Summary: |
VUL-0: CVE-2019-19648: yara: In the macho_parse_file functionality in macho/macho.c, command_size may be inconsistent with the real size. A crafted MachO file can cause an out-of-bounds memory access, resulting in DoS or potential code execution |
Product: |
[openSUSE] openSUSE Distribution
|
Reporter: |
Wolfgang Frisch <wolfgang.frisch> |
Component: |
Security | Assignee: |
Greg Freemyer <Greg.Freemyer> |
Status: |
NEW
---
|
QA Contact: |
Security Team bot <security-team> |
Severity: |
Minor
|
|
|
Priority: |
P3 - Medium
|
CC: |
atoptsoglou
|
Version: |
Leap 15.1 | |
|
Target Milestone: |
--- | |
|
Hardware: |
Other | |
|
OS: |
Other | |
|
URL: |
https://smash.suse.de/issue/248574/
|
Whiteboard: |
|
Found By:
|
Security Response Team |
Services Priority:
|
|
Business Priority:
|
|
Blocker:
|
--- |
Marketing QA Status:
|
--- |
IT Deployment:
|
--- |