<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for binutils</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2023:3695-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2023-09-20T07:32:42Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2023-09-20T07:32:42Z</InitialReleaseDate>
    <CurrentReleaseDate>2023-09-20T07:32:42Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for binutils</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for binutils fixes the following issues:

Update to version 2.41 [jsc#PED-5778]:

* The MIPS port now supports the Sony Interactive Entertainment Allegrex
  processor, used with the PlayStation Portable, which implements the MIPS
  II ISA along with a single-precision FPU and a few implementation-specific
  integer instructions.
* Objdump's --private option can now be used on PE format files to display the
  fields in the file header and section headers.
* New versioned release of libsframe: libsframe.so.1.  This release introduces
  versioned symbols with version node name LIBSFRAME_1.0.  This release also
  updates the ABI in an incompatible way: this includes removal of
  sframe_get_funcdesc_with_addr API, change in the behavior of
  sframe_fre_get_ra_offset and sframe_fre_get_fp_offset APIs.
* SFrame Version 2 is now the default (and only) format version supported by
  gas, ld, readelf and objdump.
* Add command-line option, --strip-section-headers, to objcopy and strip to
  remove ELF section header from ELF file.
* The RISC-V port now supports the following new standard extensions:

  - Zicond (conditional zero instructions)
  - Zfa (additional floating-point instructions)
  - Zvbb, Zvbc, Zvkg, Zvkned, Zvknh[ab], Zvksed, Zvksh, Zvkn, Zvknc, Zvkng,
    Zvks, Zvksc, Zvkg, Zvkt (vector crypto instructions)

* The RISC-V port now supports the following vendor-defined extensions:

  - XVentanaCondOps

* Add support for Intel FRED, LKGS and AMX-COMPLEX instructions.
* A new .insn directive is recognized by x86 gas.
* Add SME2 support to the AArch64 port.
* The linker now accepts a command line option of --remap-inputs
  &lt;PATTERN&gt;=&lt;FILE&gt; to relace any input file that matches &lt;PATTERN&gt; with
  &lt;FILE&gt;.  In addition the option --remap-inputs-file=&lt;FILE&gt; can be used to
  specify a file containing any number of these remapping directives.
* The linker command line option --print-map-locals can be used to include
  local symbols in a linker map.  (ELF targets only).
* For most ELF based targets, if the --enable-linker-version option is used
  then the version of the linker will be inserted as a string into the .comment
  section.
* The linker script syntax has a new command for output sections: ASCIZ 'string'
  This will insert a zero-terminated string at the current location.
* Add command-line option, -z nosectionheader, to omit ELF section
  header.

- Contains fixes for these non-CVEs (not security bugs per upstreams SECURITY.md):

  * bsc#1209642 aka CVE-2023-1579 aka PR29988
  * bsc#1210297 aka CVE-2023-1972 aka PR30285
  * bsc#1210733 aka CVE-2023-2222 aka PR29936
  * bsc#1213458 aka CVE-2021-32256 aka PR105039 (gcc)
  * bsc#1214565 aka CVE-2020-19726 aka PR26240
  * bsc#1214567 aka CVE-2022-35206 aka PR29290
  * bsc#1214579 aka CVE-2022-35205 aka PR29289
  * bsc#1214580 aka CVE-2022-44840 aka PR29732
  * bsc#1214604 aka CVE-2022-45703 aka PR29799
  * bsc#1214611 aka CVE-2022-48065 aka PR29925
  * bsc#1214619 aka CVE-2022-48064 aka PR29922
  * bsc#1214620 aka CVE-2022-48063 aka PR29924
  * bsc#1214623 aka CVE-2022-47696 aka PR29677
  * bsc#1214624 aka CVE-2022-47695 aka PR29846
  * bsc#1214625 aka CVE-2022-47673 aka PR29876

- Fixed a compatibility problem caused by binutils-revert-rela.diff in
  SLE codestreams. Needed for update of glibc as that would otherwise pick up
  the broken relative relocs support.  [bsc#1213282, jsc#PED-1435]

- Document fixed CVEs:

