Vulnerability Database
Blog
FAQ
Docs
SUSE-SU-2021:14763-1
See a problem?
Please try reporting it
to the source
first.
Source
https://www.suse.com/support/update/announcement/2021/suse-su-202114763-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:14763-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2021:14763-1
Related
CVE-2019-15522
Published
2021-07-12T08:03:28Z
Modified
2025-05-02T04:30:06.604226Z
Upstream
CVE-2019-15522
Summary
Security update for csync2
Details
This update for csync2 fixes the following issues:
CVE-2019-15522: Fixed an issue where daemon fails to enforce TLS (bsc#1147137)
Fixed an issue where the TLS keys were not created correctly during installation (bsc#1145032)
References
https://www.suse.com/support/update/announcement/2021/suse-su-202114763-1/
https://bugzilla.suse.com/1145032
https://bugzilla.suse.com/1147137
https://www.suse.com/security/cve/CVE-2019-15522
Affected packages
SUSE:Linux Enterprise High Availability Extension 11 SP4
/
csync2
Package
Name
csync2
Purl
pkg:rpm/suse/csync2&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2011%20SP4
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
1.34-0.13.7.1
Ecosystem specific
{ "binaries": [ { "csync2": "1.34-0.13.7.1" } ] }
SUSE-SU-2021:14763-1 - OSV