openSUSE Security Update: Security update for binutils
______________________________________________________________________________
Announcement ID: openSUSE-SU-2020:1804-1
Rating: moderate
References: #1126826 #1126829 #1126831 #1140126 #1142649
#1143609 #1153768 #1153770 #1157755 #1160254
#1160590 #1163333 #1163744
Cross-References: CVE-2019-12972 CVE-2019-14250 CVE-2019-14444
CVE-2019-17450 CVE-2019-17451 CVE-2019-9074
CVE-2019-9075 CVE-2019-9077
Affected Products:
openSUSE Leap 15.2
______________________________________________________________________________
An update that solves 8 vulnerabilities and has 5 fixes is
now available.
Description:
This update for binutils fixes the following issues:
binutils was updated to version 2.35. (jsc#ECO-2373)
Update to binutils 2.35:
* The assembler can now produce DWARF-5 format line number tables.
* Readelf now has a “lint” mode to enable extra checks of the files it is
processing.
* Readelf will now display “[…]” when it has to truncate a symbol name.
The old behaviour – of displaying as many characters as possible, up to
the 80 column limit – can be restored by the use of the
–silent-truncation
option.
* The linker can now produce a dependency file listing the inputs that it
has processed, much like the -M -MP option supported by the compiler.
– fix DT_NEEDED order with -flto [bsc#1163744]
Update to binutils 2.34:
* The disassembler (objdump –disassemble) now has an option to generate
ascii art thats show the arcs between that start and end points of
control flow instructions.
* The binutils tools now have support for debuginfod. Debuginfod is a
HTTP service for distributing ELF/DWARF debugging information as well as
source code. The tools can now connect to debuginfod servers in order
to download debug information about the files that they are processing.
* The assembler and linker now support the generation of ELF format files
for the Z80 architecture.
– Add new subpackages for libctf and libctf-nobfd.
– Disable LTO due to bsc#1163333.
– Includes fixes for these CVEs: bsc#1153768 aka CVE-2019-17451 aka
PR25070 bsc#1153770 aka CVE-2019-17450 aka PR25078
– fix various build fails on aarch64 (PR25210, bsc#1157755).
Update to binutils 2.33.1:
* Adds support for the Arm Scalable Vector Extension version 2 (SVE2)
instructions, the Arm Transactional Memory Extension (TME) instructions
and the Armv8.1-M Mainline and M-profile Vector Extension (MVE)
instructions.
* Adds support for the Arm Cortex-A76AE, Cortex-A77 and Cortex-M35P
processors and the AArch64 Cortex-A34, Cortex-A65, Cortex-A65AE,
Cortex-A76AE, and Cortex-A77 processors.
* Adds a .float16 directive for both Arm and AArch64 to allow encoding of
16-bit floating point literals.
* For MIPS, Add -m[no-]fix-loongson3-llsc option to fix (or not) Loongson3
LLSC Errata. Add a –enable-mips-fix-loongson3-llsc=[yes|no] configure
time option to set the default behavior. Set the default if the
configure option is not used to “no”.
* The Cortex-A53 Erratum 843419 workaround now supports a choice of which
workaround to use. The option –fix-cortex-a53-843419 now takes an
optional argument –fix-cortex-a53-843419[=full|adr|adrp] which can be
used to force a particular workaround to be used. See –help for AArch64
for more details.
* Add support for GNU_PROPERTY_AARCH64_FEATURE_1_BTI and
GNU_PROPERTY_AARCH64_FEATURE_1_PAC in ELF GNU program properties in the
AArch64 ELF linker.
* Add -z force-bti for AArch64 to enable GNU_PROPERTY_AARCH64_FEATURE_1_BTI
on output while warning about missing GNU_PROPERTY_AARCH64_FEATURE_1_BTI
on inputs and use PLTs protected with BTI.
* Add -z pac-plt for AArch64 to pick PAC enabled PLTs.
* Add –source-comment[=<txt>] option to objdump which if present,
provides a prefix to source code lines displayed in a disassembly.
* Add –set-section-alignment <section-name>=<power-of-2-align>
option to objcopy to allow the changing of section alignments.
* Add –verilog-data-width option to objcopy for verilog targets to
control width of data elements in verilog hex format.
* The separate debug info file options of readelf (–debug-dump=links and
–debug-dump=follow) and objdump (–dwarf=links and
–dwarf=follow-links) will now display and/or follow multiple links if
more than one are present in a file. (This usually happens when gcc’s
-gsplit-dwarf option is used). In addition objdump’s
–dwarf=follow-links now also affects its
other display options, so that for example, when combined with
–syms it will cause the symbol tables in any linked debug info files to
also be displayed. In addition when combined with
–disassemble the –dwarf= follow-links option will ensure that any
symbol tables in the linked files are read and used when disassembling
code in the main file.
* Add support for dumping types encoded in the Compact Type Format to
objdump and readelf.
– Includes fixes for these CVEs: bsc#1126826 aka CVE-2019-9077 aka
PR1126826 bsc#1126829 aka CVE-2019-9075 aka PR1126829 bsc#1126831 aka
CVE-2019-9074 aka PR24235 bsc#1140126 aka CVE-2019-12972 aka PR23405
bsc#1143609 aka CVE-2019-14444 aka PR24829 bsc#1142649 aka
CVE-2019-14250 aka PR90924
* Add xBPF target
* Fix various problems with DWARF 5 support in gas
* fix nm -B for objects compiled with -flto and -fcommon.
This update was imported from the SUSE:SLE-15-SP1:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– openSUSE Leap 15.2:
zypper in -t patch openSUSE-2020-1804=1
Package List:
– openSUSE Leap 15.2 (i586 x86_64):
binutils-2.35-lp152.4.3.1
binutils-debuginfo-2.35-lp152.4.3.1
binutils-debugsource-2.35-lp152.4.3.1
binutils-devel-2.35-lp152.4.3.1
binutils-gold-2.35-lp152.4.3.1
binutils-gold-debuginfo-2.35-lp152.4.3.1
libctf-nobfd0-2.35-lp152.4.3.1
libctf-nobfd0-debuginfo-2.35-lp152.4.3.1
libctf0-2.35-lp152.4.3.1
libctf0-debuginfo-2.35-lp152.4.3.1
– openSUSE Leap 15.2 (x86_64):
binutils-devel-32bit-2.35-lp152.4.3.1
cross-aarch64-binutils-2.35-lp152.4.3.1
cross-aarch64-binutils-debuginfo-2.35-lp152.4.3.1
cross-aarch64-binutils-debugsource-2.35-lp152.4.3.1
cross-arm-binutils-2.35-lp152.4.3.1
cross-arm-binutils-debuginfo-2.35-lp152.4.3.1
cross-arm-binutils-debugsource-2.35-lp152.4.3.1
cross-avr-binutils-2.35-lp152.4.3.1
cross-avr-binutils-debuginfo-2.35-lp152.4.3.1
cross-avr-binutils-debugsource-2.35-lp152.4.3.1
cross-epiphany-binutils-2.35-lp152.4.3.1
cross-epiphany-binutils-debuginfo-2.35-lp152.4.3.1
cross-epiphany-binutils-debugsource-2.35-lp152.4.3.1
cross-hppa-binutils-2.35-lp152.4.3.1
cross-hppa-binutils-debuginfo-2.35-lp152.4.3.1
cross-hppa-binutils-debugsource-2.35-lp152.4.3.1
cross-hppa64-binutils-2.35-lp152.4.3.1
cross-hppa64-binutils-debuginfo-2.35-lp152.4.3.1
cross-hppa64-binutils-debugsource-2.35-lp152.4.3.1
cross-i386-binutils-2.35-lp152.4.3.1
cross-i386-binutils-debuginfo-2.35-lp152.4.3.1
cross-i386-binutils-debugsource-2.35-lp152.4.3.1
cross-ia64-binutils-2.35-lp152.4.3.1
cross-ia64-binutils-debuginfo-2.35-lp152.4.3.1
cross-ia64-binutils-debugsource-2.35-lp152.4.3.1
cross-m68k-binutils-2.35-lp152.4.3.1
cross-m68k-binutils-debuginfo-2.35-lp152.4.3.1
