Bugzilla – Bug 1121035
VUL-1: CVE-2018-20623: binutils: use-after-free in the error function in elfcomm.c
Last modified: 2020-06-08 23:25:38 UTC
CVE-2018-20623 In GNU Binutils 2.31.1, there is a use-after-free in the error function in elfcomm.c when called from the process_archive function in readelf.c via a crafted ELF file. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-20623 http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-20623.html http://www.securityfocus.com/bid/106370 https://sourceware.org/bugzilla/show_bug.cgi?id=24049
This is an autogenerated message for OBS integration: This bug (1121035) was mentioned in https://build.opensuse.org/request/show/729929 Factory / binutils
SUSE-SU-2019:2650-1: An update that solves 17 vulnerabilities and has three fixes is now available. Category: security (moderate) Bug References: 1109412,1109413,1109414,1111996,1112534,1112535,1113247,1113252,1113255,1116827,1118830,1118831,1120640,1121034,1121035,1121056,1133131,1133232,1141913,1142772 CVE References: CVE-2018-1000876,CVE-2018-17358,CVE-2018-17359,CVE-2018-17360,CVE-2018-17985,CVE-2018-18309,CVE-2018-18483,CVE-2018-18484,CVE-2018-18605,CVE-2018-18606,CVE-2018-18607,CVE-2018-19931,CVE-2018-19932,CVE-2018-20623,CVE-2018-20651,CVE-2018-20671,CVE-2019-1010180 Sources used: SUSE OpenStack Cloud Crowbar 8 (src): binutils-2.32-9.33.1 SUSE OpenStack Cloud 8 (src): binutils-2.32-9.33.1 SUSE OpenStack Cloud 7 (src): binutils-2.32-9.33.1 SUSE Linux Enterprise Software Development Kit 12-SP5 (src): binutils-2.32-9.33.1, cross-ppc-binutils-2.32-9.33.1, cross-spu-binutils-2.32-9.33.1 SUSE Linux Enterprise Software Development Kit 12-SP4 (src): binutils-2.32-9.33.1, cross-ppc-binutils-2.32-9.33.1, cross-spu-binutils-2.32-9.33.1 SUSE Linux Enterprise Server for SAP 12-SP3 (src): binutils-2.32-9.33.1 SUSE Linux Enterprise Server for SAP 12-SP2 (src): binutils-2.32-9.33.1 SUSE Linux Enterprise Server for SAP 12-SP1 (src): binutils-2.32-9.33.1 SUSE Linux Enterprise Server 12-SP5 (src): binutils-2.32-9.33.1 SUSE Linux Enterprise Server 12-SP4 (src): binutils-2.32-9.33.1 SUSE Linux Enterprise Server 12-SP3-LTSS (src): binutils-2.32-9.33.1 SUSE Linux Enterprise Server 12-SP3-BCL (src): binutils-2.32-9.33.1 SUSE Linux Enterprise Server 12-SP2-LTSS (src): binutils-2.32-9.33.1 SUSE Linux Enterprise Server 12-SP2-BCL (src): binutils-2.32-9.33.1 SUSE Linux Enterprise Server 12-SP1-LTSS (src): binutils-2.32-9.33.1 SUSE Linux Enterprise Desktop 12-SP5 (src): binutils-2.32-9.33.1 SUSE Linux Enterprise Desktop 12-SP4 (src): binutils-2.32-9.33.1 SUSE Enterprise Storage 5 (src): binutils-2.32-9.33.1 SUSE Enterprise Storage 4 (src): binutils-2.32-9.33.1 HPE Helion Openstack 8 (src): binutils-2.32-9.33.