Bug 37451 - libevent: Integer overflow (3.2)
libevent: Integer overflow (3.2)
Status: RESOLVED DUPLICATE of bug 43554
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 4.0
Other Linux
: P5 normal (vote)
: UCS 3.2-x-errata
Assigned To: Security maintainers
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2015-01-06 07:13 CET by Moritz Muehlenhoff
Modified: 2017-02-15 21:25 CET (History)
1 user (show)

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score:
requate: Patch_Available+


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Moritz Muehlenhoff univentionstaff 2015-01-06 07:13:39 CET
CVE-2014-6272

The evbuffer API in libevent is affected by an integer overflow which potentially allows a heap overflow or denial of service (ATM no existing application is known which uses the API in an affected manner).
Comment 1 Arvid Requate univentionstaff 2015-05-07 17:39:10 CEST
Fixed in upstream Debian package version 1.4.13-stable-1+deb6u1
Comment 2 Arvid Requate univentionstaff 2017-02-15 21:25:12 CET

*** This bug has been marked as a duplicate of bug 43554 ***