<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for binutils</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2019:2432-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2019-11-05T15:30:18Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2019-11-05T15:30:18Z</InitialReleaseDate>
    <CurrentReleaseDate>2019-11-05T15:30:18Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for binutils</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for binutils fixes the following issues:

binutils was updated to current 2.32 branch [jsc#ECO-368].

Includes following security fixes:

- CVE-2018-17358: Fixed invalid memory access in _bfd_stab_section_find_nearest_line in syms.c (bsc#1109412)
- CVE-2018-17359: Fixed invalid memory access exists in bfd_zalloc in opncls.c (bsc#1109413)
- CVE-2018-17360: Fixed heap-based buffer over-read in bfd_getl32 in libbfd.c (bsc#1109414)
- CVE-2018-17985: Fixed a stack consumption problem caused by the cplus_demangle_type (bsc#1116827)
- CVE-2018-18309: Fixed an invalid memory address dereference was discovered in read_reloc in reloc.c (bsc#1111996)
- CVE-2018-18483: Fixed get_count function provided by libiberty that allowed attackers to cause a denial of service or other unspecified impact (bsc#1112535)
- CVE-2018-18484: Fixed stack exhaustion in the C++ demangling functions provided by libiberty, caused by recursive stack frames (bsc#1112534)
- CVE-2018-18605: Fixed a heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup causing a denial of service (bsc#1113255)
- CVE-2018-18606: Fixed a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments, causing denial of service (bsc#1113252)
- CVE-2018-18607: Fixed a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section, causing denial of service (bsc#1113247)
- CVE-2018-19931: Fixed a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h (bsc#1118831)
- CVE-2018-19932: Fixed an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA (bsc#1118830)
- CVE-2018-20623: Fixed a use-after-free in the error function in elfcomm.c (bsc#1121035)
- CVE-2018-20651: Fixed a denial of service via a NULL pointer dereference in elf_link_add_object_symbols in elflink.c (bsc#1121034)
- CVE-2018-20671: Fixed an integer overflow that can trigger a heap-based buffer overflow in  load_specific_debug_section in objdump.c (bsc#1121056)
- CVE-2018-1000876: Fixed integer overflow in bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc in objdump (bsc#1120640)
- CVE-2019-1010180: Fixed an out of bound memory access that could lead to crashes (bsc#1142772)

- enable xtensa architecture (Tensilica lc6 and related)
- Use -ffat-lto-objects in order to provide assembly for static libs
  (bsc#1141913).
- Fixed some LTO build issues (bsc#1133131 bsc#1133232).
- riscv: Don't check ABI flags if no code section
- Fixed a segfault in ld when building some versions of pacemaker (bsc#1154025, bsc#1154016).
- Add avr, epiphany and rx to target_list so that the common binutils can handle all objects we can create with crosses (bsc#1152590).

Update to binutils 2.32:

* The binutils now support for the C-SKY processor series.
* The x86 assembler now supports a -mvexwig=[0|1] option to control
  encoding of VEX.W-ignored (WIG) VEX instructions.
  It also has a new -mx86-used-note=[yes|no] option to generate (or
  not) x86 GNU property notes.  
* The MIPS assembler now supports the Loongson EXTensions R2 (EXT2),
  the Loongson EXTensions (EXT) instructions, the Loongson Content
  Address Memory (CAM) ASE and the Loongson MultiMedia extensions
  Instructions (MMI) ASE.
* The addr2line, c++filt, nm and objdump tools now have a default
  limit on the maximum amount of recursion that is allowed whilst
  demangling strings.  This limit can be disabled if necessary.
* Objdump's --disassemble option can now take a parameter,
  specifying the starting symbol for disassembly.  Disassembly will
  continue from this symbol up to the next symbol or the end of the
  function.
* The BFD linker will now report property change in linker map file
  when merging GNU properties.
* The BFD linker's -t option now doesn't report members within
  archives, unless -t is given twice.  This makes it more useful
  when generating a list of files that should be packaged for a
  linker bug report.
* The GOLD linker has improved warning messages for relocations that
  refer to discarded sections.

- Improve relro support on s390 [fate#326356]
- Fix broken debug symbols (bsc#1118644)
- Handle ELF compressed header alignment correctly.


