151.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libebl-plugins-32bit-0.168-lp151.4.3.1">
      <FullProductName ProductID="libebl-plugins-32bit-0.168-lp151.4.3.1">libebl-plugins-32bit-0.168-lp151.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libelf-devel-0.168-lp151.4.3.1">
      <FullProductName ProductID="libelf-devel-0.168-lp151.4.3.1">libelf-devel-0.168-lp151.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libelf-devel-32bit-0.168-lp151.4.3.1">
      <FullProductName ProductID="libelf-devel-32bit-0.168-lp151.4.3.1">libelf-devel-32bit-0.168-lp151.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libelf1-0.168-lp151.4.3.1">
      <FullProductName ProductID="libelf1-0.168-lp151.4.3.1">libelf1-0.168-lp151.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libelf1-32bit-0.168-lp151.4.3.1">
      <FullProductName ProductID="libelf1-32bit-0.168-lp151.4.3.1">libelf1-32bit-0.168-lp151.4.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="elfutils-0.168-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:elfutils-0.168-lp151.4.3.1">elfutils-0.168-lp151.4.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="elfutils-lang-0.168-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:elfutils-lang-0.168-lp151.4.3.1">elfutils-lang-0.168-lp151.4.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libasm-devel-0.168-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libasm-devel-0.168-lp151.4.3.1">libasm-devel-0.168-lp151.4.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libasm1-0.168-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libasm1-0.168-lp151.4.3.1">libasm1-0.168-lp151.4.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libasm1-32bit-0.168-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libasm1-32bit-0.168-lp151.4.3.1">libasm1-32bit-0.168-lp151.4.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libdw-devel-0.168-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libdw-devel-0.168-lp151.4.3.1">libdw-devel-0.168-lp151.4.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libdw1-0.168-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libdw1-0.168-lp151.4.3.1">libdw1-0.168-lp151.4.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libdw1-32bit-0.168-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libdw1-32bit-0.168-lp151.4.3.1">libdw1-32bit-0.168-lp151.4.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libebl-devel-0.168-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libebl-devel-0.168-lp151.4.3.1">libebl-devel-0.168-lp151.4.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libebl-plugins-0.168-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libebl-plugins-0.168-lp151.4.3.1">libebl-plugins-0.168-lp151.4.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libebl-plugins-32bit-0.168-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libebl-plugins-32bit-0.168-lp151.4.3.1">libebl-plugins-32bit-0.168-lp151.4.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libelf-devel-0.168-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libelf-devel-0.168-lp151.4.3.1">libelf-devel-0.168-lp151.4.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libelf-devel-32bit-0.168-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libelf-devel-32bit-0.168-lp151.4.3.1">libelf-devel-32bit-0.168-lp151.4.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libelf1-0.168-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libelf1-0.168-lp151.4.3.1">libelf1-0.168-lp151.4.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libelf1-32bit-0.168-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libelf1-32bit-0.168-lp151.4.3.1">libelf1-32bit-0.168-lp151.4.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="elfutils-0.168-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:elfutils-0.168-lp151.4.3.1">elfutils-0.168-lp151.4.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="elfutils-lang-0.168-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:elfutils-lang-0.168-lp151.4.3.1">elfutils-lang-0.168-lp151.4.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libasm-devel-0.168-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:libasm-devel-0.168-lp151.4.3.1">libasm-devel-0.168-lp151.4.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libasm1-0.168-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:libasm1-0.168-lp151.4.3.1">libasm1-0.168-lp151.4.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libasm1-32bit-0.168-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:libasm1-32bit-0.168-lp151.4.3.1">libasm1-32bit-0.168-lp151.4.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libdw-devel-0.168-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:libdw-devel-0.168-lp151.4.3.1">libdw-devel-0.168-lp151.4.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libdw1-0.168-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:libdw1-0.168-lp151.4.3.1">libdw1-0.168-lp151.4.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libdw1-32bit-0.168-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:libdw1-32bit-0.168-lp151.4.3.1">libdw1-32bit-0.168-lp151.4.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libebl-devel-0.168-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:libebl-devel-0.168-lp151.4.3.1">libebl-devel-0.168-lp151.4.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libebl-plugins-0.168-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:libebl-plugins-0.168-lp151.4.3.1">libebl-plugins-0.168-lp151.4.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libebl-plugins-32bit-0.168-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:libebl-plugins-32bit-0.168-lp151.4.3.1">libebl-plugins-32bit-0.168-lp151.4.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libelf-devel-0.168-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:libelf-devel-0.168-lp151.4.3.1">libelf-devel-0.168-lp151.4.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libelf-devel-32bit-0.168-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:libelf-devel-32bit-0.168-lp151.4.3.1">libelf-devel-32bit-0.168-lp151.4.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libelf1-0.168-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:libelf1-0.168-lp151.4.3.1">libelf1-0.168-lp151.4.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libelf1-32bit-0.168-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:libelf1-32bit-0.168-lp151.4.3.1">libelf1-32bit-0.168-lp151.4.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The handle_gnu_hash function in readelf.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.</Note>
    </Notes>
    <CVE>CVE-2017-7607</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:elfutils-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:elfutils-lang-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libasm-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libasm1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libasm1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libdw-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libdw1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libdw1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libebl-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libebl-plugins-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libebl-plugins-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf-devel-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:elfutils-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:elfutils-lang-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libasm-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libasm1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libasm1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libdw-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libdw1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libdw1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libebl-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libebl-plugins-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libebl-plugins-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf-devel-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf1-32bit-0.168-lp151.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7607.html</URL>
        <Description>CVE-2017-7607</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1033084</URL>
        <Description>SUSE Bug 1033084</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ebl_object_note_type_name function in eblobjnotetypename.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.</Note>
    </Notes>
    <CVE>CVE-2017-7608</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:elfutils-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:elfutils-lang-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libasm-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libasm1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libasm1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libdw-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libdw1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libdw1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libebl-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libebl-plugins-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libebl-plugins-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf-devel-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:elfutils-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:elfutils-lang-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libasm-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libasm1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libasm1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libdw-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libdw1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libdw1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libebl-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libebl-plugins-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libebl-plugins-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf-devel-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf1-32bit-0.168-lp151.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7608.html</URL>
        <Description>CVE-2017-7608</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1033085</URL>
        <Description>SUSE Bug 1033085</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">elf_compress.c in elfutils 0.168 does not validate the zlib compression factor, which allows remote attackers to cause a denial of service (memory consumption) via a crafted ELF file.</Note>
    </Notes>
    <CVE>CVE-2017-7609</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:elfutils-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:elfutils-lang-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libasm-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libasm1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libasm1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libdw-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libdw1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libdw1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libebl-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libebl-plugins-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libebl-plugins-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf-devel-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:elfutils-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:elfutils-lang-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libasm-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libasm1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libasm1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libdw-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libdw1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libdw1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libebl-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libebl-plugins-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libebl-plugins-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf-devel-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf1-32bit-0.168-lp151.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7609.html</URL>
        <Description>CVE-2017-7609</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1033086</URL>
        <Description>SUSE Bug 1033086</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The check_group function in elflint.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.</Note>
    </Notes>
    <CVE>CVE-2017-7610</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:elfutils-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:elfutils-lang-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libasm-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libasm1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libasm1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libdw-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libdw1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libdw1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libebl-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libebl-plugins-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libebl-plugins-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf-devel-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:elfutils-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:elfutils-lang-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libasm-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libasm1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libasm1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libdw-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libdw1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libdw1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libebl-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libebl-plugins-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libebl-plugins-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf-devel-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf1-32bit-0.168-lp151.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7610.html</URL>
        <Description>CVE-2017-7610</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1033087</URL>
        <Description>SUSE Bug 1033087</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The check_symtab_shndx function in elflint.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.</Note>
    </Notes>
    <CVE>CVE-2017-7611</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:elfutils-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:elfutils-lang-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libasm-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libasm1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libasm1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libdw-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libdw1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libdw1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libebl-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libebl-plugins-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libebl-plugins-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf-devel-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:elfutils-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:elfutils-lang-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libasm-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libasm1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libasm1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libdw-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libdw1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libdw1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libebl-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libebl-plugins-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libebl-plugins-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf-devel-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf1-32bit-0.168-lp151.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7611.html</URL>
        <Description>CVE-2017-7611</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1033088</URL>
        <Description>SUSE Bug 1033088</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The check_sysv_hash function in elflint.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.</Note>
    </Notes>
    <CVE>CVE-2017-7612</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:elfutils-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:elfutils-lang-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libasm-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libasm1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libasm1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libdw-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libdw1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libdw1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libebl-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libebl-plugins-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libebl-plugins-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf-devel-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:elfutils-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:elfutils-lang-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libasm-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libasm1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libasm1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libdw-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libdw1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libdw1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libebl-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libebl-plugins-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libebl-plugins-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf-devel-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf1-32bit-0.168-lp151.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7612.html</URL>
        <Description>CVE-2017-7612</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1033089</URL>
        <Description>SUSE Bug 1033089</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">elflint.c in elfutils 0.168 does not validate the number of sections and the number of segments, which allows remote attackers to cause a denial of service (memory consumption) via a crafted ELF file.</Note>
    </Notes>
    <CVE>CVE-2017-7613</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:elfutils-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:elfutils-lang-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libasm-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libasm1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libasm1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libdw-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libdw1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libdw1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libebl-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libebl-plugins-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libebl-plugins-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf-devel-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:elfutils-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:elfutils-lang-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libasm-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libasm1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libasm1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libdw-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libdw1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libdw1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libebl-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libebl-plugins-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libebl-plugins-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf-devel-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf1-32bit-0.168-lp151.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7613.html</URL>
        <Description>CVE-2017-7613</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1033090</URL>
        <Description>SUSE Bug 1033090</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">dwarf_getaranges in dwarf_getaranges.c in libdw in elfutils before 2018-08-18 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2018-16062</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:elfutils-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:elfutils-lang-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libasm-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libasm1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libasm1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libdw-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libdw1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libdw1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libebl-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libebl-plugins-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libebl-plugins-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf-devel-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:elfutils-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:elfutils-lang-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libasm-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libasm1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libasm1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libdw-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libdw1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libdw1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libebl-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libebl-plugins-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libebl-plugins-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf-devel-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf1-32bit-0.168-lp151.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16062.html</URL>
        <Description>CVE-2018-16062</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1106390</URL>
        <Description>SUSE Bug 1106390</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libelf/elf_end.c in elfutils 0.173 allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact because it tries to decompress twice.</Note>
    </Notes>
    <CVE>CVE-2018-16402</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:elfutils-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:elfutils-lang-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libasm-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libasm1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libasm1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libdw-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libdw1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libdw1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libebl-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libebl-plugins-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libebl-plugins-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf-devel-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:elfutils-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:elfutils-lang-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libasm-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libasm1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libasm1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libdw-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libdw1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libdw1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libebl-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libebl-plugins-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libebl-plugins-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf-devel-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf1-32bit-0.168-lp151.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16402.html</URL>
        <Description>CVE-2018-16402</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107066</URL>
        <Description>SUSE Bug 1107066</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libdw in elfutils 0.173 checks the end of the attributes list incorrectly in dwarf_getabbrev in dwarf_getabbrev.c and dwarf_hasattr in dwarf_hasattr.c, leading to a heap-based buffer over-read and an application crash.</Note>
    </Notes>
    <CVE>CVE-2018-16403</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:elfutils-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:elfutils-lang-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libasm-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libasm1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libasm1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libdw-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libdw1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libdw1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libebl-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libebl-plugins-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libebl-plugins-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf-devel-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:elfutils-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:elfutils-lang-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libasm-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libasm1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libasm1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libdw-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libdw1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libdw1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libebl-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libebl-plugins-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libebl-plugins-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf-devel-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf1-32bit-0.168-lp151.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16403.html</URL>
        <Description>CVE-2018-16403</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107067</URL>
        <Description>SUSE Bug 1107067</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An invalid memory address dereference was discovered in dwfl_segment_report_module.c in libdwfl in elfutils through v0.174. The vulnerability allows attackers to cause a denial of service (application crash) with a crafted ELF file, as demonstrated by consider_notes.</Note>
    </Notes>
    <CVE>CVE-2018-18310</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:elfutils-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:elfutils-lang-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libasm-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libasm1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libasm1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libdw-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libdw1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libdw1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libebl-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libebl-plugins-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libebl-plugins-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf-devel-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:elfutils-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:elfutils-lang-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libasm-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libasm1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libasm1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libdw-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libdw1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libdw1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libebl-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libebl-plugins-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libebl-plugins-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf-devel-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf1-32bit-0.168-lp151.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18310.html</URL>
