Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | |||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.852989 |
Kategorie: | SuSE Local Security Checks |
Titel: | openSUSE: Security Advisory for libredwg (openSUSE-SU-2020:0068_1) |
Zusammenfassung: | The remote host is missing an update for the 'libredwg'; package(s) announced via the openSUSE-SU-2020:0068-1 advisory. |
Beschreibung: | Summary: The remote host is missing an update for the 'libredwg' package(s) announced via the openSUSE-SU-2020:0068-1 advisory. Vulnerability Insight: This update for libredwg fixes the following issues: libredwg was updated to release 0.9.3: * Added the -x, --extnames option to dwglayers for r13-r14 DWGs. * Fixed some leaks: SORTENTSTABLE, PROXY_ENTITY.ownerhandle for r13. * Add DICTIONARY.itemhandles[] for r13 and r14. * Fixed some dwglayers null pointer derefs, and flush its output for each layer. * Added several overflow checks from fuzzing [CVE-2019-20010, boo#1159825], [CVE-2019-20011, boo#1159826], [CVE-2019-20012, boo#1159827], [CVE-2019-20013, boo#1159828], [CVE-2019-20014, boo#1159831], [CVE-2019-20015, boo#1159832] * Disallow illegal SPLINE scenarios [CVE-2019-20009, boo#1159824] Update to release 0.9.1: * Fixed more null pointer dereferences, overflows, hangs and memory leaks for fuzzed (i.e. illegal) DWGs. Update to release 0.9 [boo#1154080]: * Added the DXF importer, using the new dynapi and the r2000 encoder. Only for r2000 DXFs. * Added utf8text conversion functions to the dynapi. * Added 3DSOLID encoder. * Added APIs to find handles for names, searching in tables and dicts. * API breaking changes - see NEWS file in package. * Fixed null pointer dereferences, and memory leaks (except DXF importer) [boo#1129868, CVE-2019-9779] [boo#1129869, CVE-2019-9778] [boo#1129870, CVE-2019-9777] [boo#1129873, CVE-2019-9776] [boo#1129874, CVE-2019-9773] [boo#1129875, CVE-2019-9772] [boo#1129876, CVE-2019-9771] [boo#1129878, CVE-2019-9775] [boo#1129879, CVE-2019-9774] [boo#1129881, CVE-2019-9770] Update to 0.8: * add a new dynamic API, read and write all header and object fields by name * API breaking changes * Fix many errors in DXF output * Fix JSON output * Many more bug fixes to handle specific object types Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or 'zypper patch'. Alternatively you can run the command listed for your product: - openSUSE Leap 15.1: zypper in -t patch openSUSE-2020-68=1 Affected Software/OS: 'libredwg' package(s) on openSUSE Leap 15.1. Solution: Please install the updated package(s). CVSS Score: 6.8 CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2019-9770 BugTraq ID: 107447 http://www.securityfocus.com/bid/107447 https://github.com/LibreDWG/libredwg/issues/99 https://savannah.gnu.org/bugs/index.php?55893 SuSE Security Announcement: openSUSE-SU-2020:0068 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html SuSE Security Announcement: openSUSE-SU-2020:0095 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00045.html Common Vulnerability Exposure (CVE) ID: CVE-2019-9771 Common Vulnerability Exposure (CVE) ID: CVE-2019-9772 Common Vulnerability Exposure (CVE) ID: CVE-2019-9773 Common Vulnerability Exposure (CVE) ID: CVE-2019-9774 Common Vulnerability Exposure (CVE) ID: CVE-2019-9775 Common Vulnerability Exposure (CVE) ID: CVE-2019-9776 Common Vulnerability Exposure (CVE) ID: CVE-2019-9777 Common Vulnerability Exposure (CVE) ID: CVE-2019-9778 Common Vulnerability Exposure (CVE) ID: CVE-2019-9779 |
Copyright | Copyright (C) 2020 Greenbone Networks GmbH |
Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |