You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa shadowsocks-libev

Sigurnosni nedostaci programskog paketa shadowsocks-libev

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LSU

openSUSE Security Update: Security update for shadowsocks-libev

Announcement ID: openSUSE-SU-2020:0142-1
Rating: moderate
References: #1158251 #1158365
Cross-References: CVE-2019-5163 CVE-2019-5164
Affected Products:
openSUSE Backports SLE-15-SP1

An update that fixes two vulnerabilities is now available.


This update for shadowsocks-libev fixes the following issues:

– Update version to 3.3.3
* Refine the handling of suspicious connections.
* Fix exploitable denial-of-service vulnerability exists in the UDPRelay
functionality (boo#1158251, CVE-2019-5163)
* Fix code execution vulnerability in the ss-manager binary
(boo#1158365, CVE-2019-5164)
* Refine the handling of fragment request.
* Fix a high CPU bug introduced in 3.3.0. (#2449)
* Enlarge the socket buffer size to 16KB.
* Fix the empty list bug in ss-manager.
* Fix the IPv6 address parser.
* Fix a bug of port parser.
* Fix a crash with MinGW.
* Refine SIP003 plugin interface.
* Remove connection timeout from all clients.
* Fix the alignment bug again.
* Fix a bug on 32-bit arch.
* Add TCP fast open support to ss-tunnel by @PantherJohn.

This update was imported from the openSUSE:Leap:15.1:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– openSUSE Backports SLE-15-SP1:

zypper in -t patch openSUSE-2020-142=1

Package List:

– openSUSE Backports SLE-15-SP1 (aarch64 ppc64le s390x x86_64):


– openSUSE Backports SLE-15-SP1 (noarch):



To unsubscribe, e-mail:
For additional commands, e-mail:

AutorVlatka Misic
Cert idNCERT-REF-2020-01-0001-ADV
More in Preporuke
Sigurnosni nedostatak programskog paketa SDL

Otkriven je sigurnosni nedostatak u programskom paketu SDL za operacijski sustav RHEL 8. Otkriveni nedostatak potencijalnim napadačima omogućuje rušenje servisa...