<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for binutils</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2018:3323-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-10-23T07:32:47Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-10-23T07:32:47Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-10-23T07:32:47Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for binutils</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for binutils to version 2.31 fixes the following issues:

These security issues were fixed:

- CVE-2017-15996: readelf allowed remote attackers to cause a denial of service
  (excessive memory allocation) or possibly have unspecified other impact via a
  crafted ELF file that triggered a buffer overflow on fuzzed archive header
  (bsc#1065643)
- CVE-2017-15939: Binary File Descriptor (BFD) library (aka libbfd) mishandled
  NULL files in a .debug_line file table, which allowed remote attackers to cause
  a denial of service (NULL pointer dereference and application crash) via a
  crafted ELF file, related to concat_filename (bsc#1065689)
- CVE-2017-15938: the Binary File Descriptor (BFD) library (aka libbfd)
  miscalculated DW_FORM_ref_addr die refs in the case of a relocatable object
  file, which allowed remote attackers to cause a denial of service
  (find_abstract_instance_name invalid memory read, segmentation fault, and
   application crash) (bsc#1065693)
- CVE-2017-16826: The coff_slurp_line_table function the Binary File Descriptor
  (BFD) library (aka libbfd) allowed remote attackers to cause a denial of
  service (invalid memory access and application crash) or possibly have
  unspecified other impact via a crafted PE file (bsc#1068640)
- CVE-2017-16832: The pe_bfd_read_buildid function in the Binary File
  Descriptor (BFD) library (aka libbfd) did not validate size and offset values
  in the data dictionary, which allowed remote attackers to cause a denial of
  service (segmentation violation and application crash) or possibly have
  unspecified other impact via a crafted PE file (bsc#1068643)
- CVE-2017-16831: Binary File Descriptor (BFD) library (aka libbfd) did not
  validate the symbol count, which allowed remote attackers to cause a denial of
  service (integer overflow and application crash, or excessive memory
  allocation) or possibly have unspecified other impact via a crafted PE file
  (bsc#1068887)
- CVE-2017-16830: The print_gnu_property_note function did not have
  integer-overflow protection on 32-bit platforms, which allowed remote attackers
  to cause a denial of service (segmentation violation and application crash) or
  possibly have unspecified other impact via a crafted ELF file (bsc#1068888)
- CVE-2017-16829: The _bfd_elf_parse_gnu_properties function in the Binary File
  Descriptor (BFD) library (aka libbfd) did not prevent negative pointers, which
  allowed remote attackers to cause a denial of service (out-of-bounds read and
  application crash) or possibly have unspecified other impact via a crafted ELF
  file (bsc#1068950)
- CVE-2017-16828: The display_debug_frames function allowed remote attackers to
  cause a denial of service (integer overflow and heap-based buffer over-read,
  and application crash) or possibly have unspecified other impact via a crafted
  ELF file (bsc#1069176)
- CVE-2017-16827: The aout_get_external_symbols function in the Binary File
  Descriptor (BFD) library (aka libbfd) allowed remote attackers to cause a
  denial of service (slurp_symtab invalid free and application crash) or possibly
  have unspecified other impact via a crafted ELF file (bsc#1069202)
- CVE-2018-6323: The elf_object_p function in the Binary File Descriptor (BFD)
  library (aka libbfd) had an unsigned integer overflow because bfd_size_type
  multiplication is not used. A crafted ELF file allowed remote attackers to
  cause a denial of service (application crash) or possibly have unspecified
  other impact (bsc#1077745)
- CVE-2018-6543: Prevent integer overflow in the function
  load_specific_debug_section() which resulted in `malloc()` with 0 size. A
  crafted ELF file allowed remote attackers to cause a denial of service
  (application crash) or possibly have unspecified other impact (bsc#1079103)
- CVE-2018-6759: The bfd_get_debug_link_info_1 function in the Binary File
  Descriptor (BFD) library (aka libbfd) had an unchecked strnlen operation.
