{"affected":[{"ecosystem_specific":{"binaries":[{"libshadowsocks-libev2":"3.3.3-bp151.5.3.1","shadowsocks-libev":"3.3.3-bp151.5.3.1","shadowsocks-libev-devel":"3.3.3-bp151.5.3.1","shadowsocks-libev-doc":"3.3.3-bp151.5.3.1"}]},"package":{"ecosystem":"SUSE:Package Hub 15 SP1","name":"shadowsocks-libev","purl":"pkg:rpm/suse/shadowsocks-libev&distro=SUSE%20Package%20Hub%2015%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.3.3-bp151.5.3.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for shadowsocks-libev fixes the following issues:\n\n- Update version to 3.3.3\n  * Refine the handling of suspicious connections.\n  * Fix exploitable denial-of-service vulnerability exists in the \n    UDPRelay functionality (boo#1158251, CVE-2019-5163)\n  * Fix code execution vulnerability in the ss-manager binary \n    (boo#1158365, CVE-2019-5164)\n  * Refine the handling of fragment request.\n  * Fix a high CPU bug introduced in 3.3.0. (#2449)\n  * Enlarge the socket buffer size to 16KB.\n  * Fix the empty list bug in ss-manager.\n  * Fix the IPv6 address parser.\n  * Fix a bug of port parser.\n  * Fix a crash with MinGW.\n  * Refine SIP003 plugin interface.\n  * Remove connection timeout from all clients.\n  * Fix the alignment bug again.\n  * Fix a bug on 32-bit arch.\n  * Add TCP fast open support to ss-tunnel by @PantherJohn.\n\n  \nThis update was imported from the openSUSE:Leap:15.1:Update update project.","id":"openSUSE-SU-2020:0142-1","modified":"2020-01-29T16:47:06Z","published":"2020-01-29T16:47:06Z","references":[{"type":"ADVISORY","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HFLDA7RM24NKHWYO7TTYXW4LPNRRTJCB/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1158251"},{"type":"REPORT","url":"https://bugzilla.suse.com/1158365"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-5163"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-5164"}],"related":["CVE-2019-5163","CVE-2019-5164"],"summary":"Security update for shadowsocks-libev","upstream":["CVE-2019-5163","CVE-2019-5164"]}