openSUSE: 2020:2092-1 moderate: c-ares
openSUSE: 2020:2092-1 moderate: c-ares
An update that fixes one vulnerability is now available.
openSUSE Security Update: Security update for c-ares ______________________________________________________________________________ Announcement ID: openSUSE-SU-2020:2092-1 Rating: moderate References: #1178882 Cross-References: CVE-2020-8277 Affected Products: openSUSE Leap 15.2 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for c-ares fixes the following issues: Version update to 1.17.0 * CVE-2020-8277: Fixed a Denial of Service through DNS request (bsc#1178882) * For further details see https://c-ares.haxx.se/changelog.html This update was imported from the SUSE:SLE-15:Update update project. Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.2: zypper in -t patch openSUSE-2020-2092=1 Package List: - openSUSE Leap 15.2 (i586 x86_64): c-ares-debugsource-1.17.0-lp152.2.3.1 c-ares-devel-1.17.0-lp152.2.3.1 c-ares-utils-1.17.0-lp152.2.3.1 c-ares-utils-debuginfo-1.17.0-lp152.2.3.1 libcares2-1.17.0-lp152.2.3.1 libcares2-debuginfo-1.17.0-lp152.2.3.1 - openSUSE Leap 15.2 (x86_64): libcares2-32bit-1.17.0-lp152.2.3.1 libcares2-32bit-debuginfo-1.17.0-lp152.2.3.1 References: https://www.suse.com/security/cve/CVE-2020-8277.html https://bugzilla.suse.com/1178882 _______________________________________________ openSUSE Security Announce mailing list -- This email address is being protected from spambots. You need JavaScript enabled to view it. To unsubscribe, email This email address is being protected from spambots. You need JavaScript enabled to view it. List Netiquette: https://en.opensuse.org/openSUSE:Mailing_list_netiquette List Archives: https://lists.opensuse.org/archives/list/This email address is being protected from spambots. You need JavaScript enabled to view it.