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2019:2779-1: An update that fixes 28 vulnerabilities is now available. Category: security (moderate) Bug References: 1109412,1109413,1109414,1111996,1112534,1112535,1113247,1113252,1113255,1116827,1118644,1118830,1118831,1120640,1121034,1121035,1121056,1133131,1133232,1141913,1142772,1152590,1154016,1154025 CVE References: CVE-2018-1000876,CVE-2018-17358,CVE-2018-17359,CVE-2018-17360,CVE-2018-17985,CVE-2018-18309,CVE-2018-18483,CVE-2018-18484,CVE-2018-18605,CVE-2018-18606,CVE-2018-18607,CVE-2018-19931,CVE-2018-19932,CVE-2018-20623,CVE-2018-20651,CVE-2018-20671,CVE-2018-6323,CVE-2018-6543,CVE-2018-6759,CVE-2018-6872,CVE-2018-7208,CVE-2018-7568,CVE-2018-7569,CVE-2018-7570,CVE-2018-7642,CVE-2018-7643,CVE-2018-8945,CVE-2019-1010180 Sources used: SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP1 (src): binutils-2.32-7.5.1 SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1 (src): binutils-2.32-7.5.1, cross-aarch64-binutils-2.32-7.5.1, cross-arm-binutils-2.32-7.5.1, cross-avr-binutils-2.32-7.5.1, cross-epiphany-binutils-2.32-7.5.1, cross-hppa-binutils-2.32-7.5.1, cross-hppa64-binutils-2.32-7.5.1, cross-i386-binutils-2.32-7.5.1, cross-ia64-binutils-2.32-7.5.1, cross-m68k-binutils-2.32-7.5.1, cross-mips-binutils-2.32-7.5.1, cross-ppc-binutils-2.32-7.5.1, cross-ppc64-binutils-2.32-7.5.1, cross-ppc64le-binutils-2.32-7.5.1, cross-riscv64-binutils-2.32-7.5.1, cross-rx-binutils-2.32-7.5.1, cross-s390-binutils-2.32-7.5.1, cross-s390x-binutils-2.32-7.5.1, cross-sparc-binutils-2.32-7.5.1, cross-sparc64-binutils-2.32-7.5.1, cross-spu-binutils-2.32-7.5.1, cross-x86_64-binutils-2.32-7.5.1 SUSE Linux Enterprise Module for Development Tools 15-SP1 (src): binutils-2.32-7.5.1 SUSE Linux Enterprise Module for Basesystem 15-SP1 (src): binutils-2.32-7.5.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2019:2780-1: An update that fixes 28 vulnerabilities is now available. Category: security (moderate) Bug References: 1109412,1109413,1109414,1111996,1112534,1112535,1113247,1113252,1113255,1116827,1118644,1118830,1118831,1120640,1121034,1121035,1121056,1133131,1133232,1141913,1142772,1152590,1154016,1154025 CVE References: CVE-2018-1000876,CVE-2018-17358,CVE-2018-17359,CVE-2018-17360,CVE-2018-17985,CVE-2018-18309,CVE-2018-18483,CVE-2018-18484,CVE-2018-18605,CVE-2018-18606,CVE-2018-18607,CVE-2018-19931,CVE-2018-19932,CVE-2018-20623,CVE-2018-20651,CVE-2018-20671,CVE-2018-6323,CVE-2018-6543,CVE-2018-6759,CVE-2018-6872,CVE-2018-7208,CVE-2018-7568,CVE-2018-7569,CVE-2018-7570,CVE-2018-7642,CVE-2018-7643,CVE-2018-8945,CVE-2019-1010180 Sources used: SUSE Linux Enterprise Module for Packagehub Subpackages 15 (src): binutils-2.32-6.8.1 SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 (src): binutils-2.32-6.8.1, cross-arm-binutils-2.32-6.8.1, cross-avr-binutils-2.32-6.8.1, cross-epiphany-binutils-2.32-6.8.1, cross-hppa-binutils-2.32-6.8.1, cross-hppa64-binutils-2.32-6.8.1, cross-i386-binutils-2.32-6.8.1, cross-ia64-binutils-2.32-6.8.1, cross-m68k-binutils-2.32-6.8.1, cross-mips-binutils-2.32-6.8.1, cross-ppc-binutils-2.32-6.8.1, cross-ppc64-binutils-2.32-6.8.1, cross-riscv64-binutils-2.32-6.8.1, cross-rx-binutils-2.32-6.8.1, cross-s390-binutils-2.32-6.8.1, cross-sparc-binutils-2.32-6.8.1, cross-sparc64-binutils-2.32-6.8.1, cross-spu-binutils-2.32-6.8.1 SUSE Linux Enterprise Module for Development Tools 15 (src): binutils-2.32-6.8.1 SUSE Linux Enterprise Module for Basesystem 15 (src): binutils-2.32-6.8.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
openSUSE-SU-2019:2415-1: An update that fixes 28 vulnerabilities is now available. Category: security (moderate) Bug References: 1109412,1109413,1109414,1111996,1112534,1112535,1113247,1113252,1113255,1116827,1118644,1118830,1118831,1120640,1121034,1121035,1121056,1133131,1133232,1141913,1142772,1152590,1154016,1154025 CVE References: CVE-2018-1000876,CVE-2018-17358,CVE-2018-17359,CVE-2018-17360,CVE-2018-17985,CVE-2018-18309,CVE-2018-18483,CVE-2018-18484,CVE-2018-18605,CVE-2018-18606,CVE-2018-18607,CVE-2018-19931,CVE-2018-19932,CVE-2018-20623,CVE-2018-20651,CVE-2018-20671,CVE-2018-6323,CVE-2018-6543,CVE-2018-6759,CVE-2018-6872,CVE-2018-7208,CVE-2018-7568,CVE-2018-7569,CVE-2018-7570,CVE-2018-7642,CVE-2018-7643,CVE-2018-8945,CVE-2019-1010180 Sources used: openSUSE Leap 15.0 (src): binutils-2.32-lp150.10.1
openSUSE-SU-2019:2432-1: An update that fixes 28 vulnerabilities is now available. Category: security (moderate) Bug References: 1109412,1109413,1109414,1111996,1112534,1112535,1113247,1113252,1113255,1116827,1118644,1118830,1118831,1120640,1121034,1121035,1121056,1133131,1133232,1141913,1142772,1152590,1154016,1154025 CVE References: CVE-2018-1000876,CVE-2018-17358,CVE-2018-17359,CVE-2018-17360,CVE-2018-17985,CVE-2018-18309,CVE-2018-18483,CVE-2018-18484,CVE-2018-18605,CVE-2018-18606,CVE-2018-18607,CVE-2018-19931,CVE-2018-19932,CVE-2018-20623,CVE-2018-20651,CVE-2018-20671,CVE-2018-6323,CVE-2018-6543,CVE-2018-6759,CVE-2018-6872,CVE-2018-7208,CVE-2018-7568,CVE-2018-7569,CVE-2018-7570,CVE-2018-7642,CVE-2018-7643,CVE-2018-8945,CVE-2019-1010180 Sources used: openSUSE Leap 15.1 (src): binutils-2.32-lp151.3.3.1, cross-aarch64-binutils-2.32-lp151.3.3.1, cross-arm-binutils-2.32-lp151.3.3.1, cross-avr-binutils-2.32-lp151.3.3.1, cross-epiphany-binutils-2.32-lp151.3.3.1, cross-hppa-binutils-2.32-lp151.3.3.1, cross-hppa64-binutils-2.32-lp151.3.3.1, cross-i386-binutils-2.32-lp151.3.3.1, cross-ia64-binutils-2.32-lp151.3.3.1, cross-m68k-binutils-2.32-lp151.3.3.1, cross-mips-binutils-2.32-lp151.3.3.1, cross-ppc-binutils-2.32-lp151.3.3.1, cross-ppc64-binutils-2.32-lp151.3.3.1, cross-ppc64le-binutils-2.32-lp151.3.3.1, cross-riscv64-binutils-2.32-lp151.3.3.1, cross-rx-binutils-2.32-lp151.3.3.1, cross-s390-binutils-2.32-lp151.3.3.1, cross-s390x-binutils-2.32-lp151.3.3.1, cross-sparc-binutils-2.32-lp151.3.3.1, cross-sparc64-binutils-2.32-lp151.3.3.1, cross-spu-binutils-2.32-lp151.3.3.1