You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa sarg

Sigurnosni nedostaci programskog paketa sarg

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LSU

openSUSE Security Update: Security update for sarg
______________________________________________________________________________

Announcement ID: openSUSE-SU-2020:0117-1
Rating: important
References: #1156643
Cross-References: CVE-2019-18932
Affected Products:
openSUSE Leap 15.1
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for sarg fixes the following issues:

– CVE-2019-18932: Fixed insecure usage of /tmp/sarg which potentially
allowed privilege escalation or denial of service (boo#1156643).

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– openSUSE Leap 15.1:

zypper in -t patch openSUSE-2020-117=1

Package List:

– openSUSE Leap 15.1 (x86_64):

sarg-2.3.10-lp151.3.3.1
sarg-debuginfo-2.3.10-lp151.3.3.1
sarg-debugsource-2.3.10-lp151.3.3.1

References:

https://www.suse.com/security/cve/CVE-2019-18932.html
https://bugzilla.suse.com/1156643


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

openSUSE Security Update: Security update for sarg
______________________________________________________________________________

Announcement ID: openSUSE-SU-2020:0121-1
Rating: moderate
References: #1142433 #1142435 #1142436
Cross-References: CVE-2019-1010222 CVE-2019-1010223 CVE-2019-1010224

Affected Products:
openSUSE Leap 15.1
______________________________________________________________________________

An update that fixes three vulnerabilities is now available.

Description:

This update for aubio fixes the following issues:

– CVE-2019-1010224: Fixed a denial of service caused by null pointer
dereference (boo#1142435).

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– openSUSE Leap 15.1:

zypper in -t patch openSUSE-2020-121=1

Package List:

– openSUSE Leap 15.1 (i586 x86_64):

aubio-debugsource-0.4.6-lp151.6.7.1
aubio-tools-0.4.6-lp151.6.7.1
aubio-tools-debuginfo-0.4.6-lp151.6.7.1
libaubio-devel-0.4.6-lp151.6.7.1
libaubio5-0.4.6-lp151.6.7.1
libaubio5-debuginfo-0.4.6-lp151.6.7.1

– openSUSE Leap 15.1 (x86_64):

libaubio5-32bit-0.4.6-lp151.6.7.1
libaubio5-32bit-debuginfo-0.4.6-lp151.6.7.1
python-aubio-debugsource-0.4.6-lp151.6.7.1
python2-aubio-0.4.6-lp151.6.7.1
python2-aubio-debuginfo-0.4.6-lp151.6.7.1
python3-aubio-0.4.6-lp151.6.7.1
python3-aubio-debuginfo-0.4.6-lp151.6.7.1

References:

https://www.suse.com/security/cve/CVE-2019-1010222.html
https://www.suse.com/security/cve/CVE-2019-1010223.html
https://www.suse.com/security/cve/CVE-2019-1010224.html
https://bugzilla.suse.com/1142433
https://bugzilla.suse.com/1142435
https://bugzilla.suse.com/1142436


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

AutorJosip Papratovic
Cert idNCERT-REF-2020-01-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa java-11-openjdk

Otkriveni su sigurnosni nedostaci u programskom paketu java-11-openjdk za operacijski sustav openSUSE. Otkriveni nedostaci potencijalnim napadačima omogućuju izazivanje DoS stanja...

Close