![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.4.2020.3060.1 |
Category: | SuSE Local Security Checks |
Title: | SUSE: Security Advisory (SUSE-SU-2020:3060-1) |
Summary: | The remote host is missing an update for the 'binutils' package(s) announced via the SUSE-SU-2020:3060-1 advisory. |
Description: | Summary: The remote host is missing an update for the 'binutils' package(s) announced via the SUSE-SU-2020:3060-1 advisory. Vulnerability Insight: This update for binutils fixes the following issues: binutils was updated to version 2.35. (jsc#ECO-2373) Update to binutils 2.35: The assembler can now produce DWARF-5 format line number tables. Readelf now has a 'lint' mode to enable extra checks of the files it is processing. Readelf will now display '[...]' when it has to truncate a symbol name. The old behaviour - of displaying as many characters as possible, up to the 80 column limit - can be restored by the use of the --silent-truncation option. The linker can now produce a dependency file listing the inputs that it has processed, much like the -M -MP option supported by the compiler. fix DT_NEEDED order with -flto [bsc#1163744] Update to binutils 2.34: The disassembler (objdump --disassemble) now has an option to generate ascii art thats show the arcs between that start and end points of control flow instructions. The binutils tools now have support for debuginfod. Debuginfod is a HTTP service for distributing ELF/DWARF debugging information as well as source code. The tools can now connect to debuginfod servers in order to download debug information about the files that they are processing. The assembler and linker now support the generation of ELF format files for the Z80 architecture. Add new subpackages for libctf and libctf-nobfd. Disable LTO due to bsc#1163333. Includes fixes for these CVEs: bsc#1153768 aka CVE-2019-17451 aka PR25070 bsc#1153770 aka CVE-2019-17450 aka PR25078 fix various build fails on aarch64 (PR25210, bsc#1157755). Update to binutils 2.33.1: Adds support for the Arm Scalable Vector Extension version 2 (SVE2) instructions, the Arm Transactional Memory Extension (TME) instructions and the Armv8.1-M Mainline and M-profile Vector Extension (MVE) instructions. Adds support for the Arm Cortex-A76AE, Cortex-A77 and Cortex-M35P processors and the AArch64 Cortex-A34, Cortex-A65, Cortex-A65AE, Cortex-A76AE, and Cortex-A77 processors. Adds a .float16 directive for both Arm and AArch64 to allow encoding of 16-bit floating point literals. For MIPS, Add -m[no-]fix-loongson3-llsc option to fix (or not) Loongson3 LLSC Errata. Add a --enable-mips-fix-loongson3-llsc=[yes time option to set the default behavior. Set the default if the configure option is not used to 'no'. The Cortex-A53 Erratum 843419 workaround now supports a choice of which workaround to use. The option --fix-cortex-a53-843419 now takes an optional argument --fix-cortex-a53-843419[=full used to force a particular workaround to be used. See --help for AArch64 for more details. Add support for GNU_PROPERTY_AARCH64_FEATURE_1_BTI and GNU_PROPERTY_AARCH64_FEATURE_1_PAC in ELF GNU program properties in the AArch64 ELF linker. Add -z force-bti for AArch64 to enable GNU_PROPERTY_AARCH64_FEATURE_1_BTI on output while warning about missing ... [Please see the references for more information on the vulnerabilities] Affected Software/OS: 'binutils' package(s) on SUSE Linux Enterprise Module for Basesystem 15-SP1, SUSE Linux Enterprise Module for Basesystem 15-SP2, SUSE Linux Enterprise Module for Development Tools 15-SP1, SUSE Linux Enterprise Module for Development Tools 15-SP2, SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP1, SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP2. Solution: Please install the updated package(s). CVSS Score: 6.8 CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2019-12972 BugTraq ID: 108903 http://www.securityfocus.com/bid/108903 https://security.gentoo.org/glsa/202007-39 https://sourceware.org/bugzilla/show_bug.cgi?id=24689 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=890f750a3b053532a4b839a2dd6243076de12031 SuSE Security Announcement: openSUSE-SU-2020:1790 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html SuSE Security Announcement: openSUSE-SU-2020:1804 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html https://usn.ubuntu.com/4336-1/ Common Vulnerability Exposure (CVE) ID: CVE-2019-14250 BugTraq ID: 109354 http://www.securityfocus.com/bid/109354 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924 https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html SuSE Security Announcement: openSUSE-SU-2019:2364 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html SuSE Security Announcement: openSUSE-SU-2019:2365 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html SuSE Security Announcement: openSUSE-SU-2020:0716 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html https://usn.ubuntu.com/4326-1/ Common Vulnerability Exposure (CVE) ID: CVE-2019-14444 https://sourceware.org/bugzilla/show_bug.cgi?id=24829 Common Vulnerability Exposure (CVE) ID: CVE-2019-17450 https://sourceware.org/bugzilla/show_bug.cgi?id=25078 Common Vulnerability Exposure (CVE) ID: CVE-2019-17451 https://sourceware.org/bugzilla/show_bug.cgi?id=25070 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=336bfbeb1848f4b9558456fdcf283ee8a32d7fd1 Common Vulnerability Exposure (CVE) ID: CVE-2019-9074 https://security.gentoo.org/glsa/202107-24 https://sourceware.org/bugzilla/show_bug.cgi?id=24235 Common Vulnerability Exposure (CVE) ID: CVE-2019-9075 https://sourceware.org/bugzilla/show_bug.cgi?id=24236 Common Vulnerability Exposure (CVE) ID: CVE-2019-9077 BugTraq ID: 107139 http://www.securityfocus.com/bid/107139 https://sourceware.org/bugzilla/show_bug.cgi?id=24243 |
Copyright | Copyright (C) 2021 Greenbone AG |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |