MGASA-2015-0009

Source
https://advisories.mageia.org/MGASA-2015-0009.html
Import Source
https://advisories.mageia.org/MGASA-2015-0009.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2015-0009
Related
Published
2015-01-07T15:14:58Z
Modified
2015-01-07T15:05:40Z
Summary
Updated libevent packages fix CVE-2014-6272
Details

Updated libevent packages fix security vulnerability:

Andrew Bartlett of Catalyst reported a defect affecting certain applications using the Libevent evbuffer API. This defect leaves applications which pass insanely large inputs to evbuffers open to a possible heap overflow or infinite loop. In order to exploit this flaw, an attacker needs to be able to find a way to provoke the program into trying to make a buffer chunk larger than what will fit into a single sizet or offt (CVE-2014-6272).

References
Credits

Affected packages

Mageia:4 / libevent

Package

Name
libevent
Purl
pkg:rpm/mageia/libevent?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.21-5.1.mga4

Ecosystem specific

{
    "section": "core"
}