This update was imported from the SUSE:SLE-15-SP1:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2019-2432</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</URL>
      <Description>E-Mail link for openSUSE-SU-2019:2432-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1109412</URL>
      <Description>SUSE Bug 1109412</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1109413</URL>
      <Description>SUSE Bug 1109413</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1109414</URL>
      <Description>SUSE Bug 1109414</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1111996</URL>
      <Description>SUSE Bug 1111996</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1112534</URL>
      <Description>SUSE Bug 1112534</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1112535</URL>
      <Description>SUSE Bug 1112535</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1113247</URL>
      <Description>SUSE Bug 1113247</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1113252</URL>
      <Description>SUSE Bug 1113252</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1113255</URL>
      <Description>SUSE Bug 1113255</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1116827</URL>
      <Description>SUSE Bug 1116827</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1118644</URL>
      <Description>SUSE Bug 1118644</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1118830</URL>
      <Description>SUSE Bug 1118830</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1118831</URL>
      <Description>SUSE Bug 1118831</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1120640</URL>
      <Description>SUSE Bug 1120640</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1121034</URL>
      <Description>SUSE Bug 1121034</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1121035</URL>
      <Description>SUSE Bug 1121035</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1121056</URL>
      <Description>SUSE Bug 1121056</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1133131</URL>
      <Description>SUSE Bug 1133131</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1133232</URL>
      <Description>SUSE Bug 1133232</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1141913</URL>
      <Description>SUSE Bug 1141913</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1142772</URL>
      <Description>SUSE Bug 1142772</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1152590</URL>
      <Description>SUSE Bug 1152590</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1154016</URL>
      <Description>SUSE Bug 1154016</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1154025</URL>
      <Description>SUSE Bug 1154025</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-1000876/</URL>
      <Description>SUSE CVE CVE-2018-1000876 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-17358/</URL>
      <Description>SUSE CVE CVE-2018-17358 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-17359/</URL>
      <Description>SUSE CVE CVE-2018-17359 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-17360/</URL>
      <Description>SUSE CVE CVE-2018-17360 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-17985/</URL>
      <Description>SUSE CVE CVE-2018-17985 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-18309/</URL>
      <Description>SUSE CVE CVE-2018-18309 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-18483/</URL>
      <Description>SUSE CVE CVE-2018-18483 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-18484/</URL>
      <Description>SUSE CVE CVE-2018-18484 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-18605/</URL>
      <Description>SUSE CVE CVE-2018-18605 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-18606/</URL>
      <Description>SUSE CVE CVE-2018-18606 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-18607/</URL>
      <Description>SUSE CVE CVE-2018-18607 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-19931/</URL>
      <Description>SUSE CVE CVE-2018-19931 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-19932/</URL>
      <Description>SUSE CVE CVE-2018-19932 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-20623/</URL>
      <Description>SUSE CVE CVE-2018-20623 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-20651/</URL>
      <Description>SUSE CVE CVE-2018-20651 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-20671/</URL>
      <Description>SUSE CVE CVE-2018-20671 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-6323/</URL>
      <Description>SUSE CVE CVE-2018-6323 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-6543/</URL>
      <Description>SUSE CVE CVE-2018-6543 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-6759/</URL>
      <Description>SUSE CVE CVE-2018-6759 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-6872/</URL>
      <Description>SUSE CVE CVE-2018-6872 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-7208/</URL>
      <Description>SUSE CVE CVE-2018-7208 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-7568/</URL>
      <Description>SUSE CVE CVE-2018-7568 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-7569/</URL>
      <Description>SUSE CVE CVE-2018-7569 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-7570/</URL>
      <Description>SUSE CVE CVE-2018-7570 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-7642/</URL>
      <Description>SUSE CVE CVE-2018-7642 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-7643/</URL>
      <Description>SUSE CVE CVE-2018-7643 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-8945/</URL>
      <Description>SUSE CVE CVE-2018-8945 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-1010180/</URL>
      <Description>SUSE CVE CVE-2019-1010180 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.1">
