SUSE-SU-2023:3695-1: important: Security update for binutils

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Wed Sep 20 08:30:08 UTC 2023



# Security update for binutils

Announcement ID: SUSE-SU-2023:3695-1  
Rating: important  
References:

  * #1200962
  * #1206080
  * #1206556
  * #1208037
  * #1208038
  * #1208040
  * #1208409
  * #1209642
  * #1210297
  * #1210733
  * #1213282
  * #1213458
  * #1214565
  * #1214567
  * #1214579
  * #1214580
  * #1214604
  * #1214611
  * #1214619
  * #1214620
  * #1214623
  * #1214624
  * #1214625
  * PED-1435
  * PED-5778

  
Cross-References:

  * CVE-2020-19726
  * CVE-2021-32256
  * CVE-2022-35205
  * CVE-2022-35206
  * CVE-2022-4285
  * CVE-2022-44840
  * CVE-2022-45703
  * CVE-2022-47673
  * CVE-2022-47695
  * CVE-2022-47696
  * CVE-2022-48063
  * CVE-2022-48064
  * CVE-2022-48065
  * CVE-2023-0687
  * CVE-2023-1579
  * CVE-2023-1972
  * CVE-2023-2222
  * CVE-2023-25585
  * CVE-2023-25587
  * CVE-2023-25588

  
CVSS scores:

  * CVE-2020-19726 ( NVD ):  8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  * CVE-2021-32256 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
  * CVE-2021-32256 ( NVD ):  6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2022-35205 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
  * CVE-2022-35205 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2022-35206 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2022-4285 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2022-4285 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2022-44840 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  * CVE-2022-45703 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  * CVE-2022-47673 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  * CVE-2022-47695 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  * CVE-2022-47696 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  * CVE-2022-48063 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2022-48064 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
  * CVE-2022-48064 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2022-48065 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2023-0687 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N
  * CVE-2023-0687 ( NVD ):  9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-0687 ( NVD ):  4.6 CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2023-1579 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
  * CVE-2023-1579 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  * CVE-2023-1972 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
  * CVE-2023-1972 ( NVD ):  6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2023-2222 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
  * CVE-2023-25585 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
  * CVE-2023-25585 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2023-25587 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
  * CVE-2023-25588 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
  * CVE-2023-25588 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H

  
Affected Products:

  * SUSE Linux Enterprise High Performance Computing 12 SP5
  * SUSE Linux Enterprise Server 12 SP5
  * SUSE Linux Enterprise Server for SAP Applications 12 SP5
  * SUSE Linux Enterprise Software Development Kit 12 SP5

  
  
An update that solves 20 vulnerabilities, contains two features and has three
security fixes can now be installed.

## Description:

This update for binutils fixes the following issues:

Update to version 2.41 [jsc#PED-5778]:

  * The MIPS port now supports the Sony Interactive Entertainment Allegrex
    processor, used with the PlayStation Portable, which implements the MIPS II
    ISA along with a single-precision FPU and a few implementation-specific
    integer instructions.
  * Objdump's --private option can now be used on PE format files to display the
    fields in the file header and section headers.
  * New versioned release of libsframe: libsframe.so.1. This release introduces
    versioned symbols with version node name LIBSFRAME_1.0. This release also
    updates the ABI in an incompatible way: this includes removal of
    sframe_get_funcdesc_with_addr API, change in the behavior of
    sframe_fre_get_ra_offset and sframe_fre_get_fp_offset APIs.
  * SFrame Version 2 is now the default (and only) format version supported by
    gas, ld, readelf and objdump.
  * Add command-line option, --strip-section-headers, to objcopy and strip to
    remove ELF section header from ELF file.
  * The RISC-V port now supports the following new standard extensions:

  * Zicond (conditional zero instructions)

  * Zfa (additional floating-point instructions)
  * Zvbb, Zvbc, Zvkg, Zvkned, Zvknh[ab], Zvksed, Zvksh, Zvkn, Zvknc, Zvkng,
    Zvks, Zvksc, Zvkg, Zvkt (vector crypto instructions)

  * The RISC-V port now supports the following vendor-defined extensions:

  * XVentanaCondOps

  * Add support for Intel FRED, LKGS and AMX-COMPLEX instructions.

  * A new .insn directive is recognized by x86 gas.
  * Add SME2 support to the AArch64 port.
  * The linker now accepts a command line option of --remap-inputs
    <PATTERN>=<FILE> to relace any input file that matches <PATTERN> with
    <FILE>. In addition the option --remap-inputs-file=<FILE> can be used to
    specify a file containing any number of these remapping directives.
  * The linker command line option --print-map-locals can be used to include
    local symbols in a linker map. (ELF targets only).
  * For most ELF based targets, if the --enable-linker-version option is used
    then the version of the linker will be inserted as a string into the
    .comment section.
  * The linker script syntax has a new command for output sections: ASCIZ
    "string" This will insert a zero-terminated string at the current location.
  * Add command-line option, -z nosectionheader, to omit ELF section header.

  * Contains fixes for these non-CVEs (not security bugs per upstreams
    SECURITY.md):

  * bsc#1209642 aka CVE-2023-1579 aka PR29988

  * bsc#1210297 aka CVE-2023-1972 aka PR30285
  * bsc#1210733 aka CVE-2023-2222 aka PR29936
  * bsc#1213458 aka CVE-2021-32256 aka PR105039 (gcc)
  * bsc#1214565 aka CVE-2020-19726 aka PR26240
  * bsc#1214567 aka CVE-2022-35206 aka PR29290
  * bsc#1214579 aka CVE-2022-35205 aka PR29289
  * bsc#1214580 aka CVE-2022-44840 aka PR29732
  * bsc#1214604 aka CVE-2022-45703 aka PR29799
  * bsc#1214611 aka CVE-2022-48065 aka PR29925
  * bsc#1214619 aka CVE-2022-48064 aka PR29922
  * bsc#1214620 aka CVE-2022-48063 aka PR29924
  * bsc#1214623 aka CVE-2022-47696 aka PR29677
  * bsc#1214624 aka CVE-2022-47695 aka PR29846
  * bsc#1214625 aka CVE-2022-47673 aka PR29876

  * Fixed a compatibility problem caused by binutils-revert-rela.diff in SLE
    codestreams. Needed for update of glibc as that would otherwise pick up the
    broken relative relocs support. [bsc#1213282, jsc#PED-1435]

  * Document fixed CVEs:

  * bsc#1208037 aka CVE-2023-25588 aka PR29677

  * bsc#1208038 aka CVE-2023-25587 aka PR29846
  * bsc#1208040 aka CVE-2023-25585 aka PR29892
  * bsc#1208409 aka CVE-2023-0687 aka PR29444

  * Enable bpf-none cross target and add bpf-none to the multitarget set of
    supported targets.

  * Disable packed-relative-relocs for old codestreams. They generate buggy
    relocations when binutils-revert-rela.diff is active. [bsc#1206556]
  * Disable ZSTD debug section compress by default.
  * Enable zstd compression algorithm (instead of zlib) for debug info sections
    by default.
  * Pack libgprofng only for supported platforms.
  * Move libgprofng-related libraries to the proper locations (packages).
  * Add --without=bootstrap for skipping of bootstrap (faster testing of the
    package).

