Описание
Security update for shadowsocks-libev
This update for shadowsocks-libev fixes the following issues:
- Update version to 3.3.3
- Refine the handling of suspicious connections.
- Fix exploitable denial-of-service vulnerability exists in the UDPRelay functionality (boo#1158251, CVE-2019-5163)
- Fix code execution vulnerability in the ss-manager binary (boo#1158365, CVE-2019-5164)
- Refine the handling of fragment request.
- Fix a high CPU bug introduced in 3.3.0. (#2449)
- Enlarge the socket buffer size to 16KB.
- Fix the empty list bug in ss-manager.
- Fix the IPv6 address parser.
- Fix a bug of port parser.
- Fix a crash with MinGW.
- Refine SIP003 plugin interface.
- Remove connection timeout from all clients.
- Fix the alignment bug again.
- Fix a bug on 32-bit arch.
- Add TCP fast open support to ss-tunnel by @PantherJohn.
Список пакетов
openSUSE Leap 15.1
libshadowsocks-libev2-3.3.3-lp151.2.3.1
shadowsocks-libev-3.3.3-lp151.2.3.1
shadowsocks-libev-devel-3.3.3-lp151.2.3.1
shadowsocks-libev-doc-3.3.3-lp151.2.3.1
Ссылки
- E-Mail link for openSUSE-SU-2019:2667-1
- SUSE Security Ratings
- SUSE Bug 1158251
- SUSE Bug 1158365
- SUSE CVE CVE-2019-5163 page
- SUSE CVE CVE-2019-5164 page
Описание
An exploitable denial-of-service vulnerability exists in the UDPRelay functionality of Shadowsocks-libev 3.3.2. When utilizing a Stream Cipher and a local_address, arbitrary UDP packets can cause a FATAL error code path and exit. An attacker can send arbitrary UDP packets to trigger this vulnerability.
Затронутые продукты
openSUSE Leap 15.1:libshadowsocks-libev2-3.3.3-lp151.2.3.1
openSUSE Leap 15.1:shadowsocks-libev-3.3.3-lp151.2.3.1
openSUSE Leap 15.1:shadowsocks-libev-devel-3.3.3-lp151.2.3.1
openSUSE Leap 15.1:shadowsocks-libev-doc-3.3.3-lp151.2.3.1
Ссылки
- CVE-2019-5163
- SUSE Bug 1158251
Описание
An exploitable code execution vulnerability exists in the ss-manager binary of Shadowsocks-libev 3.3.2. Specially crafted network packets sent to ss-manager can cause an arbitrary binary to run, resulting in code execution and privilege escalation. An attacker can send network packets to trigger this vulnerability.
Затронутые продукты
openSUSE Leap 15.1:libshadowsocks-libev2-3.3.3-lp151.2.3.1
openSUSE Leap 15.1:shadowsocks-libev-3.3.3-lp151.2.3.1
openSUSE Leap 15.1:shadowsocks-libev-devel-3.3.3-lp151.2.3.1
openSUSE Leap 15.1:shadowsocks-libev-doc-3.3.3-lp151.2.3.1
Ссылки
- CVE-2019-5164
- SUSE Bug 1158365