      <Branch Type="Product Name" Name="openSUSE Leap 15.1">
        <FullProductName ProductID="openSUSE Leap 15.1" CPE="cpe:/o:opensuse:leap:15.1">openSUSE Leap 15.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="binutils-2.32-lp151.3.3.1">
      <FullProductName ProductID="binutils-2.32-lp151.3.3.1">binutils-2.32-lp151.3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="binutils-devel-2.32-lp151.3.3.1">
      <FullProductName ProductID="binutils-devel-2.32-lp151.3.3.1">binutils-devel-2.32-lp151.3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="binutils-devel-32bit-2.32-lp151.3.3.1">
      <FullProductName ProductID="binutils-devel-32bit-2.32-lp151.3.3.1">binutils-devel-32bit-2.32-lp151.3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="binutils-gold-2.32-lp151.3.3.1">
      <FullProductName ProductID="binutils-gold-2.32-lp151.3.3.1">binutils-gold-2.32-lp151.3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-aarch64-binutils-2.32-lp151.3.3.1">
      <FullProductName ProductID="cross-aarch64-binutils-2.32-lp151.3.3.1">cross-aarch64-binutils-2.32-lp151.3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-arm-binutils-2.32-lp151.3.3.1">
      <FullProductName ProductID="cross-arm-binutils-2.32-lp151.3.3.1">cross-arm-binutils-2.32-lp151.3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-avr-binutils-2.32-lp151.3.3.1">
      <FullProductName ProductID="cross-avr-binutils-2.32-lp151.3.3.1">cross-avr-binutils-2.32-lp151.3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-epiphany-binutils-2.32-lp151.3.3.1">
      <FullProductName ProductID="cross-epiphany-binutils-2.32-lp151.3.3.1">cross-epiphany-binutils-2.32-lp151.3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-hppa-binutils-2.32-lp151.3.3.1">
      <FullProductName ProductID="cross-hppa-binutils-2.32-lp151.3.3.1">cross-hppa-binutils-2.32-lp151.3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-hppa64-binutils-2.32-lp151.3.3.1">
      <FullProductName ProductID="cross-hppa64-binutils-2.32-lp151.3.3.1">cross-hppa64-binutils-2.32-lp151.3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-i386-binutils-2.32-lp151.3.3.1">
      <FullProductName ProductID="cross-i386-binutils-2.32-lp151.3.3.1">cross-i386-binutils-2.32-lp151.3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-ia64-binutils-2.32-lp151.3.3.1">
      <FullProductName ProductID="cross-ia64-binutils-2.32-lp151.3.3.1">cross-ia64-binutils-2.32-lp151.3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-m68k-binutils-2.32-lp151.3.3.1">
      <FullProductName ProductID="cross-m68k-binutils-2.32-lp151.3.3.1">cross-m68k-binutils-2.32-lp151.3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-mips-binutils-2.32-lp151.3.3.1">
      <FullProductName ProductID="cross-mips-binutils-2.32-lp151.3.3.1">cross-mips-binutils-2.32-lp151.3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-ppc-binutils-2.32-lp151.3.3.1">
      <FullProductName ProductID="cross-ppc-binutils-2.32-lp151.3.3.1">cross-ppc-binutils-2.32-lp151.3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-ppc64-binutils-2.32-lp151.3.3.1">
      <FullProductName ProductID="cross-ppc64-binutils-2.32-lp151.3.3.1">cross-ppc64-binutils-2.32-lp151.3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-ppc64le-binutils-2.32-lp151.3.3.1">
      <FullProductName ProductID="cross-ppc64le-binutils-2.32-lp151.3.3.1">cross-ppc64le-binutils-2.32-lp151.3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-riscv64-binutils-2.32-lp151.3.3.1">
      <FullProductName ProductID="cross-riscv64-binutils-2.32-lp151.3.3.1">cross-riscv64-binutils-2.32-lp151.3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-rx-binutils-2.32-lp151.3.3.1">
      <FullProductName ProductID="cross-rx-binutils-2.32-lp151.3.3.1">cross-rx-binutils-2.32-lp151.3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-s390-binutils-2.32-lp151.3.3.1">
      <FullProductName ProductID="cross-s390-binutils-2.32-lp151.3.3.1">cross-s390-binutils-2.32-lp151.3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-s390x-binutils-2.32-lp151.3.3.1">
      <FullProductName ProductID="cross-s390x-binutils-2.32-lp151.3.3.1">cross-s390x-binutils-2.32-lp151.3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-sparc-binutils-2.32-lp151.3.3.1">
      <FullProductName ProductID="cross-sparc-binutils-2.32-lp151.3.3.1">cross-sparc-binutils-2.32-lp151.3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-sparc64-binutils-2.32-lp151.3.3.1">
      <FullProductName ProductID="cross-sparc64-binutils-2.32-lp151.3.3.1">cross-sparc64-binutils-2.32-lp151.3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-spu-binutils-2.32-lp151.3.3.1">
      <FullProductName ProductID="cross-spu-binutils-2.32-lp151.3.3.1">cross-spu-binutils-2.32-lp151.3.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="binutils-2.32-lp151.3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1">binutils-2.32-lp151.3.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="binutils-devel-2.32-lp151.3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1">binutils-devel-2.32-lp151.3.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="binutils-devel-32bit-2.32-lp151.3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1">binutils-devel-32bit-2.32-lp151.3.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="binutils-gold-2.32-lp151.3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1">binutils-gold-2.32-lp151.3.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="cross-aarch64-binutils-2.32-lp151.3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1">cross-aarch64-binutils-2.32-lp151.3.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="cross-arm-binutils-2.32-lp151.3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1">cross-arm-binutils-2.32-lp151.3.