Update to version 2.40:

  * Objdump has a new command line option --show-all-symbols which will make it
    display all symbols that match a given address when disassembling. (Normally
    only the first symbol that matches an address is shown).
  * Add --enable-colored-disassembly configure time option to enable colored
    disassembly output by default, if the output device is a terminal. Note,
    this configure option is disabled by default.
  * DCO signed contributions are now accepted.
  * objcopy --decompress-debug-sections now supports zstd compressed debug
    sections. The new option --compress-debug-sections=zstd compresses debug
    sections with zstd.
  * addr2line and objdump --dwarf now support zstd compressed debug sections.
  * The dlltool program now accepts --deterministic-libraries and \--non-
    deterministic-libraries as command line options to control whether or not it
    generates deterministic output libraries. If neither of these options are
    used the default is whatever was set when the binutils were configured.
  * readelf and objdump now have a newly added option --sframe which dumps the
    SFrame section.
  * Add support for Intel RAO-INT instructions.
  * Add support for Intel AVX-NE-CONVERT instructions.
  * Add support for Intel MSRLIST instructions.
  * Add support for Intel WRMSRNS instructions.
  * Add support for Intel CMPccXADD instructions.
  * Add support for Intel AVX-VNNI-INT8 instructions.
  * Add support for Intel AVX-IFMA instructions.
  * Add support for Intel PREFETCHI instructions.
  * Add support for Intel AMX-FP16 instructions.
  * gas now supports --compress-debug-sections=zstd to compress debug sections
    with zstd.
  * Add --enable-default-compressed-debug-sections-algorithm={zlib,zstd} that
    selects the default compression algorithm for --enable-compressed-debug-
    sections.
  * Add support for various T-Head extensions (XTheadBa, XTheadBb, XTheadBs,
    XTheadCmo, XTheadCondMov, XTheadFMemIdx, XTheadFmv, XTheadInt, XTheadMemIdx,
    XTheadMemPair, XTheadMac, and XTheadSync) from version 2.0 of the T-Head ISA
    manual, which are implemented in the Allwinner D1.
  * Add support for the RISC-V Zawrs extension, version 1.0-rc4.
  * Add support for Cortex-X1C for Arm.
  * New command line option --gsframe to generate SFrame unwind information on
    x86_64 and aarch64 targets.
  * The linker has a new command line option to suppress the generation of any
    warning or error messages. This can be useful when there is a need to create
    a known non-working binary. The option is -w or --no-warnings.
  * ld now supports zstd compressed debug sections. The new option \--compress-
    debug-sections=zstd compresses debug sections with zstd.
  * Add --enable-default-compressed-debug-sections-algorithm={zlib,zstd} that
    selects the default compression algorithm for --enable-compressed-debug-
    sections.
  * Remove support for -z bndplt (MPX prefix instructions).

  * Includes fixes for these CVEs:

  * bsc#1206080 aka CVE-2022-4285 aka PR29699

  * Enable by default: --enable-colored-disassembly.

  * fix build on x86_64_vX platforms
  * add arm32 avoid copyreloc patch for PR16177 (bsc#1200962)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * SUSE Linux Enterprise Software Development Kit 12 SP5  
    zypper in -t patch SUSE-SLE-SDK-12-SP5-2023-3695=1

  * SUSE Linux Enterprise High Performance Computing 12 SP5  
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-3695=1

  * SUSE Linux Enterprise Server 12 SP5  
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-3695=1

  * SUSE Linux Enterprise Server for SAP Applications 12 SP5  
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-3695=1

## Package List:

  * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x
    x86_64)
    * binutils-debuginfo-2.41-9.53.1
    * binutils-gold-2.41-9.53.1
    * binutils-debugsource-2.41-9.53.1
    * binutils-devel-2.41-9.53.1
    * binutils-gold-debuginfo-2.41-9.53.1
  * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64)
    * libctf-nobfd0-debuginfo-2.41-9.53.1
    * libctf-nobfd0-2.41-9.53.1
    * binutils-2.41-9.53.1
    * binutils-debuginfo-2.41-9.53.1
    * binutils-debugsource-2.41-9.53.1
    * libctf0-2.41-9.53.1
    * binutils-devel-2.41-9.53.1
    * libctf0-debuginfo-2.41-9.53.1
  * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64)
    * libctf-nobfd0-debuginfo-2.41-9.53.1
    * libctf-nobfd0-2.41-9.53.1
    * binutils-2.41-9.53.1
    * binutils-debuginfo-2.41-9.53.1
    * binutils-debugsource-2.41-9.53.1
    * libctf0-2.41-9.53.1
    * binutils-devel-2.41-9.53.1
    * libctf0-debuginfo-2.41-9.53.1
  * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64)
    * libctf-nobfd0-debuginfo-2.41-9.53.1
    * libctf-nobfd0-2.41-9.53.1
    * binutils-2.41-9.53.1
    * binutils-debuginfo-2.41-9.53.1
    * binutils-debugsource-2.41-9.53.1
    * libctf0-2.41-9.53.1
    * binutils-devel-2.41-9.53.1
    * libctf0-debuginfo-2.41-9.53.1