  Remote attackers could have leveraged this vulnerability to cause a denial of
  service (segmentation fault) via a crafted ELF file (bsc#1079741)
- CVE-2018-6872: The elf_parse_notes function in the Binary File Descriptor
  (BFD) library (aka libbfd) allowed remote attackers to cause a denial of
  service (out-of-bounds read and segmentation violation) via a note with a large
  alignment (bsc#1080556)
- CVE-2018-7208: In the coff_pointerize_aux function in the Binary File
  Descriptor (BFD) library (aka libbfd) an index was not validated, which allowed
  remote attackers to cause a denial of service (segmentation fault) or possibly
  have unspecified other impact via a crafted file, as demonstrated by objcopy of
  a COFF object (bsc#1081527)
- CVE-2018-7570: The assign_file_positions_for_non_load_sections function in
  the Binary File Descriptor (BFD) library (aka libbfd) allowed remote attackers
  to cause a denial of service (NULL pointer dereference and application crash)
  via an ELF file with a RELRO segment that lacks a matching LOAD segment, as
  demonstrated by objcopy (bsc#1083528)
- CVE-2018-7569: The Binary File Descriptor (BFD) library (aka libbfd) allowed
  remote attackers to cause a denial of service (integer underflow or overflow,
  and application crash) via an ELF file with a corrupt DWARF FORM block, as
  demonstrated by nm (bsc#1083532)
- CVE-2018-8945: The bfd_section_from_shdr function in the Binary File
  Descriptor (BFD) library (aka libbfd) allowed remote attackers to cause a
  denial of service (segmentation fault) via a large attribute section
  (bsc#1086608)
- CVE-2018-7643: The display_debug_ranges function allowed remote attackers to
  cause a denial of service (integer overflow and application crash) or possibly
  have unspecified other impact via a crafted ELF file, as demonstrated by
  objdump (bsc#1086784)
- CVE-2018-7642: The swap_std_reloc_in function in the Binary File Descriptor
  (BFD) library (aka libbfd) allowed remote attackers to cause a denial of
  service (aout_32_swap_std_reloc_out NULL pointer dereference and application
  crash) via a crafted ELF file, as demonstrated by objcopy (bsc#1086786)
- CVE-2018-7568: The parse_die function in the Binary File Descriptor (BFD)
  library (aka libbfd) allowed remote attackers to cause a denial of service
  (integer overflow and application crash) via an ELF file with corrupt dwarf1
  debug information, as demonstrated by nm (bsc#1086788)
- CVE-2018-10373: concat_filename in the Binary File Descriptor (BFD) library
  (aka libbfd) allowed remote attackers to cause a denial of service (NULL
  pointer dereference and application crash) via a crafted binary file, as
  demonstrated by nm-new (bsc#1090997)
- CVE-2018-10372: process_cu_tu_index allowed remote attackers to cause a
  denial of service (heap-based buffer over-read and application crash) via a
  crafted binary file, as demonstrated by readelf (bsc#1091015)
- CVE-2018-10535: The ignore_section_sym function in the Binary File Descriptor
  (BFD) library (aka libbfd) did not validate the output_section pointer in the
  case of a symtab entry with a &amp;quot;SECTION&amp;quot; type that has a &amp;quot;0&amp;quot; value, which
  allowed remote attackers to cause a denial of service (NULL pointer dereference
  and application crash) via a crafted file, as demonstrated by objcopy
  (bsc#1091365)
- CVE-2018-10534: The _bfd_XX_bfd_copy_private_bfd_data_common function in the
  Binary File Descriptor (BFD) library (aka libbfd) processesed a negative Data
  Directory size with an unbounded loop that increased the value of
  (external_IMAGE_DEBUG_DIRECTORY) *edd so that the address exceeded its own
  memory region, resulting in an out-of-bounds memory write, as demonstrated by
  objcopy copying private info with _bfd_pex64_bfd_copy_private_bfd_data_common
  in pex64igen.c (bsc#1091368)

These non-security issues were fixed:

- The AArch64 port now supports showing disassembly notes which are emitted
  when inconsistencies are found with the instruction that may result in the
  instruction being invalid.  These can be turned on with the option -M notes
  to objdump.
- The AArch64 port now emits warnings when a combination of an instruction and
  a named register could be invalid.
- Added O modifier to ar to display member offsets inside an archive
- The ADR and ADRL pseudo-instructions supported by the ARM assembler
  now only set the bottom bit of the address of thumb function symbols
  if the -mthumb-interwork command line option is active.
- Add --generate-missing-build-notes=[yes|no] option to create (or not) GNU
  Build Attribute notes if none are present in the input sources.  Add a
  --enable-generate-build-notes=[yes|no] configure time option to set the
  default behaviour.  Set the default if the configure option is not used
  to &amp;quot;no&amp;quot;.
- Remove -mold-gcc command-line option for x86 targets.
- Add -O[2|s] command-line options to x86 assembler to enable alternate
  shorter instruction encoding.
- Add support for .nops directive.  It is currently supported only for
  x86 targets.
- Speed up direct linking with DLLs for Cygwin and Mingw targets.
- Add a configure option --enable-separate-code to decide whether
  -z separate-code should be enabled in ELF linker by default.  Default
  to yes for Linux/x86 targets.  Note that -z separate-code can increase
  disk and memory size.
- RISC-V: Fix symbol address problem with versioned symbols 
- Restore riscv64-elf cross prefix via symlinks
- Fix pacemaker libqb problem with section start/stop symbols
- RISC-V: Don't enable relaxation in relocatable link
- Prevent linking faiures on i386 with assertion (bsc#1085784)
- Fix symbol size bug when relaxation deletes bytes
- Add --debug-dump=links option to readelf and --dwarf=links option to objdump
  which displays the contents of any .gnu_debuglink or .gnu_debugaltlink
  sections.
  Add a --debug-dump=follow-links option to readelf and a --dwarf=follow-links
  option to objdump which causes indirect links into separate debug info files
  to be followed when dumping other DWARF sections.
- Add support for loaction views in DWARF debug line information.
- Add -z separate-code to generate separate code PT_LOAD segment.
- Add &amp;quot;-z undefs&amp;quot; command line option as the inverse of the &amp;quot;-z defs&amp;quot; option.
- Add -z globalaudit command line option to force audit libraries to be run
  for every dynamic object loaded by an executable - provided that the loader
  supports this functionality.
- Tighten linker script grammar around file name specifiers to prevent the use
  of SORT_BY_ALIGNMENT and SORT_BY_INIT_PRIORITY on filenames.  These would
  previously be accepted but had no effect.
- The EXCLUDE_FILE directive can now be placed within any SORT_* directive
  within input section lists.
- Fix linker relaxation with --wrap

This update was imported from the SUSE:SLE-15:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html</URL>
      <Description>E-Mail link for openSUSE-SU-2018:3323-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.0">
      <Branch Type="Product Name" Name="openSUSE Leap 15.0">
        <FullProductName ProductID="openSUSE Leap 15.0">openSUSE Leap 15.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="binutils-2.31-lp150.5.3.1">
      <FullProductName ProductID="binutils-2.31-lp150.5.3.1">binutils-2.31-lp150.5.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="binutils-devel-2.31-lp150.5.3.1">
      <FullProductName ProductID="binutils-devel-2.31-lp150.5.3.1">binutils-devel-2.31-lp150.5.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="binutils-devel-32bit-2.31-lp150.5.3.1">
      <FullProductName ProductID="binutils-devel-32bit-2.31-lp150.5.3.1">binutils-devel-32bit-2.31-lp150.5.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="binutils-gold-2.31-lp150.5.3.1">
      <FullProductName ProductID="binutils-gold-2.31-lp150.5.3.1">binutils-gold-2.31-lp150.5.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-aarch64-binutils-2.31-lp150.5.3.1">
      <FullProductName ProductID="cross-aarch64-binutils-2.31-lp150.5.3.1">cross-aarch64-binutils-2.31-lp150.5.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-arm-binutils-2.31-lp150.5.3.1">
      <FullProductName ProductID="cross-arm-binutils-2.31-lp150.5.3.1">cross-arm-binutils-2.31-lp150.5.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-avr-binutils-2.31-lp150.5.3.1">
      <FullProductName ProductID="cross-avr-binutils-2.31-lp150.5.3.1">cross-avr-binutils-2.31-lp150.5.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-epiphany-binutils-2.31-lp150.5.3.1">
      <FullProductName ProductID="cross-epiphany-binutils-2.31-lp150.5.3.1">cross-epiphany-binutils-2.31-lp150.5.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-hppa-binutils-2.31-lp150.5.3.1">
      <FullProductName ProductID="cross-hppa-binutils-2.31-lp150.5.3.1">cross-hppa-binutils-2.31-lp150.5.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-hppa64-binutils-2.31-lp150.5.3.1">
      <FullProductName ProductID="cross-hppa64-binutils-2.31-lp150.5.3.1">cross-hppa64-binutils-2.31-lp150.5.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-i386-binutils-2.31-lp150.5.3.1">
      <FullProductName ProductID="cross-i386-binutils-2.31-lp150.5.3.1">cross-i386-binutils-2.31-lp150.5.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-ia64-binutils-2.31-lp150.5.3.1">
      <FullProductName ProductID="cross-ia64-binutils-2.31-lp150.5.3.1">cross-ia64-binutils-2.31-lp150.5.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-m68k-binutils-2.31-lp150.5.3.1">
      <FullProductName ProductID="cross-m68k-binutils-2.31-lp150.5.3.1">cross-m68k-binutils-2.31-lp150.5.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-mips-binutils-2.31-lp150.5.3.1">
      <FullProductName ProductID="cross-mips-binutils-2.31-lp150.5.3.1">cross-mips-binutils-2.31-lp150.5.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-ppc-binutils-2.31-lp150.5.3.1">
      <FullProductName ProductID="cross-ppc-binutils-2.31-lp150.5.3.1">cross-ppc-binutils-2.31-lp150.5.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-ppc64-binutils-2.31-lp150.5.3.1">
      <FullProductName ProductID="cross-ppc64-binutils-2.31-lp150.5.3.1">cross-ppc64-binutils-2.31-lp150.5.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-ppc64le-binutils-2.31-lp150.5.3.1">
      <FullProductName ProductID="cross-ppc64le-binutils-2.31-lp150.5.3.1">cross-ppc64le-binutils-2.31-lp150.5.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-riscv64-binutils-2.31-lp150.5.3.1">
      <FullProductName ProductID="cross-riscv64-binutils-2.31-lp150.5.3.1">cross-riscv64-binutils-2.31-lp150.5.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-rx-binutils-2.31-lp150.5.3.1">
      <FullProductName ProductID="cross-rx-binutils-2.31-lp150.5.3.1">cross-rx-binutils-2.31-lp150.5.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-s390-binutils-2.31-lp150.5.3.1">
      <FullProductName ProductID="cross-s390-binutils-2.31-lp150.5.3.1">cross-s390-binutils-2.31-lp150.5.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-s390x-binutils-2.31-lp150.5.3.1">
      <FullProductName ProductID="cross-s390x-binutils-2.31-lp150.5.3.1">cross-s390x-binutils-2.31-lp150.5.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-sparc-binutils-2.31-lp150.5.3.1">
      <FullProductName ProductID="cross-sparc-binutils-2.31-lp150.5.3.1">cross-sparc-binutils-2.31-lp150.5.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-sparc64-binutils-2.31-lp150.5.3.1">
      <FullProductName ProductID="cross-sparc64-binutils-2.31-lp150.5.3.1">cross-sparc64-binutils-2.31-lp150.5.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cross-spu-binutils-2.31-lp150.5.3.1">
      <FullProductName ProductID="cross-spu-binutils-2.31-lp150.5.3.1">cross-spu-binutils-2.31-lp150.5.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="binutils-2.31-lp150.5.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:binutils-2.31-lp150.5.3.1">binutils-2.31-lp150.5.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="binutils-devel-2.31-lp150.5.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:binutils-devel-2.31-lp150.5.3.1">binutils-devel-2.31-lp150.5.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="binutils-devel-32bit-2.31-lp150.5.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:binutils-devel-32bit-2.31-lp150.5.3.1">binutils-devel-32bit-2.31-lp150.5.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="binutils-gold-2.31-lp150.5.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:binutils-gold-2.31-lp150.5.3.1">binutils-gold-2.31-lp150.5.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="cross-aarch64-binutils-2.31-lp150.5.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:cross-aarch64-binutils-2.31-lp150.5.3.1">cross-aarch64-binutils-2.31-lp150.5.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="cross-arm-binutils-2.31-lp150.5.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:cross-arm-binutils-2.31-lp150.5.3.1">cross-arm-binutils-2.31-lp150.5.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="cross-avr-binutils-2.31-lp150.5.