Risk | High |
Patch available | YES |
Number of vulnerabilities | 13 |
CVE-ID | CVE-2020-16590 CVE-2020-16591 CVE-2020-16592 CVE-2020-16593 CVE-2020-16599 CVE-2020-35448 CVE-2020-35493 CVE-2020-35496 CVE-2020-35507 CVE-2021-20197 CVE-2021-20284 CVE-2021-20294 CVE-2021-3487 |
CWE-ID | CWE-415 CWE-125 CWE-416 CWE-476 CWE-787 CWE-20 CWE-61 CWE-122 |
Exploitation vector | Network |
Public exploit | Public exploit code for vulnerability #12 is available. |
Vulnerable software |
SUSE Linux Enterprise Server for SAP Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing Operating systems & Components / Operating system SUSE Linux Enterprise Server Operating systems & Components / Operating system binutils-devel-32bit Operating systems & Components / Operating system package or component libctf0-debuginfo Operating systems & Components / Operating system package or component libctf0 Operating systems & Components / Operating system package or component libctf-nobfd0-debuginfo Operating systems & Components / Operating system package or component libctf-nobfd0 Operating systems & Components / Operating system package or component binutils-devel Operating systems & Components / Operating system package or component binutils-debugsource Operating systems & Components / Operating system package or component binutils-debuginfo Operating systems & Components / Operating system package or component binutils Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 13 vulnerabilities.
EUVDB-ID: #VU79341
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-16590
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to perform a denial of service attack.
The vulnerability exists due to a boundary error in the Binary File Descriptor (BFD) (aka libbrd) in GNU Binutils in the process_symbol_table. A local attacker can trick the victim into opening a specially crafted data, trigger double free error and perform a denial of service attack.
MitigationUpdate the affected package binutils to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server for SAP: 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-LTSS - 15-ESPOS
SUSE Linux Enterprise Server: 15-LTSS
binutils-devel-32bit: before 2.37-6.23.1
libctf0-debuginfo: before 2.37-6.23.1
libctf0: before 2.37-6.23.1
libctf-nobfd0-debuginfo: before 2.37-6.23.1
libctf-nobfd0: before 2.37-6.23.1
binutils-devel: before 2.37-6.23.1
binutils-debugsource: before 2.37-6.23.1
binutils-debuginfo: before 2.37-6.23.1
binutils: before 2.37-6.23.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20220934-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU79342
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-16591
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to perform a denial of service attack.
The vulnerability exists due to invalid read in process_symbol_table. A local attacker can trick the victim into opening a specially crafted data, trigger out-of-bounds read and perform a denial of service attack.
MitigationUpdate the affected package binutils to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server for SAP: 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-LTSS - 15-ESPOS
SUSE Linux Enterprise Server: 15-LTSS
binutils-devel-32bit: before 2.37-6.23.1
libctf0-debuginfo: before 2.37-6.23.1
libctf0: before 2.37-6.23.1
libctf-nobfd0-debuginfo: before 2.37-6.23.1
libctf-nobfd0: before 2.37-6.23.1
binutils-devel: before 2.37-6.23.1
binutils-debugsource: before 2.37-6.23.1
binutils-debuginfo: before 2.37-6.23.1
binutils: before 2.37-6.23.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20220934-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU79345
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-16592
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to perform a denial of service attack.
The vulnerability exists in bfd_hash_lookup. A local attacker can trick the victim into opening a specially crafted data, trigger use-after-free and perform a denial of service attack.
Update the affected package binutils to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server for SAP: 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-LTSS - 15-ESPOS
SUSE Linux Enterprise Server: 15-LTSS
binutils-devel-32bit: before 2.37-6.23.1
libctf0-debuginfo: before 2.37-6.23.1
libctf0: before 2.37-6.23.1
libctf-nobfd0-debuginfo: before 2.37-6.23.1
libctf-nobfd0: before 2.37-6.23.1
binutils-devel: before 2.37-6.23.1
binutils-debugsource: before 2.37-6.23.1
binutils-debuginfo: before 2.37-6.23.1
binutils: before 2.37-6.23.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20220934-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU79346
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-16593
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in scan_unit_for_symbols. A local attacker can trick the victim into opening a specially crafted data and perform a denial of service (DoS) attack.