  * bsc#1208037 aka CVE-2023-25588 aka PR29677
  * bsc#1208038 aka CVE-2023-25587 aka PR29846
  * bsc#1208040 aka CVE-2023-25585 aka PR29892
  * bsc#1208409 aka CVE-2023-0687 aka PR29444

- Enable bpf-none cross target and add bpf-none to the multitarget
  set of supported targets.
- Disable packed-relative-relocs for old codestreams.  They generate
  buggy relocations when binutils-revert-rela.diff is active.
  [bsc#1206556]
- Disable ZSTD debug section compress by default.
- Enable zstd compression algorithm (instead of zlib)
  for debug info sections by default.
- Pack libgprofng only for supported platforms.
- Move libgprofng-related libraries to the proper locations (packages).
- Add --without=bootstrap for skipping of bootstrap (faster testing
  of the package).

Update to version 2.40:

* Objdump has a new command line option --show-all-symbols which will make it
  display all symbols that match a given address when disassembling.  (Normally
  only the first symbol that matches an address is shown).
* Add --enable-colored-disassembly configure time option to enable colored
  disassembly output by default, if the output device is a terminal.  Note,
  this configure option is disabled by default.
* DCO signed contributions are now accepted.
* objcopy --decompress-debug-sections now supports zstd compressed debug
  sections.  The new option --compress-debug-sections=zstd compresses debug
  sections with zstd.
* addr2line and objdump --dwarf now support zstd compressed debug sections.
* The dlltool program now accepts --deterministic-libraries and
  --non-deterministic-libraries as command line options to control whether or
  not it generates deterministic output libraries.  If neither of these options
  are used the default is whatever was set when the binutils were configured.
* readelf and objdump now have a newly added option --sframe which dumps the
  SFrame section.
* Add support for Intel RAO-INT instructions.
* Add support for Intel AVX-NE-CONVERT instructions.
* Add support for Intel MSRLIST instructions.
* Add support for Intel WRMSRNS instructions.
* Add support for Intel CMPccXADD instructions.
* Add support for Intel AVX-VNNI-INT8 instructions.
* Add support for Intel AVX-IFMA instructions.
* Add support for Intel PREFETCHI instructions.
* Add support for Intel AMX-FP16 instructions.
* gas now supports --compress-debug-sections=zstd to compress
  debug sections with zstd.
* Add --enable-default-compressed-debug-sections-algorithm={zlib,zstd}
  that selects the default compression algorithm
  for --enable-compressed-debug-sections.
* Add support for various T-Head extensions (XTheadBa, XTheadBb, XTheadBs,
  XTheadCmo, XTheadCondMov, XTheadFMemIdx, XTheadFmv, XTheadInt, XTheadMemIdx,
  XTheadMemPair, XTheadMac, and XTheadSync) from version 2.0 of the T-Head
  ISA manual, which are implemented in the Allwinner D1.
* Add support for the RISC-V Zawrs extension, version 1.0-rc4.
* Add support for Cortex-X1C for Arm.
* New command line option --gsframe to generate SFrame unwind information
  on x86_64 and aarch64 targets.
* The linker has a new command line option to suppress the generation of any
  warning or error messages.  This can be useful when there is a need to create
  a known non-working binary.  The option is -w or --no-warnings.
* ld now supports zstd compressed debug sections.  The new option
  --compress-debug-sections=zstd compresses debug sections with zstd.
* Add --enable-default-compressed-debug-sections-algorithm={zlib,zstd}
  that selects the default compression algorithm
  for --enable-compressed-debug-sections.
* Remove support for -z bndplt (MPX prefix instructions).

- Includes fixes for these CVEs:

  * bsc#1206080 aka CVE-2022-4285 aka PR29699

- Enable by default: --enable-colored-disassembly.
- fix build on x86_64_vX platforms 
- add arm32 avoid copyreloc patch for PR16177 (bsc#1200962)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">Image SLES12-SP5-Azure-BYOS-2023-3695,Image SLES12-SP5-Azure-SAP-BYOS-2023-3695,SUSE-2023-3695,SUSE-SLE-SDK-12-SP5-2023-3695,SUSE-SLE-SERVER-12-SP5-2023-3695</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233695-1/</URL>
      <Description>Link for SUSE-SU-2023:3695-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2023-September/016227.html</URL>
      <Description>E-Mail link for SUSE-SU-2023:3695-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1200962</URL>
      <Description>SUSE Bug 1200962</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1206080</URL>
      <Description>SUSE Bug 1206080</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1206556</URL>
      <Description>SUSE Bug 1206556</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1208037</URL>
      <Description>SUSE Bug 1208037</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1208038</URL>
      <Description>SUSE Bug 1208038</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1208040</URL>
      <Description>SUSE Bug 1208040</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1208409</URL>
      <Description>SUSE Bug 1208409</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1209642</URL>
      <Description>SUSE Bug 1209642</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1210297</URL>
      <Description>SUSE Bug 1210297</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1210733</URL>
      <Description>SUSE Bug 1210733</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213282</URL>
      <Description>SUSE Bug 1213282</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213458</URL>
      <Description>SUSE Bug 1213458</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1214565</URL>
      <Description>SUSE Bug 1214565</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1214567</URL>
      <Description>SUSE Bug 1214567</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1214579</URL>
      <Description>SUSE Bug 1214579</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1214580</URL>
      <Description>SUSE Bug 1214580</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1214604</URL>
      <Description>SUSE Bug 1214604</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1214611</URL>
      <Description>SUSE Bug 1214611</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1214619</URL>
      <Description>SUSE Bug 1214619</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1214620</URL>
      <Description>SUSE Bug 1214620</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1214623</URL>
      <Description>SUSE Bug 1214623</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1214624</URL>
      <Description>SUSE Bug 1214624</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1214625</URL>
      <Description>SUSE Bug 1214625</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-19726/</URL>
      <Description>SUSE CVE CVE-2020-19726 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-32256/</URL>
      <Description>SUSE CVE CVE-2021-32256 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-35205/</URL>
      <Description>SUSE CVE CVE-2022-35205 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-35206/</URL>
      <Description>SUSE CVE CVE-2022-35206 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-4285/</URL>
      <Description>SUSE CVE CVE-2022-4285 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-44840/</URL>
      <Description>SUSE CVE CVE-2022-44840 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-45703/</URL>
      <Description>SUSE CVE CVE-2022-45703 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-47673/</URL>
      <Description>SUSE CVE CVE-2022-47673 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-47695/</URL>
      <Description>SUSE CVE CVE-2022-47695 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-47696/</URL>
      <Description>SUSE CVE CVE-2022-47696 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48063/</URL>
      <Description>SUSE CVE CVE-2022-48063 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48064/</URL>
      <Description>SUSE CVE CVE-2022-48064 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48065/</URL>
      <Description>SUSE CVE CVE-2022-48065 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-0687/</URL>
      <Description>SUSE CVE CVE-2023-0687 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-1579/</URL>
      <Description>SUSE CVE CVE-2023-1579 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-1972/</URL>
      <Description>SUSE CVE CVE-2023-1972 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-2222/</URL>
      <Description>SUSE CVE CVE-2023-2222 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-25585/</URL>
      <Description>SUSE CVE CVE-2023-25585 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-25587/</URL>
      <Description>SUSE CVE CVE-2023-25587 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-25588/</URL>
      <Description>SUSE CVE CVE-2023-25588 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="Image SLES12-SP5-Azure-BYOS">
      <Branch Type="Product Name" Name="Image SLES12-SP5-Azure-BYOS">
        <FullProductName ProductID="Image SLES12-SP5-Azure-BYOS">Image SLES12-SP5-Azure-BYOS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-Azure-SAP-BYOS">
      <Branch Type="Product Name" Name="Image SLES12-SP5-Azure-SAP-BYOS">
        <FullProductName ProductID="Image SLES12-SP5-Azure-SAP-BYOS">Image SLES12-SP5-Azure-SAP-BYOS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5" CPE="cpe:/o:suse:sles:12:sp5">SUSE Linux Enterprise Server 12 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP5" CPE="cpe:/o:suse:sles_sap:12:sp5">SUSE Linux Enterprise Server for SAP Applications 12 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Software Development Kit 12 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Software Development Kit 12 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12 SP5" CPE="cpe:/o:suse:sle-sdk:12:sp5">SUSE Linux Enterprise Software Development Kit 12 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="binutils-2.41-9.53.1">
      <FullProductName ProductID="binutils-2.41-9.53.1">binutils-2.41-9.53.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libctf-nobfd0-2.41-9.53.1">
      <FullProductName ProductID="libctf-nobfd0-2.41-9.53.1">libctf-nobfd0-2.41-9.53.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libctf0-2.41-9.53.1">
      <FullProductName ProductID="libctf0-2.41-9.53.1">libctf0-2.41-9.53.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="binutils-devel-2.41-9.53.1">
      <FullProductName ProductID="binutils-devel-2.41-9.53.1">binutils-devel-2.41-9.53.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="binutils-devel-32bit-2.41-9.53.1">
      <FullProductName ProductID="binutils-devel-32bit-2.41-9.53.1">binutils-devel-32bit-2.41-9.53.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="binutils-devel-64bit-2.41-9.53.1">
      <FullProductName ProductID="binutils-devel-64bit-2.41-9.53.1">binutils-devel-64bit-2.41-9.53.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="binutils-gold-2.41-9.53.1">
      <FullProductName ProductID="binutils-gold-2.41-9.53.1">binutils-gold-2.41-9.53.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-aarch64-binutils-2.41-9.53.1">
      <FullProductName ProductID="cross-aarch64-binutils-2.41-9.53.1">cross-aarch64-binutils-2.41-9.53.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-arm-binutils-2.41-9.53.1">
      <FullProductName ProductID="cross-arm-binutils-2.41-9.53.1">cross-arm-binutils-2.41-9.53.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-avr-binutils-2.41-9.53.1">
      <FullProductName ProductID="cross-avr-binutils-2.41-9.53.1">cross-avr-binutils-2.41-9.53.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-hppa-binutils-2.41-9.53.1">
      <FullProductName ProductID="cross-hppa-binutils-2.41-9.53.1">cross-hppa-binutils-2.41-9.53.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-hppa64-binutils-2.41-9.53.1">
      <FullProductName ProductID="cross-hppa64-binutils-2.41-9.53.1">cross-hppa64-binutils-2.41-9.53.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-i386-binutils-2.41-9.53.1">
      <FullProductName ProductID="cross-i386-binutils-2.41-9.53.1">cross-i386-binutils-2.41-9.53.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-ia64-binutils-2.41-9.53.1">
      <FullProductName ProductID="cross-ia64-binutils-2.41-9.53.1">cross-ia64-binutils-2.41-9.53.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-m68k-binutils-2.41-9.53.1">
      <FullProductName ProductID="cross-m68k-binutils-2.41-9.53.1">cross-m68k-binutils-2.41-9.53.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-mips-binutils-2.41-9.53.1">
      <FullProductName ProductID="cross-mips-binutils-2.41-9.53.1">cross-mips-binutils-2.41-9.53.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-ppc-binutils-2.41-9.53.1">
      <FullProductName ProductID="cross-ppc-binutils-2.41-9.53.1">cross-ppc-binutils-2.41-9.53.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-ppc64-binutils-2.41-9.53.1">
      <FullProductName ProductID="cross-ppc64-binutils-2.41-9.53.1">cross-ppc64-binutils-2.41-9.53.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-ppc64le-binutils-2.41-9.53.1">
      <FullProductName ProductID="cross-ppc64le-binutils-2.41-9.53.1">cross-ppc64le-binutils-2.41-9.53.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-s390-binutils-2.41-9.53.1">
      <FullProductName ProductID="cross-s390-binutils-2.41-9.53.1">cross-s390-binutils-2.41-9.53.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-s390x-binutils-2.41-9.53.1">
      <FullProductName ProductID="cross-s390x-binutils-2.41-9.53.1">cross-s390x-binutils-2.41-9.53.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-sparc-binutils-2.41-9.53.1">
      <FullProductName ProductID="cross-sparc-binutils-2.41-9.53.1">cross-sparc-binutils-2.41-9.53.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-sparc64-binutils-2.41-9.53.1">
      <FullProductName ProductID="cross-sparc64-binutils-2.41-9.53.1">cross-sparc64-binutils-2.41-9.53.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-spu-binutils-2.41-9.53.1">
      <FullProductName ProductID="cross-spu-binutils-2.41-9.53.1">cross-spu-binutils-2.41-9.53.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-x86_64-binutils-2.41-9.53.1">
      <FullProductName ProductID="cross-x86_64-binutils-2.41-9.53.1">cross-x86_64-binutils-2.41-9.53.1</FullProductName>
    </Branch>
    <Relationship ProductReference="binutils-2.41-9.53.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-Azure-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-Azure-BYOS:binutils-2.41-9.53.1">binutils-2.41-9.53.1 as a component of Image SLES12-SP5-Azure-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="libctf-nobfd0-2.41-9.53.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-Azure-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-Azure-BYOS:libctf-nobfd0-2.41-9.53.1">libctf-nobfd0-2.41-9.53.1 as a component of Image SLES12-SP5-Azure-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="libctf0-2.41-9.53.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-Azure-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-Azure-BYOS:libctf0-2.41-9.53.1">libctf0-2.41-9.53.1 as a component of Image SLES12-SP5-Azure-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="binutils-2.41-9.53.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-Azure-SAP-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-Azure-SAP-BYOS:binutils-2.41-9.53.1">binutils-2.41-9.53.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="libctf-nobfd0-2.41-9.53.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-Azure-SAP-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-Azure-SAP-BYOS:libctf-nobfd0-2.41-9.53.1">libctf-nobfd0-2.41-9.53.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="libctf0-2.41-9.53.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-Azure-SAP-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-Azure-SAP-BYOS:libctf0-2.41-9.53.1">libctf0-2.41-9.53.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="binutils-2.41-9.53.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5:binutils-2.41-9.53.1">binutils-2.41-9.53.1 as a component of SUSE Linux Enterprise Server 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="binutils-devel-2.41-9.53.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.41-9.53.1">binutils-devel-2.41-9.53.1 as a component of SUSE Linux Enterprise Server 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="libctf-nobfd0-2.41-9.53.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.41-9.53.1">libctf-nobfd0-2.41-9.53.1 as a component of SUSE Linux Enterprise Server 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="libctf0-2.41-9.53.