Overview
Request 709476 accepted
- Fix security issues leading to buffer overflow or segfault
(CVE-2018-19800, bsc#1137828, CVE-2018-19801, bsc#1137822,
CVE-2018-19802, bsc#1137823):
CVE-2018-19800-tempo-fix-buffer-overflow-in-method-parser.patch
CVE-2018-19801-filterbank-validate-input-parameters.patch
CVE-2018-19802-notes-prevent-null-pointer-dereference.patch
Request History
tiwai created request
- Fix security issues leading to buffer overflow or segfault
(CVE-2018-19800, bsc#1137828, CVE-2018-19801, bsc#1137822,
CVE-2018-19802, bsc#1137823):
CVE-2018-19800-tempo-fix-buffer-overflow-in-method-parser.patch
CVE-2018-19801-filterbank-validate-input-parameters.patch
CVE-2018-19802-notes-prevent-null-pointer-dereference.patch
licensedigger accepted review
ok
factory-auto accepted review
Check script succeeded
maintbot accepted review
ok
maintbot approved review
ok
msmeissn moved maintenance target to openSUSE:Maintenance:10462
msmeissn accepted request
accepted request 709476:Thanks!
For information about the update, see https://build.opensuse.org/project/maintenance_incidents/openSUSE:Maintenance
home:tiwai:branches:openSUSE:Leap:15.1:Update/aubio.openSUSE_Leap_15.1_Update@079785f1d3eb65fa92bb5ccfb231e0e2 -> openSUSE:Leap:15.1:Update/aubio
expected origin is 'FORK' (unchanged)