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="cross-avr-binutils-2.32-lp151.3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1">cross-avr-binutils-2.32-lp151.3.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="cross-epiphany-binutils-2.32-lp151.3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1">cross-epiphany-binutils-2.32-lp151.3.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="cross-hppa-binutils-2.32-lp151.3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1">cross-hppa-binutils-2.32-lp151.3.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="cross-hppa64-binutils-2.32-lp151.3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1">cross-hppa64-binutils-2.32-lp151.3.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="cross-i386-binutils-2.32-lp151.3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1">cross-i386-binutils-2.32-lp151.3.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="cross-ia64-binutils-2.32-lp151.3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1">cross-ia64-binutils-2.32-lp151.3.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="cross-m68k-binutils-2.32-lp151.3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1">cross-m68k-binutils-2.32-lp151.3.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="cross-mips-binutils-2.32-lp151.3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1">cross-mips-binutils-2.32-lp151.3.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="cross-ppc-binutils-2.32-lp151.3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1">cross-ppc-binutils-2.32-lp151.3.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="cross-ppc64-binutils-2.32-lp151.3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1">cross-ppc64-binutils-2.32-lp151.3.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="cross-ppc64le-binutils-2.32-lp151.3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1">cross-ppc64le-binutils-2.32-lp151.3.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="cross-riscv64-binutils-2.32-lp151.3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1">cross-riscv64-binutils-2.32-lp151.3.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="cross-rx-binutils-2.32-lp151.3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1">cross-rx-binutils-2.32-lp151.3.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="cross-s390-binutils-2.32-lp151.3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1">cross-s390-binutils-2.32-lp151.3.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="cross-s390x-binutils-2.32-lp151.3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1">cross-s390x-binutils-2.32-lp151.3.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="cross-sparc-binutils-2.32-lp151.3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1">cross-sparc-binutils-2.32-lp151.3.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="cross-sparc64-binutils-2.32-lp151.3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1">cross-sparc64-binutils-2.32-lp151.3.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="cross-spu-binutils-2.32-lp151.3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1">cross-spu-binutils-2.32-lp151.3.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">binutils version 2.32 and earlier contains a Integer Overflow vulnerability in objdump, bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc that can result in Integer overflow trigger heap overflow. Successful exploitation allows execution of arbitrary code.. This attack appear to be exploitable via Local. This vulnerability appears to have been fixed in after commit 3a551c7a1b80fca579461774860574eabfd7f18f.</Note>
    </Notes>
    <CVE>CVE-2018-1000876</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-1000876.html</URL>
        <Description>CVE-2018-1000876</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1120640</URL>
        <Description>SUSE Bug 1120640</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory access exists in _bfd_stab_section_find_nearest_line in syms.c. Attackers could leverage this vulnerability to cause a denial of service (application crash) via a crafted ELF file.</Note>
    </Notes>
    <CVE>CVE-2018-17358</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-17358.html</URL>
        <Description>CVE-2018-17358</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1109412</URL>
        <Description>SUSE Bug 1109412</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory access exists in bfd_zalloc in opncls.c. Attackers could leverage this vulnerability to cause a denial of service (application crash) via a crafted ELF file.</Note>
    </Notes>
    <CVE>CVE-2018-17359</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-17359.html</URL>
        <Description>CVE-2018-17359</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1109413</URL>
        <Description>SUSE Bug 1109413</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. a heap-based buffer over-read in bfd_getl32 in libbfd.c allows an attacker to cause a denial of service through a crafted PE file. This vulnerability can be triggered by the executable objdump.</Note>
    </Notes>
    <CVE>CVE-2018-17360</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-17360.html</URL>
        <Description>CVE-2018-17360</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1109414</URL>
        <Description>SUSE Bug 1109414</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. There is a stack consumption problem caused by the cplus_demangle_type function making recursive calls to itself in certain scenarios involving many 'P' characters.</Note>
    </Notes>
    <CVE>CVE-2018-17985</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-17985.html</URL>
        <Description>CVE-2018-17985</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116827</URL>
        <Description>SUSE Bug 1116827</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory address dereference was discovered in read_reloc in reloc.c. The vulnerability causes a segmentation fault and application crash, which leads to denial of service, as demonstrated by objdump, because of missing _bfd_clear_contents bounds checking.</Note>
    </Notes>
    <CVE>CVE-2018-18309</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18309.html</URL>
        <Description>CVE-2018-18309</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111996</URL>
        <Description>SUSE Bug 1111996</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The get_count function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31, allows remote attackers to cause a denial of service (malloc called with the result of an integer-overflowing calculation) or possibly have unspecified other impact via a crafted string, as demonstrated by c++filt.</Note>
    </Notes>
    <CVE>CVE-2018-18483</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18483.html</URL>
        <Description>CVE-2018-18483</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112535</URL>
        <Description>SUSE Bug 1112535</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there is a stack consumption problem caused by recursive stack frames: cplus_demangle_type, d_bare_function_type, d_function_type.</Note>
    </Notes>
    <CVE>CVE-2018-18484</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18484.html</URL>
        <Description>CVE-2018-18484</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112534</URL>
        <Description>SUSE Bug 1112534</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup in merge.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31, because _bfd_add_merge_section mishandles section merges when size is not a multiple of entsize. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.</Note>
    </Notes>
    <CVE>CVE-2018-18605</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18605.html</URL>
        <Description>CVE-2018-18605</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1113255</URL>
        <Description>SUSE Bug 1113255</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the merge_strings function in merge.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.</Note>
    </Notes>
    <CVE>CVE-2018-18606</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18606.html</URL>
        <Description>CVE-2018-18606</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1113252</URL>
        <Description>SUSE Bug 1113252</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in elf_link_input_bfd in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.</Note>
    </Notes>
    <CVE>CVE-2018-18607</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18607.html</URL>
        <Description>CVE-2018-18607</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1113247</URL>
        <Description>SUSE Bug 1113247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h because the number of program headers is not restricted.</Note>
    </Notes>
    <CVE>CVE-2018-19931</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-19931.html</URL>
        <Description>CVE-2018-19931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118830</URL>
        <Description>SUSE Bug 1118830</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118831</URL>
        <Description>SUSE Bug 1118831</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA macro in elf.c.</Note>
    </Notes>
    <CVE>CVE-2018-19932</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-19932.html</URL>
        <Description>CVE-2018-19932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118830</URL>
        <Description>SUSE Bug 1118830</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118831</URL>
        <Description>SUSE Bug 1118831</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In GNU Binutils 2.31.1, there is a use-after-free in the error function in elfcomm.c when called from the process_archive function in readelf.c via a crafted ELF file.</Note>
    </Notes>
    <CVE>CVE-2018-20623</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-20623.html</URL>
        <Description>CVE-2018-20623</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1121035</URL>
        <Description>SUSE Bug 1121035</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A NULL pointer dereference was discovered in elf_link_add_object_symbols in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31.1. This occurs for a crafted ET_DYN with no program headers. A specially crafted ELF file allows remote attackers to cause a denial of service, as demonstrated by ld.</Note>
    </Notes>
    <CVE>CVE-2018-20651</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-20651.html</URL>
        <Description>CVE-2018-20651</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1121034</URL>
        <Description>SUSE Bug 1121034</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">load_specific_debug_section in objdump.c in GNU Binutils through 2.31.1 contains an integer overflow vulnerability that can trigger a heap-based buffer overflow via a crafted section size.</Note>
    </Notes>
    <CVE>CVE-2018-20671</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-20671.html</URL>
        <Description>CVE-2018-20671</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1121056</URL>
        <Description>SUSE Bug 1121056</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The elf_object_p function in elfcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, has an unsigned integer overflow because bfd_size_type multiplication is not used. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.</Note>
    </Notes>
    <CVE>CVE-2018-6323</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-6323.html</URL>
