Revision Date: | 2020-12-01 | Version: | 1 |
Title: | Security update for freetds (Moderate) |
Description: |
This update for freetds to 1.1.36 fixes the following issues:
Security issue fixed:
- CVE-2019-13508: Fixed a heap overflow that could have been caused by malicious servers sending UDT types over protocol version 5.0 (bsc#1141132).
Non-security issues fixed:
- Enabled Kerberos support - Version update to 1.1.36: * Default TDS protocol version is now 'auto' * Improved UTF-8 performances * TDS Pool Server is enabled * MARS support is enabled * NTLMv2 is enabled * See NEWS and ChangeLog for a complete list of changes
|
Family: | unix | Class: | patch |
Status: | | Reference(s): | 1141132 CVE-2013-0262 CVE-2013-0263 CVE-2015-3225 CVE-2019-13508 SUSE-SU-2020:1417-2
|
Platform(s): | SUSE Linux Enterprise High Availability 15 SP1 SUSE Linux Enterprise Module for Server Applications 15 SP2
| Product(s): | |
Definition Synopsis |
SUSE Linux Enterprise High Availability 15 SP1 is installed AND ruby2.5-rubygem-rack-2.0.3-1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed
AND Package Information
freetds-1.1.36-3.3 is installed
OR libct4-1.1.36-3.3 is installed
|