openSUSE-SU-2018:0220-1: moderate: Security update for libevent
openSUSE Security Update: Security update for libevent ______________________________________________________________________________ Announcement ID: openSUSE-SU-2018:0220-1 Rating: moderate References: #1022917 #1022918 #1022919 Cross-References: CVE-2016-10195 CVE-2016-10196 CVE-2016-10197 Affected Products: openSUSE Leap 42.3 openSUSE Leap 42.2 ______________________________________________________________________________ An update that fixes three vulnerabilities is now available. Description: This update for libevent fixes the following security issues: - CVE-2016-10195: DNS remote stack overread vulnerability (bsc#1022917) - CVE-2016-10196: stack/buffer overflow in evutil_parse_sockaddr_port() (bsc#1022918) - CVE-2016-10197: out-of-bounds read in search_make_new() (bsc#1022919) This update was imported from the SUSE:SLE-12:Update update project. Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.3: zypper in -t patch openSUSE-2018-95=1 - openSUSE Leap 42.2: zypper in -t patch openSUSE-2018-95=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.3 (i586 x86_64): libevent-2_0-5-2.0.21-10.1 libevent-2_0-5-debuginfo-2.0.21-10.1 libevent-debugsource-2.0.21-10.1 libevent-devel-2.0.21-10.1 - openSUSE Leap 42.3 (x86_64): libevent-2_0-5-32bit-2.0.21-10.1 libevent-2_0-5-debuginfo-32bit-2.0.21-10.1 - openSUSE Leap 42.2 (i586 x86_64): libevent-2_0-5-2.0.21-7.3.1 libevent-2_0-5-debuginfo-2.0.21-7.3.1 libevent-debugsource-2.0.21-7.3.1 libevent-devel-2.0.21-7.3.1 - openSUSE Leap 42.2 (x86_64): libevent-2_0-5-32bit-2.0.21-7.3.1 libevent-2_0-5-debuginfo-32bit-2.0.21-7.3.1 References: https://www.suse.com/security/cve/CVE-2016-10195.html https://www.suse.com/security/cve/CVE-2016-10196.html https://www.suse.com/security/cve/CVE-2016-10197.html https://bugzilla.suse.com/1022917 https://bugzilla.suse.com/1022918 https://bugzilla.suse.com/1022919
participants (1)
-
opensuse-security@opensuse.org