        <Description>CVE-2018-18310</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111973</URL>
        <Description>SUSE Bug 1111973</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An Invalid Memory Address Dereference exists in the function elf_end in libelf in elfutils through v0.174. Although eu-size is intended to support ar files inside ar files, handle_ar in size.c closes the outer ar file before handling all inner entries. The vulnerability allows attackers to cause a denial of service (application crash) with a crafted ELF file.</Note>
    </Notes>
    <CVE>CVE-2018-18520</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:elfutils-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:elfutils-lang-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libasm-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libasm1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libasm1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libdw-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libdw1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libdw1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libebl-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libebl-plugins-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libebl-plugins-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf-devel-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:elfutils-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:elfutils-lang-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libasm-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libasm1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libasm1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libdw-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libdw1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libdw1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libebl-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libebl-plugins-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libebl-plugins-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf-devel-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf1-32bit-0.168-lp151.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18520.html</URL>
        <Description>CVE-2018-18520</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112726</URL>
        <Description>SUSE Bug 1112726</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Divide-by-zero vulnerabilities in the function arlib_add_symbols() in arlib.c in elfutils 0.174 allow remote attackers to cause a denial of service (application crash) with a crafted ELF file, as demonstrated by eu-ranlib, because a zero sh_entsize is mishandled.</Note>
    </Notes>
    <CVE>CVE-2018-18521</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:elfutils-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:elfutils-lang-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libasm-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libasm1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libasm1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libdw-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libdw1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libdw1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libebl-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libebl-plugins-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libebl-plugins-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf-devel-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:elfutils-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:elfutils-lang-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libasm-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libasm1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libasm1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libdw-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libdw1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libdw1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libebl-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libebl-plugins-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libebl-plugins-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf-devel-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf1-32bit-0.168-lp151.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18521.html</URL>
        <Description>CVE-2018-18521</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112723</URL>
        <Description>SUSE Bug 1112723</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in elfutils 0.175. A segmentation fault can occur in the function elf64_xlatetom in libelf/elf32_xlatetom.c, due to dwfl_segment_report_module not checking whether the dyn data read from a core file is truncated. A crafted input can cause a program crash, leading to denial-of-service, as demonstrated by eu-stack.</Note>
    </Notes>
    <CVE>CVE-2019-7150</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:elfutils-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:elfutils-lang-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libasm-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libasm1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libasm1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libdw-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libdw1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libdw1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libebl-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libebl-plugins-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libebl-plugins-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf-devel-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:elfutils-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:elfutils-lang-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libasm-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libasm1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libasm1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libdw-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libdw1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libdw1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libebl-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libebl-plugins-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libebl-plugins-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf-devel-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf1-32bit-0.168-lp151.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-7150.html</URL>
        <Description>CVE-2019-7150</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123685</URL>
        <Description>SUSE Bug 1123685</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In elfutils 0.175, a heap-based buffer over-read was discovered in the function elf32_xlatetom in elf32_xlatetom.c in libelf. A crafted ELF input can cause a segmentation fault leading to denial of service (program crash) because ebl_core_note does not reject malformed core file notes.</Note>
    </Notes>
    <CVE>CVE-2019-7665</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:elfutils-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:elfutils-lang-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libasm-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libasm1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libasm1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libdw-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libdw1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libdw1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libebl-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libebl-plugins-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libebl-plugins-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf-devel-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libelf1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:elfutils-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:elfutils-lang-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libasm-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libasm1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libasm1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libdw-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libdw1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libdw1-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libebl-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libebl-plugins-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libebl-plugins-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf-devel-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf-devel-32bit-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf1-0.168-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libelf1-32bit-0.168-lp151.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-7665.html</URL>
        <Description>CVE-2019-7665</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1125007</URL>
        <Description>SUSE Bug 1125007</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