        <Description>CVE-2018-6323</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1077745</URL>
        <Description>SUSE Bug 1077745</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In GNU Binutils 2.30, there's an integer overflow in the function load_specific_debug_section() in objdump.c, which results in `malloc()` with 0 size. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.</Note>
    </Notes>
    <CVE>CVE-2018-6543</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-6543.html</URL>
        <Description>CVE-2018-6543</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1079103</URL>
        <Description>SUSE Bug 1079103</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The bfd_get_debug_link_info_1 function in opncls.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, has an unchecked strnlen operation. Remote attackers could leverage this vulnerability to cause a denial of service (segmentation fault) via a crafted ELF file.</Note>
    </Notes>
    <CVE>CVE-2018-6759</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-6759.html</URL>
        <Description>CVE-2018-6759</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1079741</URL>
        <Description>SUSE Bug 1079741</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The elf_parse_notes function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (out-of-bounds read and segmentation violation) via a note with a large alignment.</Note>
    </Notes>
    <CVE>CVE-2018-6872</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-6872.html</URL>
        <Description>CVE-2018-6872</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1080556</URL>
        <Description>SUSE Bug 1080556</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the coff_pointerize_aux function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, an index is not validated, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted file, as demonstrated by objcopy of a COFF object.</Note>
    </Notes>
    <CVE>CVE-2018-7208</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7208.html</URL>
        <Description>CVE-2018-7208</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1081527</URL>
        <Description>SUSE Bug 1081527</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The parse_die function in dwarf1.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer overflow and application crash) via an ELF file with corrupt dwarf1 debug information, as demonstrated by nm.</Note>
    </Notes>
    <CVE>CVE-2018-7568</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7568.html</URL>
        <Description>CVE-2018-7568</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1086788</URL>
        <Description>SUSE Bug 1086788</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer underflow or overflow, and application crash) via an ELF file with a corrupt DWARF FORM block, as demonstrated by nm.</Note>
    </Notes>
    <CVE>CVE-2018-7569</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7569.html</URL>
        <Description>CVE-2018-7569</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1083532</URL>
        <Description>SUSE Bug 1083532</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The assign_file_positions_for_non_load_sections function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an ELF file with a RELRO segment that lacks a matching LOAD segment, as demonstrated by objcopy.</Note>
    </Notes>
    <CVE>CVE-2018-7570</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7570.html</URL>
        <Description>CVE-2018-7570</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1083528</URL>
        <Description>SUSE Bug 1083528</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The swap_std_reloc_in function in aoutx.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (aout_32_swap_std_reloc_out NULL pointer dereference and application crash) via a crafted ELF file, as demonstrated by objcopy.</Note>
    </Notes>
    <CVE>CVE-2018-7642</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7642.html</URL>
        <Description>CVE-2018-7642</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1086786</URL>
        <Description>SUSE Bug 1086786</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1128518</URL>
        <Description>SUSE Bug 1128518</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The display_debug_ranges function in dwarf.c in GNU Binutils 2.30 allows remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, as demonstrated by objdump.</Note>
    </Notes>
    <CVE>CVE-2018-7643</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7643.html</URL>
        <Description>CVE-2018-7643</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1086784</URL>
        <Description>SUSE Bug 1086784</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The bfd_section_from_shdr function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (segmentation fault) via a large attribute section.</Note>
    </Notes>
    <CVE>CVE-2018-8945</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-8945.html</URL>
        <Description>CVE-2018-8945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1086608</URL>
        <Description>SUSE Bug 1086608</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">GNU gdb All versions is affected by: Buffer Overflow - Out of bound memory access. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. The component is: The main gdb module. The attack vector is: Open an ELF for debugging. The fixed version is: Not fixed yet.</Note>
    </Notes>
    <CVE>CVE-2019-1010180</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-1010180.html</URL>
        <Description>CVE-2019-1010180</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1142772</URL>
        <Description>SUSE Bug 1142772</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