MitigationUpdate the affected package binutils to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server for SAP: 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-LTSS - 15-ESPOS
SUSE Linux Enterprise Server: 15-LTSS
binutils-devel-32bit: before 2.37-6.23.1
libctf0-debuginfo: before 2.37-6.23.1
libctf0: before 2.37-6.23.1
libctf-nobfd0-debuginfo: before 2.37-6.23.1
libctf-nobfd0: before 2.37-6.23.1
binutils-devel: before 2.37-6.23.1
binutils-debugsource: before 2.37-6.23.1
binutils-debuginfo: before 2.37-6.23.1
binutils: before 2.37-6.23.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20220934-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU79354
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-16599
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in _bfd_elf_get_symbol_version_string. A local attacker can trick the victim into opening a specially crafted file and perform a denial of service (DoS) attack.
MitigationUpdate the affected package binutils to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server for SAP: 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-LTSS - 15-ESPOS
SUSE Linux Enterprise Server: 15-LTSS
binutils-devel-32bit: before 2.37-6.23.1
libctf0-debuginfo: before 2.37-6.23.1
libctf0: before 2.37-6.23.1
libctf-nobfd0-debuginfo: before 2.37-6.23.1
libctf-nobfd0: before 2.37-6.23.1
binutils-devel: before 2.37-6.23.1
binutils-debugsource: before 2.37-6.23.1
binutils-debuginfo: before 2.37-6.23.1
binutils: before 2.37-6.23.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20220934-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU50123
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2020-35448
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.35.1. A heap-based buffer over-read can occur in bfd_getl_signed_32 in libbfd.c because sh_entsize is not validated in _bfd_elf_slurp_secondary_reloc_section in elf.c.
MitigationUpdate the affected package binutils to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server for SAP: 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-LTSS - 15-ESPOS
SUSE Linux Enterprise Server: 15-LTSS
binutils-devel-32bit: before 2.37-6.23.1
libctf0-debuginfo: before 2.37-6.23.1
libctf0: before 2.37-6.23.1
libctf-nobfd0-debuginfo: before 2.37-6.23.1
libctf-nobfd0: before 2.37-6.23.1
binutils-devel: before 2.37-6.23.1
binutils-debugsource: before 2.37-6.23.1
binutils-debuginfo: before 2.37-6.23.1
binutils: before 2.37-6.23.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20220934-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU79353
Risk: Low
CVSSv4.0: 4.6 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-35493
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to perform a denial of service attack.
The vulnerability exists in bfd/pef.c. A local attacker can send a specially crafted PEF file and perform a denial of service attack.
Update the affected package binutils to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server for SAP: 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-LTSS - 15-ESPOS
SUSE Linux Enterprise Server: 15-LTSS
binutils-devel-32bit: before 2.37-6.23.1
libctf0-debuginfo: before 2.37-6.23.1
libctf0: before 2.37-6.23.1
libctf-nobfd0-debuginfo: before 2.37-6.23.1
libctf-nobfd0: before 2.37-6.23.1
binutils-devel: before 2.37-6.23.1
binutils-debugsource: before 2.37-6.23.1
binutils-debuginfo: before 2.37-6.23.1
binutils: before 2.37-6.23.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20220934-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU79356
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-35496
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to perform a denial of service (DoS) attack.
The vulnerability exists in bfd_pef_scan_start_address() of bfd/pef.c in binutils. A local attacker can trick the victim into opening a specially crafted data and perform a denial of service (DoS) attack.
Update the affected package binutils to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server for SAP: 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-LTSS - 15-ESPOS
SUSE Linux Enterprise Server: 15-LTSS
binutils-devel-32bit: before 2.37-6.23.1
libctf0-debuginfo: before 2.37-6.23.1
libctf0: before 2.37-6.23.1
libctf-nobfd0-debuginfo: before 2.37-6.23.1
libctf-nobfd0: before 2.37-6.23.1
binutils-devel: before 2.37-6.23.1
binutils-debugsource: before 2.37-6.23.1
binutils-debuginfo: before 2.37-6.23.1
binutils: before 2.37-6.23.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20220934-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU79355
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-35507
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to perform a denial of service (DoS) attack.
The vulnerability exists in bfd_pef_parse_function_stubs of bfd/pef.c in binutils. A local attacker can trick the victim into opening a specially crafted data and perform a denial of service (DoS) attack.