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:cross-avr-binutils-2.31-lp150.5.3.1">cross-avr-binutils-2.31-lp150.5.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="cross-epiphany-binutils-2.31-lp150.5.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:cross-epiphany-binutils-2.31-lp150.5.3.1">cross-epiphany-binutils-2.31-lp150.5.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="cross-hppa-binutils-2.31-lp150.5.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:cross-hppa-binutils-2.31-lp150.5.3.1">cross-hppa-binutils-2.31-lp150.5.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="cross-hppa64-binutils-2.31-lp150.5.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:cross-hppa64-binutils-2.31-lp150.5.3.1">cross-hppa64-binutils-2.31-lp150.5.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="cross-i386-binutils-2.31-lp150.5.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:cross-i386-binutils-2.31-lp150.5.3.1">cross-i386-binutils-2.31-lp150.5.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="cross-ia64-binutils-2.31-lp150.5.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:cross-ia64-binutils-2.31-lp150.5.3.1">cross-ia64-binutils-2.31-lp150.5.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="cross-m68k-binutils-2.31-lp150.5.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:cross-m68k-binutils-2.31-lp150.5.3.1">cross-m68k-binutils-2.31-lp150.5.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="cross-mips-binutils-2.31-lp150.5.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:cross-mips-binutils-2.31-lp150.5.3.1">cross-mips-binutils-2.31-lp150.5.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="cross-ppc-binutils-2.31-lp150.5.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:cross-ppc-binutils-2.31-lp150.5.3.1">cross-ppc-binutils-2.31-lp150.5.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="cross-ppc64-binutils-2.31-lp150.5.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:cross-ppc64-binutils-2.31-lp150.5.3.1">cross-ppc64-binutils-2.31-lp150.5.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="cross-ppc64le-binutils-2.31-lp150.5.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:cross-ppc64le-binutils-2.31-lp150.5.3.1">cross-ppc64le-binutils-2.31-lp150.5.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="cross-riscv64-binutils-2.31-lp150.5.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:cross-riscv64-binutils-2.31-lp150.5.3.1">cross-riscv64-binutils-2.31-lp150.5.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="cross-rx-binutils-2.31-lp150.5.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:cross-rx-binutils-2.31-lp150.5.3.1">cross-rx-binutils-2.31-lp150.5.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="cross-s390-binutils-2.31-lp150.5.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:cross-s390-binutils-2.31-lp150.5.3.1">cross-s390-binutils-2.31-lp150.5.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="cross-s390x-binutils-2.31-lp150.5.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:cross-s390x-binutils-2.31-lp150.5.3.1">cross-s390x-binutils-2.31-lp150.5.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="cross-sparc-binutils-2.31-lp150.5.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:cross-sparc-binutils-2.31-lp150.5.3.1">cross-sparc-binutils-2.31-lp150.5.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="cross-sparc64-binutils-2.31-lp150.5.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:cross-sparc64-binutils-2.31-lp150.5.3.1">cross-sparc64-binutils-2.31-lp150.5.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="cross-spu-binutils-2.31-lp150.5.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:cross-spu-binutils-2.31-lp150.5.3.1">cross-spu-binutils-2.31-lp150.5.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, miscalculates DW_FORM_ref_addr die refs in the case of a relocatable object file, which allows remote attackers to cause a denial of service (find_abstract_instance_name invalid memory read, segmentation fault, and application crash).</Note>
    </Notes>
    <CVE>CVE-2017-15938</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-32bit-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-gold-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-aarch64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-arm-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-avr-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-epiphany-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-i386-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ia64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-m68k-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-mips-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64le-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-riscv64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-rx-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390x-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-spu-binutils-2.31-lp150.5.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-15938.html</URL>
        <Description>CVE-2017-15938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1065693</URL>
        <Description>SUSE Bug 1065693</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, mishandles NULL files in a .debug_line file table, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted ELF file, related to concat_filename. NOTE: this issue is caused by an incomplete fix for CVE-2017-15023.</Note>
    </Notes>
    <CVE>CVE-2017-15939</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-32bit-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-gold-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-aarch64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-arm-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-avr-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-epiphany-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-i386-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ia64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-m68k-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-mips-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64le-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-riscv64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-rx-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390x-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-spu-binutils-2.31-lp150.5.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-15939.html</URL>
        <Description>CVE-2017-15939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1061623</URL>
        <Description>SUSE Bug 1061623</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1065689</URL>
        <Description>SUSE Bug 1065689</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">elfcomm.c in readelf in GNU Binutils 2.29 allows remote attackers to cause a denial of service (excessive memory allocation) or possibly have unspecified other impact via a crafted ELF file that triggers a "buffer overflow on fuzzed archive header," related to an uninitialized variable, an improper conditional jump, and the get_archive_member_name, process_archive_index_and_symbols, and setup_archive functions.</Note>
    </Notes>
    <CVE>CVE-2017-15996</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-32bit-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-gold-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-aarch64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-arm-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-avr-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-epiphany-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-i386-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ia64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-m68k-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-mips-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64le-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-riscv64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-rx-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390x-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-spu-binutils-2.31-lp150.5.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-15996.html</URL>
        <Description>CVE-2017-15996</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1065643</URL>
        <Description>SUSE Bug 1065643</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The coff_slurp_line_table function in coffcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, allows remote attackers to cause a denial of service (invalid memory access and application crash) or possibly have unspecified other impact via a crafted PE file.</Note>
    </Notes>
    <CVE>CVE-2017-16826</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-32bit-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-gold-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-aarch64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-arm-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-avr-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-epiphany-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-i386-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ia64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-m68k-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-mips-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64le-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-riscv64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-rx-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390x-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-spu-binutils-2.31-lp150.5.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-16826.html</URL>
        <Description>CVE-2017-16826</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1068640</URL>
        <Description>SUSE Bug 1068640</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The aout_get_external_symbols function in aoutx.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, allows remote attackers to cause a denial of service (slurp_symtab invalid free and application crash) or possibly have unspecified other impact via a crafted ELF file.</Note>
    </Notes>
    <CVE>CVE-2017-16827</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-32bit-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-gold-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-aarch64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-arm-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-avr-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-epiphany-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-i386-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ia64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-m68k-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-mips-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64le-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-riscv64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-rx-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390x-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-spu-binutils-2.31-lp150.5.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-16827.html</URL>
        <Description>CVE-2017-16827</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1069202</URL>
        <Description>SUSE Bug 1069202</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The display_debug_frames function in dwarf.c in GNU Binutils 2.29.1 allows remote attackers to cause a denial of service (integer overflow and heap-based buffer over-read, and application crash) or possibly have unspecified other impact via a crafted ELF file, related to print_debug_frame.</Note>
    </Notes>
    <CVE>CVE-2017-16828</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-32bit-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-gold-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-aarch64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-arm-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-avr-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-epiphany-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-i386-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ia64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-m68k-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-mips-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64le-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-riscv64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-rx-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390x-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-spu-binutils-2.31-lp150.5.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-16828.html</URL>
        <Description>CVE-2017-16828</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1069176</URL>
        <Description>SUSE Bug 1069176</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The _bfd_elf_parse_gnu_properties function in elf-properties.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not prevent negative pointers, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a crafted ELF file.</Note>
    </Notes>
    <CVE>CVE-2017-16829</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-32bit-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-gold-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-aarch64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-arm-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-avr-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-epiphany-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-i386-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ia64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-m68k-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-mips-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64le-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-riscv64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-rx-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390x-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-spu-binutils-2.31-lp150.5.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-16829.html</URL>
        <Description>CVE-2017-16829</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1068950</URL>
        <Description>SUSE Bug 1068950</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The print_gnu_property_note function in readelf.c in GNU Binutils 2.29.1 does not have integer-overflow protection on 32-bit platforms, which allows remote attackers to cause a denial of service (segmentation violation and application crash) or possibly have unspecified other impact via a crafted ELF file.</Note>
    </Notes>
    <CVE>CVE-2017-16830</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-32bit-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-gold-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-aarch64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-arm-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-avr-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-epiphany-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-i386-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ia64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-m68k-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-mips-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64le-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-riscv64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-rx-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390x-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-spu-binutils-2.31-lp150.5.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-16830.html</URL>
        <Description>CVE-2017-16830</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1068888</URL>
        <Description>SUSE Bug 1068888</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not validate the symbol count, which allows remote attackers to cause a denial of service (integer overflow and application crash, or excessive memory allocation) or possibly have unspecified other impact via a crafted PE file.</Note>
    </Notes>