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5:libctf0-2.41-9.53.1">libctf0-2.41-9.53.1 as a component of SUSE Linux Enterprise Server 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="binutils-2.41-9.53.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.41-9.53.1">binutils-2.41-9.53.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="binutils-devel-2.41-9.53.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.41-9.53.1">binutils-devel-2.41-9.53.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="libctf-nobfd0-2.41-9.53.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.41-9.53.1">libctf-nobfd0-2.41-9.53.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="libctf0-2.41-9.53.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.41-9.53.1">libctf0-2.41-9.53.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="binutils-devel-2.41-9.53.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.41-9.53.1">binutils-devel-2.41-9.53.1 as a component of SUSE Linux Enterprise Software Development Kit 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="binutils-gold-2.41-9.53.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.41-9.53.1">binutils-gold-2.41-9.53.1 as a component of SUSE Linux Enterprise Software Development Kit 12 SP5</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in binutils libbfd.c 2.36 relating to the auxiliary symbol data allows attackers to read or write to system memory or cause a denial of service.</Note>
    </Notes>
    <CVE>CVE-2020-19726</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:binutils-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-BYOS:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-BYOS:libctf0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:binutils-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:binutils-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.41-9.53.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233695-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-19726.html</URL>
        <Description>CVE-2020-19726</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1214565</URL>
        <Description>SUSE Bug 1214565</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.36. It is a stack-overflow issue in demangle_type in rust-demangle.c.</Note>
    </Notes>
    <CVE>CVE-2021-32256</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:binutils-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-BYOS:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-BYOS:libctf0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:binutils-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:binutils-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.41-9.53.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233695-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-32256.html</URL>
        <Description>CVE-2021-32256</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1213458</URL>
        <Description>SUSE Bug 1213458</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Binutils readelf 2.38.50, reachable assertion failure in function display_debug_names allows attackers to cause a denial of service.</Note>
    </Notes>
    <CVE>CVE-2022-35205</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:binutils-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-BYOS:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-BYOS:libctf0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:binutils-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:binutils-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.41-9.53.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233695-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-35205.html</URL>
        <Description>CVE-2022-35205</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1214579</URL>
        <Description>SUSE Bug 1214579</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Null pointer dereference vulnerability in Binutils readelf 2.38.50 via function read_and_display_attr_value in file dwarf.c.</Note>
    </Notes>
    <CVE>CVE-2022-35206</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:binutils-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-BYOS:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-BYOS:libctf0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:binutils-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:binutils-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.41-9.53.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233695-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-35206.html</URL>
        <Description>CVE-2022-35206</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1214567</URL>
        <Description>SUSE Bug 1214567</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An illegal memory access flaw was found in the binutils package. Parsing an ELF file containing corrupt symbol version information may result in a denial of service. This issue is the result of an incomplete fix for CVE-2020-16599.</Note>
    </Notes>
    <CVE>CVE-2022-4285</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:binutils-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-BYOS:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-BYOS:libctf0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:binutils-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:binutils-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.41-9.53.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233695-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-4285.html</URL>
        <Description>CVE-2022-4285</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1206080</URL>
        <Description>SUSE Bug 1206080</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap buffer overflow vulnerability in binutils readelf before 2.40 via function find_section_in_set in file readelf.c.</Note>
    </Notes>
    <CVE>CVE-2022-44840</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:binutils-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-BYOS:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-BYOS:libctf0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:binutils-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:binutils-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.41-9.53.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233695-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-44840.html</URL>
        <Description>CVE-2022-44840</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1214580</URL>