cross-m68k-binutils-debugsource-2.35-lp152.4.3.1
cross-mips-binutils-2.35-lp152.4.3.1
cross-mips-binutils-debuginfo-2.35-lp152.4.3.1
cross-mips-binutils-debugsource-2.35-lp152.4.3.1
cross-ppc-binutils-2.35-lp152.4.3.1
cross-ppc-binutils-debuginfo-2.35-lp152.4.3.1
cross-ppc-binutils-debugsource-2.35-lp152.4.3.1
cross-ppc64-binutils-2.35-lp152.4.3.1
cross-ppc64-binutils-debuginfo-2.35-lp152.4.3.1
cross-ppc64-binutils-debugsource-2.35-lp152.4.3.1
cross-ppc64le-binutils-2.35-lp152.4.3.1
cross-ppc64le-binutils-debuginfo-2.35-lp152.4.3.1
cross-ppc64le-binutils-debugsource-2.35-lp152.4.3.1
cross-riscv64-binutils-2.35-lp152.4.3.1
cross-riscv64-binutils-debuginfo-2.35-lp152.4.3.1
cross-riscv64-binutils-debugsource-2.35-lp152.4.3.1
cross-rx-binutils-2.35-lp152.4.3.1
cross-rx-binutils-debuginfo-2.35-lp152.4.3.1
cross-rx-binutils-debugsource-2.35-lp152.4.3.1
cross-s390-binutils-2.35-lp152.4.3.1
cross-s390-binutils-debuginfo-2.35-lp152.4.3.1
cross-s390-binutils-debugsource-2.35-lp152.4.3.1
cross-s390x-binutils-2.35-lp152.4.3.1
cross-s390x-binutils-debuginfo-2.35-lp152.4.3.1
cross-s390x-binutils-debugsource-2.35-lp152.4.3.1
cross-sparc-binutils-2.35-lp152.4.3.1
cross-sparc-binutils-debuginfo-2.35-lp152.4.3.1
cross-sparc-binutils-debugsource-2.35-lp152.4.3.1
cross-sparc64-binutils-2.35-lp152.4.3.1
cross-sparc64-binutils-debuginfo-2.35-lp152.4.3.1
cross-sparc64-binutils-debugsource-2.35-lp152.4.3.1
cross-spu-binutils-2.35-lp152.4.3.1
cross-spu-binutils-debuginfo-2.35-lp152.4.3.1
cross-spu-binutils-debugsource-2.35-lp152.4.3.1
cross-xtensa-binutils-2.35-lp152.4.3.1
cross-xtensa-binutils-debuginfo-2.35-lp152.4.3.1
cross-xtensa-binutils-debugsource-2.35-lp152.4.3.1
References:
https://www.suse.com/security/cve/CVE-2019-12972.html
https://www.suse.com/security/cve/CVE-2019-14250.html
https://www.suse.com/security/cve/CVE-2019-14444.html
https://www.suse.com/security/cve/CVE-2019-17450.html
https://www.suse.com/security/cve/CVE-2019-17451.html
https://www.suse.com/security/cve/CVE-2019-9074.html
https://www.suse.com/security/cve/CVE-2019-9075.html
https://www.suse.com/security/cve/CVE-2019-9077.html
https://bugzilla.suse.com/1126826
https://bugzilla.suse.com/1126829
https://bugzilla.suse.com/1126831
https://bugzilla.suse.com/1140126
https://bugzilla.suse.com/1142649
https://bugzilla.suse.com/1143609
https://bugzilla.suse.com/1153768
https://bugzilla.suse.com/1153770
https://bugzilla.suse.com/1157755
https://bugzilla.suse.com/1160254
https://bugzilla.suse.com/1160590
https://bugzilla.suse.com/1163333
https://bugzilla.suse.com/1163744
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
openSUSE Security Update: Security update for binutils
______________________________________________________________________________
Announcement ID: openSUSE-SU-2020:1790-1
Rating: moderate
References: #1126826 #1126829 #1126831 #1140126 #1142649
#1143609 #1153768 #1153770 #1157755 #1160254
#1160590 #1163333 #1163744
Cross-References: CVE-2019-12972 CVE-2019-14250 CVE-2019-14444
CVE-2019-17450 CVE-2019-17451 CVE-2019-9074
CVE-2019-9075 CVE-2019-9077
Affected Products:
openSUSE Leap 15.1
______________________________________________________________________________
An update that solves 8 vulnerabilities and has 5 fixes is
now available.
Description:
This update for binutils fixes the following issues:
binutils was updated to version 2.35. (jsc#ECO-2373)
Update to binutils 2.35:
* The assembler can now produce DWARF-5 format line number tables.
* Readelf now has a “lint” mode to enable extra checks of the files it is
processing.
* Readelf will now display “[…]” when it has to truncate a symbol name.
The old behaviour – of displaying as many characters as possible, up to
the 80 column limit – can be restored by the use of the
–silent-truncation
option.
* The linker can now produce a dependency file listing the inputs that it
has processed, much like the -M -MP option supported by the compiler.
– fix DT_NEEDED order with -flto [bsc#1163744]
Update to binutils 2.34:
* The disassembler (objdump –disassemble) now has an option to generate
ascii art thats show the arcs between that start and end points of
control flow instructions.
* The binutils tools now have support for debuginfod. Debuginfod is a
HTTP service for distributing ELF/DWARF debugging information as well as
source code. The tools can now connect to debuginfod servers in order
to download debug information about the files that they are processing.
* The assembler and linker now support the generation of ELF format files
for the Z80 architecture.
– Add new subpackages for libctf and libctf-nobfd.
– Disable LTO due to bsc#1163333.
– Includes fixes for these CVEs: bsc#1153768 aka CVE-2019-17451 aka
PR25070 bsc#1153770 aka CVE-2019-17450 aka PR25078
– fix various build fails on aarch64 (PR25210, bsc#1157755).
Update to binutils 2.33.1:
* Adds support for the Arm Scalable Vector Extension version 2 (SVE2)
instructions, the Arm Transactional Memory Extension (TME) instructions
and the Armv8.1-M Mainline and M-profile Vector Extension (MVE)
instructions.
* Adds support for the Arm Cortex-A76AE, Cortex-A77 and Cortex-M35P
processors and the AArch64 Cortex-A34, Cortex-A65, Cortex-A65AE,
Cortex-A76AE, and Cortex-A77 processors.
* Adds a .float16 directive for both Arm and AArch64 to allow encoding of
16-bit floating point literals.
* For MIPS, Add -m[no-]fix-loongson3-llsc option to fix (or not) Loongson3
LLSC Errata. Add a –enable-mips-fix-loongson3-llsc=[yes|no] configure
time option to set the default behavior. Set the default if the
configure option is not used to “no”.
* The Cortex-A53 Erratum 843419 workaround now supports a choice of which
workaround to use. The option –fix-cortex-a53-843419 now takes an
optional argument –fix-cortex-a53-843419[=full|adr|adrp] which can be
used to force a particular workaround to be used. See –help for AArch64
for more details.
* Add support for GNU_PROPERTY_AARCH64_FEATURE_1_BTI and
GNU_PROPERTY_AARCH64_FEATURE_1_PAC in ELF GNU program properties in the
AArch64 ELF linker.
* Add -z force-bti for AArch64 to enable GNU_PROPERTY_AARCH64_FEATURE_1_BTI
on output while warning about missing GNU_PROPERTY_AARCH64_FEATURE_1_BTI
on inputs and use PLTs protected with BTI.
* Add -z pac-plt for AArch64 to pick PAC enabled PLTs.
* Add –source-comment[=<txt>] option to objdump which if present,
provides a prefix to source code lines displayed in a disassembly.
* Add –set-section-alignment <section-name>=<power-of-2-align>
option to objcopy to allow the changing of section alignments.
* Add –verilog-data-width option to objcopy for verilog targets to
control width of data elements in verilog hex format.
* The separate debug info file options of readelf (–debug-dump=links and
–debug-dump=follow) and objdump (–dwarf=links and
–dwarf=follow-links) will now display and/or follow multiple links if
more than one are present in a file. (This usually happens when gcc’s
-gsplit-dwarf option is used). In addition objdump’s
–dwarf=follow-links now also affects its
other display options, so that for example, when combined with
–syms it will cause the symbol tables in any linked debug info files to
also be displayed. In addition when combined with
–disassemble the –dwarf= follow-links option will ensure that any
symbol tables in the linked files are read and used when disassembling
code in the main file.
* Add support for dumping types encoded in the Compact Type Format to
objdump and readelf.
– Includes fixes for these CVEs: bsc#1126826 aka CVE-2019-9077 aka
PR1126826 bsc#1126829 aka CVE-2019-9075 aka PR1126829 bsc#1126831 aka
CVE-2019-9074 aka PR24235 bsc#1140126 aka CVE-2019-12972 aka PR23405
bsc#1143609 aka CVE-2019-14444 aka PR24829 bsc#1142649 aka
CVE-2019-14250 aka PR90924
* Add xBPF target
* Fix various problems with DWARF 5 support in gas
* fix nm -B for objects compiled with -flto and -fcommon.
This update was imported from the SUSE:SLE-15-SP1:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– openSUSE Leap 15.1:
zypper in -t patch openSUSE-2020-1790=1
Package List:
– openSUSE Leap 15.1 (i586 x86_64):
binutils-2.35-lp151.3.9.1
binutils-debuginfo-2.35-lp151.3.9.1
binutils-debugsource-2.35-lp151.3.9.1
binutils-devel-2.35-lp151.3.9.1
binutils-gold-2.35-lp151.3.9.1
binutils-gold-debuginfo-2.35-lp151.3.9.1
libctf-nobfd0-2.35-lp151.3.9.1
libctf-nobfd0-debuginfo-2.35-lp151.3.9.1
libctf0-2.35-lp151.3.9.1
libctf0-debuginfo-2.35-lp151.3.9.1
– openSUSE Leap 15.1 (x86_64):
binutils-devel-32bit-2.35-lp151.3.9.1
cross-aarch64-binutils-2.35-lp151.3.9.1
cross-aarch64-binutils-debuginfo-2.35-lp151.3.9.1
cross-aarch64-binutils-debugsource-2.35-lp151.3.9.1
cross-arm-binutils-2.35-lp151.3.9.1
cross-arm-binutils-debuginfo-2.35-lp151.3.9.1
cross-arm-binutils-debugsource-2.35-lp151.3.9.1
cross-avr-binutils-2.35-lp151.3.9.1
cross-avr-binutils-debuginfo-2.35-lp151.3.9.1
cross-avr-binutils-debugsource-2.35-lp151.3.9.1
cross-epiphany-binutils-2.35-lp151.3.9.1
cross-epiphany-binutils-debuginfo-2.35-lp151.3.9.1
cross-epiphany-binutils-debugsource-2.35-lp151.3.9.1
cross-hppa-binutils-2.35-lp151.3.9.1
cross-hppa-binutils-debuginfo-2.35-lp151.3.9.1
cross-hppa-binutils-debugsource-2.35-lp151.3.9.1
cross-hppa64-binutils-2.35-lp151.3.9.1
cross-hppa64-binutils-debuginfo-2.35-lp151.3.9.1
cross-hppa64-binutils-debugsource-2.35-lp151.3.9.1
cross-i386-binutils-2.35-lp151.3.9.1
cross-i386-binutils-debuginfo-2.35-lp151.3.9.1
cross-i386-binutils-debugsource-2.35-lp151.3.9.1
cross-ia64-binutils-2.35-lp151.3.9.1
cross-ia64-binutils-debuginfo-2.35-lp151.3.9.1
cross-ia64-binutils-debugsource-2.35-lp151.3.9.1
cross-m68k-binutils-2.35-lp151.3.9.1
cross-m68k-binutils-debuginfo-2.35-lp151.3.9.1
cross-m68k-binutils-debugsource-2.35-lp151.3.9.1
cross-mips-binutils-2.35-lp151.3.9.1
cross-mips-binutils-debuginfo-2.35-lp151.3.9.1
cross-mips-binutils-debugsource-2.35-lp151.3.9.1
cross-ppc-binutils-2.35-lp151.3.9.1
cross-ppc-binutils-debuginfo-2.35-lp151.3.9.1
cross-ppc-binutils-debugsource-2.35-lp151.3.9.1
cross-ppc64-binutils-2.35-lp151.3.9.1
cross-ppc64-binutils-debuginfo-2.35-lp151.3.9.1
cross-ppc64-binutils-debugsource-2.35-lp151.3.9.1
cross-ppc64le-binutils-2.35-lp151.3.9.1
cross-ppc64le-binutils-debuginfo-2.35-lp151.3.9.1
cross-ppc64le-binutils-debugsource-2.35-lp151.3.9.1
cross-riscv64-binutils-2.35-lp151.3.9.1
cross-riscv64-binutils-debuginfo-2.35-lp151.3.9.1
cross-riscv64-binutils-debugsource-2.35-lp151.3.9.1
cross-rx-binutils-2.35-lp151.3.9.1
cross-rx-binutils-debuginfo-2.35-lp151.3.9.1
cross-rx-binutils-debugsource-2.35-lp151.3.9.1
cross-s390-binutils-2.35-lp151.3.9.1
cross-s390-binutils-debuginfo-2.35-lp151.3.9.1
cross-s390-binutils-debugsource-2.35-lp151.3.9.1
cross-s390x-binutils-2.35-lp151.3.9.1
cross-s390x-binutils-debuginfo-2.35-lp151.3.9.1
cross-s390x-binutils-debugsource-2.35-lp151.3.9.1
cross-sparc-binutils-2.35-lp151.3.9.1
cross-sparc-binutils-debuginfo-2.35-lp151.3.9.1
cross-sparc-binutils-debugsource-2.35-lp151.3.9.1
cross-sparc64-binutils-2.35-lp151.3.9.1
cross-sparc64-binutils-debuginfo-2.35-lp151.3.9.1
cross-sparc64-binutils-debugsource-2.35-lp151.3.9.1
cross-spu-binutils-2.35-lp151.3.9.1
cross-spu-binutils-debuginfo-2.35-lp151.3.9.1
cross-spu-binutils-debugsource-2.35-lp151.3.9.1
References:
https://www.suse.com/security/cve/CVE-2019-12972.html
https://www.suse.com/security/cve/CVE-2019-14250.html
https://www.suse.com/security/cve/CVE-2019-14444.html
https://www.suse.com/security/cve/CVE-2019-17450.html
https://www.suse.com/security/cve/CVE-2019-17451.html
https://www.suse.com/security/cve/CVE-2019-9074.html
https://www.suse.com/security/cve/CVE-2019-9075.html
https://www.suse.com/security/cve/CVE-2019-9077.html
https://bugzilla.suse.com/1126826
https://bugzilla.suse.com/1126829
https://bugzilla.suse.com/1126831
https://bugzilla.suse.com/1140126
https://bugzilla.suse.com/1142649
https://bugzilla.suse.com/1143609
https://bugzilla.suse.com/1153768
https://bugzilla.suse.com/1153770
https://bugzilla.suse.com/1157755
https://bugzilla.suse.com/1160254
https://bugzilla.suse.com/1160590
https://bugzilla.suse.com/1163333
https://bugzilla.suse.com/1163744
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org