    <CVE>CVE-2017-16831</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-32bit-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-gold-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-aarch64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-arm-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-avr-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-epiphany-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-i386-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ia64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-m68k-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-mips-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64le-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-riscv64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-rx-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390x-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-spu-binutils-2.31-lp150.5.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-16831.html</URL>
        <Description>CVE-2017-16831</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1068887</URL>
        <Description>SUSE Bug 1068887</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The pe_bfd_read_buildid function in peicode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not validate size and offset values in the data dictionary, which allows remote attackers to cause a denial of service (segmentation violation and application crash) or possibly have unspecified other impact via a crafted PE file.</Note>
    </Notes>
    <CVE>CVE-2017-16832</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-32bit-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-gold-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-aarch64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-arm-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-avr-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-epiphany-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-i386-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ia64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-m68k-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-mips-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64le-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-riscv64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-rx-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390x-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-spu-binutils-2.31-lp150.5.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-16832.html</URL>
        <Description>CVE-2017-16832</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1068643</URL>
        <Description>SUSE Bug 1068643</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">process_cu_tu_index in dwarf.c in GNU Binutils 2.30 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted binary file, as demonstrated by readelf.</Note>
    </Notes>
    <CVE>CVE-2018-10372</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-32bit-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-gold-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-aarch64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-arm-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-avr-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-epiphany-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-i386-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ia64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-m68k-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-mips-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64le-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-riscv64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-rx-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390x-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-spu-binutils-2.31-lp150.5.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-10372.html</URL>
        <Description>CVE-2018-10372</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1091015</URL>
        <Description>SUSE Bug 1091015</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">concat_filename in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted binary file, as demonstrated by nm-new.</Note>
    </Notes>
    <CVE>CVE-2018-10373</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-32bit-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-gold-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-aarch64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-arm-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-avr-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-epiphany-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-i386-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ia64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-m68k-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-mips-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64le-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-riscv64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-rx-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390x-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-spu-binutils-2.31-lp150.5.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-10373.html</URL>
        <Description>CVE-2018-10373</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1090997</URL>
        <Description>SUSE Bug 1090997</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The _bfd_XX_bfd_copy_private_bfd_data_common function in peXXigen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, processes a negative Data Directory size with an unbounded loop that increases the value of (external_IMAGE_DEBUG_DIRECTORY) *edd so that the address exceeds its own memory region, resulting in an out-of-bounds memory write, as demonstrated by objcopy copying private info with _bfd_pex64_bfd_copy_private_bfd_data_common in pex64igen.c.</Note>
    </Notes>
    <CVE>CVE-2018-10534</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-32bit-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-gold-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-aarch64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-arm-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-avr-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-epiphany-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-i386-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ia64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-m68k-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-mips-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64le-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-riscv64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-rx-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390x-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-spu-binutils-2.31-lp150.5.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-10534.html</URL>
        <Description>CVE-2018-10534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1091368</URL>
        <Description>SUSE Bug 1091368</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ignore_section_sym function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, does not validate the output_section pointer in the case of a symtab entry with a "SECTION" type that has a "0" value, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file, as demonstrated by objcopy.</Note>
    </Notes>
    <CVE>CVE-2018-10535</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-32bit-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-gold-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-aarch64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-arm-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-avr-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-epiphany-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-i386-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ia64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-m68k-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-mips-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64le-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-riscv64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-rx-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390x-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-spu-binutils-2.31-lp150.5.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-10535.html</URL>
        <Description>CVE-2018-10535</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1091365</URL>
        <Description>SUSE Bug 1091365</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The elf_object_p function in elfcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, has an unsigned integer overflow because bfd_size_type multiplication is not used. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.</Note>
    </Notes>
    <CVE>CVE-2018-6323</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-32bit-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-gold-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-aarch64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-arm-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-avr-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-epiphany-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-i386-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ia64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-m68k-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-mips-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64le-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-riscv64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-rx-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390x-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-spu-binutils-2.31-lp150.5.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-6323.html</URL>
        <Description>CVE-2018-6323</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1077745</URL>
        <Description>SUSE Bug 1077745</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In GNU Binutils 2.30, there's an integer overflow in the function load_specific_debug_section() in objdump.c, which results in `malloc()` with 0 size. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.</Note>
    </Notes>
    <CVE>CVE-2018-6543</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-32bit-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-gold-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-aarch64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-arm-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-avr-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-epiphany-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-i386-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ia64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-m68k-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-mips-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64le-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-riscv64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-rx-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390x-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-spu-binutils-2.31-lp150.5.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-6543.html</URL>
        <Description>CVE-2018-6543</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1079103</URL>
        <Description>SUSE Bug 1079103</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The bfd_get_debug_link_info_1 function in opncls.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, has an unchecked strnlen operation. Remote attackers could leverage this vulnerability to cause a denial of service (segmentation fault) via a crafted ELF file.</Note>
    </Notes>
    <CVE>CVE-2018-6759</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-32bit-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-gold-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-aarch64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-arm-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-avr-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-epiphany-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-i386-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ia64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-m68k-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-mips-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64le-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-riscv64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-rx-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390x-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-spu-binutils-2.31-lp150.5.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-6759.html</URL>
        <Description>CVE-2018-6759</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1079741</URL>
        <Description>SUSE Bug 1079741</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The elf_parse_notes function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (out-of-bounds read and segmentation violation) via a note with a large alignment.</Note>
    </Notes>
    <CVE>CVE-2018-6872</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-32bit-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-gold-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-aarch64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-arm-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-avr-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-epiphany-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-i386-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ia64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-m68k-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-mips-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64le-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-riscv64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-rx-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390x-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-spu-binutils-2.31-lp150.5.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-6872.html</URL>
        <Description>CVE-2018-6872</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1080556</URL>
        <Description>SUSE Bug 1080556</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the coff_pointerize_aux function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, an index is not validated, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted file, as demonstrated by objcopy of a COFF object.</Note>
    </Notes>
    <CVE>CVE-2018-7208</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-32bit-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-gold-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-aarch64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-arm-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-avr-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-epiphany-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-i386-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ia64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-m68k-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-mips-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64le-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-riscv64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-rx-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390x-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-spu-binutils-2.31-lp150.5.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7208.html</URL>
        <Description>CVE-2018-7208</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1081527</URL>
        <Description>SUSE Bug 1081527</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The parse_die function in dwarf1.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer overflow and application crash) via an ELF file with corrupt dwarf1 debug information, as demonstrated by nm.</Note>
    </Notes>
    <CVE>CVE-2018-7568</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-32bit-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-gold-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-aarch64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-arm-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-avr-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-epiphany-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-i386-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ia64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-m68k-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-mips-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64le-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-riscv64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-rx-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390x-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-spu-binutils-2.31-lp150.5.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7568.html</URL>
        <Description>CVE-2018-7568</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1086788</URL>
        <Description>SUSE Bug 1086788</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer underflow or overflow, and application crash) via an ELF file with a corrupt DWARF FORM block, as demonstrated by nm.</Note>
    </Notes>
    <CVE>CVE-2018-7569</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-32bit-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-gold-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-aarch64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-arm-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-avr-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-epiphany-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-i386-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ia64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-m68k-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-mips-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64le-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-riscv64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-rx-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390x-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-spu-binutils-2.31-lp150.5.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7569.html</URL>
        <Description>CVE-2018-7569</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1083532</URL>
        <Description>SUSE Bug 1083532</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The assign_file_positions_for_non_load_sections function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an ELF file with a RELRO segment that lacks a matching LOAD segment, as demonstrated by objcopy.</Note>
    </Notes>
    <CVE>CVE-2018-7570</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-32bit-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-gold-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-aarch64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-arm-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-avr-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-epiphany-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-i386-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ia64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-m68k-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-mips-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64le-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-riscv64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-rx-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390x-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-spu-binutils-2.31-lp150.5.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7570.html</URL>
        <Description>CVE-2018-7570</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1083528</URL>
        <Description>SUSE Bug 1083528</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The swap_std_reloc_in function in aoutx.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (aout_32_swap_std_reloc_out NULL pointer dereference and application crash) via a crafted ELF file, as demonstrated by objcopy.</Note>
    </Notes>
    <CVE>CVE-2018-7642</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-32bit-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-gold-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-aarch64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-arm-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-avr-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-epiphany-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-i386-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ia64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-m68k-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-mips-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64le-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-riscv64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-rx-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390x-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-spu-binutils-2.31-lp150.5.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7642.html</URL>
        <Description>CVE-2018-7642</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1086786</URL>
        <Description>SUSE Bug 1086786</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1128518</URL>
        <Description>SUSE Bug 1128518</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The display_debug_ranges function in dwarf.c in GNU Binutils 2.30 allows remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, as demonstrated by objdump.</Note>
    </Notes>
    <CVE>CVE-2018-7643</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-32bit-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-gold-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-aarch64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-arm-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-avr-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-epiphany-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-i386-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ia64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-m68k-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-mips-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64le-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-riscv64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-rx-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390x-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-spu-binutils-2.31-lp150.5.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7643.html</URL>
        <Description>CVE-2018-7643</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1086784</URL>
        <Description>SUSE Bug 1086784</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The bfd_section_from_shdr function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (segmentation fault) via a large attribute section.</Note>
    </Notes>
    <CVE>CVE-2018-8945</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-devel-32bit-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:binutils-gold-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-aarch64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-arm-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-avr-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-epiphany-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-hppa64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-i386-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ia64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-m68k-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-mips-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-ppc64le-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-riscv64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-rx-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-s390x-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-sparc64-binutils-2.31-lp150.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:cross-spu-binutils-2.31-lp150.5.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-8945.html</URL>
        <Description>CVE-2018-8945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1086608</URL>
        <Description>SUSE Bug 1086608</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
