<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">binutils-2.40-3.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:12816-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">binutils-2.40-3.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the binutils-2.40-3.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-12816</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-0687/</URL>
      <Description>SUSE CVE CVE-2023-0687 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-25585/</URL>
      <Description>SUSE CVE CVE-2023-25585 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-25587/</URL>
      <Description>SUSE CVE CVE-2023-25587 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-25588/</URL>
      <Description>SUSE CVE CVE-2023-25588 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="binutils-2.40-3.1">
      <FullProductName ProductID="binutils-2.40-3.1">binutils-2.40-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="binutils-devel-2.40-3.1">
      <FullProductName ProductID="binutils-devel-2.40-3.1">binutils-devel-2.40-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="binutils-devel-32bit-2.40-3.1">
      <FullProductName ProductID="binutils-devel-32bit-2.40-3.1">binutils-devel-32bit-2.40-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="binutils-gold-2.40-3.1">
      <FullProductName ProductID="binutils-gold-2.40-3.1">binutils-gold-2.40-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gprofng-2.40-3.1">
      <FullProductName ProductID="gprofng-2.40-3.1">gprofng-2.40-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libctf-nobfd0-2.40-3.1">
      <FullProductName ProductID="libctf-nobfd0-2.40-3.1">libctf-nobfd0-2.40-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libctf0-2.40-3.1">
      <FullProductName ProductID="libctf0-2.40-3.1">libctf0-2.40-3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="binutils-2.40-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:binutils-2.40-3.1">binutils-2.40-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="binutils-devel-2.40-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:binutils-devel-2.40-3.1">binutils-devel-2.40-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="binutils-devel-32bit-2.40-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:binutils-devel-32bit-2.40-3.1">binutils-devel-32bit-2.40-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="binutils-gold-2.40-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:binutils-gold-2.40-3.1">binutils-gold-2.40-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="gprofng-2.40-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:gprofng-2.40-3.1">gprofng-2.40-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libctf-nobfd0-2.40-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libctf-nobfd0-2.40-3.1">libctf-nobfd0-2.40-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libctf0-2.40-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libctf0-2.40-3.1">libctf0-2.40-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** DISPUTED ** A vulnerability was found in GNU C Library 2.38. It has been declared as critical. This vulnerability affects the function __monstartup of the file gmon.c of the component Call Graph Monitor. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. VDB-220246 is the identifier assigned to this vulnerability. NOTE: The real existence of this vulnerability is still doubted at the moment. The inputs that induce this vulnerability are basically addresses of the running application that is built with gmon enabled. It's basically trusted input or input that needs an actual security flaw to be compromised or controlled.</Note>
    </Notes>
    <CVE>CVE-2023-0687</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:binutils-2.40-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:binutils-devel-2.40-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:binutils-devel-32bit-2.40-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:binutils-gold-2.40-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gprofng-2.40-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libctf-nobfd0-2.40-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libctf0-2.40-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:A/AC:H/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-0687.html</URL>
        <Description>CVE-2023-0687</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1207975</URL>
        <Description>SUSE Bug 1207975</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in Binutils. The use of an uninitialized field in the struct module *module may lead to application crash and local denial of service.</Note>
    </Notes>
    <CVE>CVE-2023-25585</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:binutils-2.40-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:binutils-devel-2.40-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:binutils-devel-32bit-2.40-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:binutils-gold-2.40-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gprofng-2.40-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libctf-nobfd0-2.40-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libctf0-2.40-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-25585.html</URL>
        <Description>CVE-2023-25585</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1208040</URL>
        <Description>SUSE Bug 1208040</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.</Note>
    </Notes>
    <CVE>CVE-2023-25587</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:binutils-2.40-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:binutils-devel-2.40-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:binutils-devel-32bit-2.40-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:binutils-gold-2.40-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gprofng-2.40-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libctf-nobfd0-2.40-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libctf0-2.40-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-25587.html</URL>
        <Description>CVE-2023-25587</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1208038</URL>
        <Description>SUSE Bug 1208038</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in Binutils. The field `the_bfd` of `asymbol`struct is uninitialized in the `bfd_mach_o_get_synthetic_symtab` function, which may lead to an application crash and local denial of service.</Note>
    </Notes>
    <CVE>CVE-2023-25588</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:binutils-2.40-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:binutils-devel-2.40-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:binutils-devel-32bit-2.40-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:binutils-gold-2.40-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gprofng-2.40-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libctf-nobfd0-2.40-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libctf0-2.40-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-25588.html</URL>
        <Description>CVE-2023-25588</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1208037</URL>
        <Description>SUSE Bug 1208037</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
