The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them. |
|
 |
|
|
Synthesis of the vulnerability 
An attacker can create a memory leak via read_metadata_vorbiscomment_() of FLAC, in order to trigger a denial of service.
Vulnerable software: Android OS, openSUSE Leap, SLES.
Severity of this announce: 1/4.
Creation date: 28/12/2020.
Références of this computer vulnerability: CVE-2020-0487-REJECT, openSUSE-SU-2020:2348-1, openSUSE-SU-2020:2350-1, SUSE-SU-2020:3933-1, VIGILANCE-VUL-34207.
Description of the vulnerability 
An attacker can create a memory leak via read_metadata_vorbiscomment_() of FLAC, in order to trigger a denial of service. Full bulletin, software filtering, emails, fixes, ... (Request your free trial)
This vulnerability announce impacts software or systems such as Android OS, openSUSE Leap, SLES.
Our Vigil@nce team determined that the severity of this cybersecurity threat is low.
The trust level is of type confirmed by the editor, with an origin of document.
An attacker with a expert ability can exploit this computer threat bulletin.
Solutions for this threat 
Google Android/Pixel: patch for December 2020.
A patch is indicated in information sources.
openSUSE Leap 15.1: new flac packages.
New packages are available:
openSUSE Leap 15.1: flac 1.3.2-lp151.4.3.1
openSUSE Leap 15.2: new flac packages.
New packages are available:
openSUSE Leap 15.2: flac 1.3.2-lp152.5.3.1
SUSE LE 15 RTM-SP3: new flac packages.
New packages are available:
SUSE LE 15 RTM: flac 1.3.2-3.6.1
SUSE LE 15 SP1: flac 1.3.2-3.6.1
SUSE LE 15 SP2: flac 1.3.2-3.6.1
SUSE LE 15 SP3: flac 1.3.2-3.6.1
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)
Computer vulnerabilities tracking service 
Vigil@nce provides an application vulnerability watch. The technology watch team tracks security threats targeting the computer system.
|