        <Description>SUSE Bug 1214580</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap buffer overflow vulnerability in binutils readelf before 2.40 via function display_debug_section in file readelf.c.</Note>
    </Notes>
    <CVE>CVE-2022-45703</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:binutils-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-BYOS:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-BYOS:libctf0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:binutils-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:binutils-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.41-9.53.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233695-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-45703.html</URL>
        <Description>CVE-2022-45703</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1214604</URL>
        <Description>SUSE Bug 1214604</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Binutils addr2line before 2.39.3, function parse_module contains multiple out of bound reads which may cause a denial of service or other unspecified impacts.</Note>
    </Notes>
    <CVE>CVE-2022-47673</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:binutils-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-BYOS:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-BYOS:libctf0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:binutils-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:binutils-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.41-9.53.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233695-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-47673.html</URL>
        <Description>CVE-2022-47673</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1214625</URL>
        <Description>SUSE Bug 1214625</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered Binutils objdump before 2.39.3 allows attackers to cause a denial of service or other unspecified impacts via function bfd_mach_o_get_synthetic_symtab in match-o.c.</Note>
    </Notes>
    <CVE>CVE-2022-47695</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:binutils-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-BYOS:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-BYOS:libctf0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:binutils-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:binutils-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.41-9.53.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233695-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-47695.html</URL>
        <Description>CVE-2022-47695</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1214624</URL>
        <Description>SUSE Bug 1214624</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered Binutils objdump before 2.39.3 allows attackers to cause a denial of service or other unspecified impacts via function compare_symbols.</Note>
    </Notes>
    <CVE>CVE-2022-47696</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:binutils-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-BYOS:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-BYOS:libctf0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:binutils-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:binutils-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.41-9.53.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233695-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-47696.html</URL>
        <Description>CVE-2022-47696</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1214623</URL>
        <Description>SUSE Bug 1214623</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">GNU Binutils before 2.40 was discovered to contain an excessive memory consumption vulnerability via the function load_separate_debug_files at dwarf2.c. The attacker could supply a crafted ELF file and cause a DNS attack.</Note>
    </Notes>
    <CVE>CVE-2022-48063</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:binutils-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-BYOS:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-BYOS:libctf0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:binutils-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:binutils-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.41-9.53.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233695-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48063.html</URL>
        <Description>CVE-2022-48063</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1214620</URL>
        <Description>SUSE Bug 1214620</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">GNU Binutils before 2.40 was discovered to contain an excessive memory consumption vulnerability via the function bfd_dwarf2_find_nearest_line_with_alt at dwarf2.c. The attacker could supply a crafted ELF file and cause a DNS attack.</Note>
    </Notes>
    <CVE>CVE-2022-48064</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:binutils-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-BYOS:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-BYOS:libctf0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:binutils-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:binutils-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.41-9.53.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233695-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48064.html</URL>
        <Description>CVE-2022-48064</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1214619</URL>
        <Description>SUSE Bug 1214619</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">GNU Binutils before 2.40 was discovered to contain a memory leak vulnerability var the function find_abstract_instance in dwarf2.c.</Note>
    </Notes>
    <CVE>CVE-2022-48065</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:binutils-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-BYOS:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-BYOS:libctf0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:binutils-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:binutils-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.41-9.53.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233695-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48065.html</URL>
        <Description>CVE-2022-48065</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1214611</URL>
        <Description>SUSE Bug 1214611</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** DISPUTED ** A vulnerability was found in GNU C Library 2.38. It has been declared as critical. This vulnerability affects the function __monstartup of the file gmon.c of the component Call Graph Monitor. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. VDB-220246 is the identifier assigned to this vulnerability. NOTE: The real existence of this vulnerability is still doubted at the moment. The inputs that induce this vulnerability are basically addresses of the running application that is built with gmon enabled. It's basically trusted input or input that needs an actual security flaw to be compromised or controlled.</Note>
    </Notes>
    <CVE>CVE-2023-0687</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:binutils-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-BYOS:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-BYOS:libctf0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:binutils-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:binutils-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.41-9.53.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233695-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-0687.html</URL>
        <Description>CVE-2023-0687</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1207975</URL>
        <Description>SUSE Bug 1207975</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap based buffer overflow in binutils-gdb/bfd/libbfd.c in bfd_getl64.</Note>
    </Notes>
    <CVE>CVE-2023-1579</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:binutils-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-BYOS:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-BYOS:libctf0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:binutils-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:binutils-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.41-9.53.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233695-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-1579.html</URL>
        <Description>CVE-2023-1579</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1209642</URL>
        <Description>SUSE Bug 1209642</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1213676</URL>
        <Description>SUSE Bug 1213676</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A potential heap based buffer overflow was found in _bfd_elf_slurp_version_tables() in bfd/elf.c. This may lead to loss of availability.</Note>
    </Notes>
    <CVE>CVE-2023-1972</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:binutils-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-BYOS:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-BYOS:libctf0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:binutils-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:binutils-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.41-9.53.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233695-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-1972.html</URL>
        <Description>CVE-2023-1972</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1210297</URL>
        <Description>SUSE Bug 1210297</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT ** This was deemed not a security vulnerability by upstream.</Note>
    </Notes>
    <CVE>CVE-2023-2222</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:binutils-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-BYOS:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-BYOS:libctf0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:binutils-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:binutils-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.41-9.53.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233695-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-2222.html</URL>
        <Description>CVE-2023-2222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1210733</URL>
        <Description>SUSE Bug 1210733</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in Binutils. The use of an uninitialized field in the struct module *module may lead to application crash and local denial of service.</Note>
    </Notes>
    <CVE>CVE-2023-25585</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:binutils-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-BYOS:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-BYOS:libctf0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:binutils-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:binutils-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.41-9.53.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233695-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-25585.html</URL>
        <Description>CVE-2023-25585</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1208040</URL>
        <Description>SUSE Bug 1208040</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.</Note>
    </Notes>
    <CVE>CVE-2023-25587</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:binutils-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-BYOS:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-BYOS:libctf0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:binutils-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:binutils-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.41-9.53.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233695-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-25587.html</URL>
        <Description>CVE-2023-25587</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1208038</URL>
        <Description>SUSE Bug 1208038</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in Binutils. The field `the_bfd` of `asymbol`struct is uninitialized in the `bfd_mach_o_get_synthetic_symtab` function, which may lead to an application crash and local denial of service.</Note>
    </Notes>
    <CVE>CVE-2023-25588</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:binutils-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-BYOS:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-BYOS:libctf0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:binutils-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:binutils-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.41-9.53.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.41-9.53.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233695-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-25588.html</URL>
        <Description>CVE-2023-25588</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1208037</URL>
        <Description>SUSE Bug 1208037</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
