openSUSE: 2021:1640-1 moderate: c-toxcore
Description
c-toxcore was updated fo fix a securiy issue: - CVE-2021-44847: Fixed a buffer overflow in handle_request in DHT.c which could lead to remote DoS and potential code execution (boo#1193667)
Patch
Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.2: zypper in -t patch openSUSE-2021-1640=1 - openSUSE Backports SLE-15-SP3: zypper in -t patch openSUSE-2021-1640=1 - openSUSE Backports SLE-15-SP2: zypper in -t patch openSUSE-2021-1640=1 - openSUSE Backports SLE-15-SP1: zypper in -t patch openSUSE-2021-1640=1
Package List
- openSUSE Leap 15.2 (x86_64): c-toxcore-0.2.13-lp152.3.3.1 c-toxcore-daemon-0.2.13-lp152.3.3.1 c-toxcore-daemon-debuginfo-0.2.13-lp152.3.3.1 c-toxcore-debuginfo-0.2.13-lp152.3.3.1 c-toxcore-devel-0.2.13-lp152.3.3.1 libtoxcore2-0.2.13-lp152.3.3.1 libtoxcore2-debuginfo-0.2.13-lp152.3.3.1 - openSUSE Backports SLE-15-SP3 (aarch64 i586 ppc64le s390x x86_64): c-toxcore-0.2.13-bp153.2.3.1 c-toxcore-daemon-0.2.13-bp153.2.3.1 c-toxcore-daemon-debuginfo-0.2.13-bp153.2.3.1 c-toxcore-debuginfo-0.2.13-bp153.2.3.1 c-toxcore-devel-0.2.13-bp153.2.3.1 libtoxcore2-0.2.13-bp153.2.3.1 libtoxcore2-debuginfo-0.2.13-bp153.2.3.1 - openSUSE Backports SLE-15-SP2 (aarch64 ppc64le s390x x86_64): c-toxcore-0.2.13-bp152.4.3.1 c-toxcore-daemon-0.2.13-bp152.4.3.1 c-toxcore-daemon-debuginfo-0.2.13-bp152.4.3.1 c-toxcore-debuginfo-0.2.13-bp152.4.3.1 c-toxcore-devel-0.2.13-bp152.4.3.1 libtoxcore2-0.2.13-bp152.4.3.1 libtoxcore2-debuginfo-0.2.13-bp152.4.3.1 - openSUSE Backports SLE-15-SP1 (aarch64 ppc64le s390x x86_64): c-toxcore-0.2.13-bp151.3.3.1 c-toxcore-daemon-0.2.13-bp151.3.3.1 c-toxcore-devel-0.2.13-bp151.3.3.1 libtoxcore2-0.2.13-bp151.3.3.1
References
https://www.suse.com/security/cve/CVE-2021-44847.html https://bugzilla.suse.com/1193667