## References:

  * https://www.suse.com/security/cve/CVE-2020-19726.html
  * https://www.suse.com/security/cve/CVE-2021-32256.html
  * https://www.suse.com/security/cve/CVE-2022-35205.html
  * https://www.suse.com/security/cve/CVE-2022-35206.html
  * https://www.suse.com/security/cve/CVE-2022-4285.html
  * https://www.suse.com/security/cve/CVE-2022-44840.html
  * https://www.suse.com/security/cve/CVE-2022-45703.html
  * https://www.suse.com/security/cve/CVE-2022-47673.html
  * https://www.suse.com/security/cve/CVE-2022-47695.html
  * https://www.suse.com/security/cve/CVE-2022-47696.html
  * https://www.suse.com/security/cve/CVE-2022-48063.html
  * https://www.suse.com/security/cve/CVE-2022-48064.html
  * https://www.suse.com/security/cve/CVE-2022-48065.html
  * https://www.suse.com/security/cve/CVE-2023-0687.html
  * https://www.suse.com/security/cve/CVE-2023-1579.html
  * https://www.suse.com/security/cve/CVE-2023-1972.html
  * https://www.suse.com/security/cve/CVE-2023-2222.html
  * https://www.suse.com/security/cve/CVE-2023-25585.html
  * https://www.suse.com/security/cve/CVE-2023-25587.html
  * https://www.suse.com/security/cve/CVE-2023-25588.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1200962
  * https://bugzilla.suse.com/show_bug.cgi?id=1206080
  * https://bugzilla.suse.com/show_bug.cgi?id=1206556
  * https://bugzilla.suse.com/show_bug.cgi?id=1208037
  * https://bugzilla.suse.com/show_bug.cgi?id=1208038
  * https://bugzilla.suse.com/show_bug.cgi?id=1208040
  * https://bugzilla.suse.com/show_bug.cgi?id=1208409
  * https://bugzilla.suse.com/show_bug.cgi?id=1209642
  * https://bugzilla.suse.com/show_bug.cgi?id=1210297
  * https://bugzilla.suse.com/show_bug.cgi?id=1210733
  * https://bugzilla.suse.com/show_bug.cgi?id=1213282
  * https://bugzilla.suse.com/show_bug.cgi?id=1213458
  * https://bugzilla.suse.com/show_bug.cgi?id=1214565
  * https://bugzilla.suse.com/show_bug.cgi?id=1214567
  * https://bugzilla.suse.com/show_bug.cgi?id=1214579
  * https://bugzilla.suse.com/show_bug.cgi?id=1214580
  * https://bugzilla.suse.com/show_bug.cgi?id=1214604
  * https://bugzilla.suse.com/show_bug.cgi?id=1214611
  * https://bugzilla.suse.com/show_bug.cgi?id=1214619
  * https://bugzilla.suse.com/show_bug.cgi?id=1214620
  * https://bugzilla.suse.com/show_bug.cgi?id=1214623
  * https://bugzilla.suse.com/show_bug.cgi?id=1214624
  * https://bugzilla.suse.com/show_bug.cgi?id=1214625
  * https://jira.suse.com/browse/PED-1435
  * https://jira.suse.com/browse/PED-5778

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20230920/43d77ad0/attachment.htm>


More information about the sle-security-updates mailing list