MitigationUpdate the affected package binutils to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server for SAP: 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-LTSS - 15-ESPOS
SUSE Linux Enterprise Server: 15-LTSS
binutils-devel-32bit: before 2.37-6.23.1
libctf0-debuginfo: before 2.37-6.23.1
libctf0: before 2.37-6.23.1
libctf-nobfd0-debuginfo: before 2.37-6.23.1
libctf-nobfd0: before 2.37-6.23.1
binutils-devel: before 2.37-6.23.1
binutils-debugsource: before 2.37-6.23.1
binutils-debuginfo: before 2.37-6.23.1
binutils: before 2.37-6.23.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20220934-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU66492
Risk: Low
CVSSv4.0: 5.8 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-20197
CWE-ID:
CWE-61 - UNIX Symbolic Link (Symlink) Following
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a symlink following issue within the ar, objcopy, strip, ranlib utilities wen writing output. A local user can create a specially crafted symbolic link to a critical file on the system and overwrite it with privileges of the application.
Successful exploitation of this vulnerability may result in privilege escalation.
MitigationUpdate the affected package binutils to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server for SAP: 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-LTSS - 15-ESPOS
SUSE Linux Enterprise Server: 15-LTSS
binutils-devel-32bit: before 2.37-6.23.1
libctf0-debuginfo: before 2.37-6.23.1
libctf0: before 2.37-6.23.1
libctf-nobfd0-debuginfo: before 2.37-6.23.1
libctf-nobfd0: before 2.37-6.23.1
binutils-devel: before 2.37-6.23.1
binutils-debugsource: before 2.37-6.23.1
binutils-debuginfo: before 2.37-6.23.1
binutils: before 2.37-6.23.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20220934-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU66493
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2021-20284
CWE-ID:
CWE-122 - Heap-based Buffer Overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the _bfd_elf_slurp_secondary_reloc_section() function in elf.c. A remote attacker can pass specially crafted data to the application, trigger a heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationUpdate the affected package binutils to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server for SAP: 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-LTSS - 15-ESPOS
SUSE Linux Enterprise Server: 15-LTSS
binutils-devel-32bit: before 2.37-6.23.1
libctf0-debuginfo: before 2.37-6.23.1
libctf0: before 2.37-6.23.1
libctf-nobfd0-debuginfo: before 2.37-6.23.1
libctf-nobfd0: before 2.37-6.23.1
binutils-devel: before 2.37-6.23.1
binutils-debugsource: before 2.37-6.23.1
binutils-debuginfo: before 2.37-6.23.1
binutils: before 2.37-6.23.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20220934-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU66491
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID: CVE-2021-20294
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing untrusted input in readelf. A remote attacker can create a specially crafted file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.
MitigationUpdate the affected package binutils to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server for SAP: 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-LTSS - 15-ESPOS
SUSE Linux Enterprise Server: 15-LTSS
binutils-devel-32bit: before 2.37-6.23.1
libctf0-debuginfo: before 2.37-6.23.1
libctf0: before 2.37-6.23.1
libctf-nobfd0-debuginfo: before 2.37-6.23.1
libctf-nobfd0: before 2.37-6.23.1
binutils-devel: before 2.37-6.23.1
binutils-debugsource: before 2.37-6.23.1
binutils-debuginfo: before 2.37-6.23.1
binutils: before 2.37-6.23.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20220934-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU61550
Risk: Medium
CVSSv4.0: 4.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2021-3487
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input within the BFD library in binutils. A remote attacker who supplies a crafted file to an application linked with BFD can use the DWARF functionality to perform a denial of service (DoS) attack.
MitigationUpdate the affected package binutils to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server for SAP: 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-LTSS - 15-ESPOS
SUSE Linux Enterprise Server: 15-LTSS
binutils-devel-32bit: before 2.37-6.23.1
libctf0-debuginfo: before 2.37-6.23.1
libctf0: before 2.37-6.23.1
libctf-nobfd0-debuginfo: before 2.37-6.23.1
libctf-nobfd0: before 2.37-6.23.1
binutils-devel: before 2.37-6.23.1
binutils-debugsource: before 2.37-6.23.1
binutils-debuginfo: before 2.37-6.23.1
binutils: before 2.37-6.23.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20220934-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.