openSUSE Security Update: Security update for dosbox
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:1920-1
Rating: important
References: #1140254
Cross-References: CVE-2019-12594 CVE-2019-7165
Affected Products:
openSUSE Backports SLE-15-SP1
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for dosbox fixes the following issues:
Security issues fixed:
– CVE-2019-7165: Fixed that a very long line inside a bat file would
overflow the parsing buffer (bnc#1140254).
– CVE-2019-12594: Added a basic permission system so that a program
running inside DOSBox can’t access the contents of /proc (e.g.
/proc/self/mem) when / or /proc were (to be) mounted (bnc#1140254).
– Several other fixes for out of bounds access and buffer overflows.
This update was imported from the openSUSE:Leap:15.0:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– openSUSE Backports SLE-15-SP1:
zypper in -t patch openSUSE-2019-1920=1
Package List:
– openSUSE Backports SLE-15-SP1 (aarch64 ppc64le s390x x86_64):
dosbox-0.74.3-bp151.4.3.1
References:
https://www.suse.com/security/cve/CVE-2019-12594.html
https://www.suse.com/security/cve/CVE-2019-7165.html
https://bugzilla.suse.com/1140254
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
openSUSE Security Update: Security update for dosbox
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:1905-1
Rating: important
References: #1140254
Cross-References: CVE-2019-12594 CVE-2019-7165
Affected Products:
openSUSE Leap 15.1
openSUSE Leap 15.0
openSUSE Backports SLE-15
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for dosbox fixes the following issues:
Security issues fixed:
– CVE-2019-7165: Fixed that a very long line inside a bat file would
overflow the parsing buffer (bnc#1140254).
– CVE-2019-12594: Added a basic permission system so that a program
running inside DOSBox can’t access the contents of /proc (e.g.
/proc/self/mem) when / or /proc were (to be) mounted (bnc#1140254).
– Several other fixes for out of bounds access and buffer overflows.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– openSUSE Leap 15.1:
zypper in -t patch openSUSE-2019-1905=1
– openSUSE Leap 15.0:
zypper in -t patch openSUSE-2019-1905=1
– openSUSE Backports SLE-15:
zypper in -t patch openSUSE-2019-1905=1
Package List:
– openSUSE Leap 15.1 (x86_64):
dosbox-0.74.3-lp151.3.3.1
dosbox-debuginfo-0.74.3-lp151.3.3.1
dosbox-debugsource-0.74.3-lp151.3.3.1
– openSUSE Leap 15.0 (x86_64):
dosbox-0.74.3-lp150.2.3.1
dosbox-debuginfo-0.74.3-lp150.2.3.1
dosbox-debugsource-0.74.3-lp150.2.3.1
– openSUSE Backports SLE-15 (aarch64 ppc64le s390x x86_64):
dosbox-0.74.3-bp150.3.3.1
References:
https://www.suse.com/security/cve/CVE-2019-12594.html
https://www.suse.com/security/cve/CVE-2019-7165.html
https://bugzilla.suse.com/1140254
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org