Guido Vranken discovered that libevent incorrectly handled memory when processing certain data. A remote attacker could possibly use this issue with an application that uses libevent to cause a denial of service, or possibly execute arbitrary code.
{ "availability": "No subscription required", "binaries": [ { "libevent-2.0-5-dbgsym": "2.0.21-stable-1ubuntu1.14.04.2", "libevent-dev": "2.0.21-stable-1ubuntu1.14.04.2", "libevent-pthreads-2.0-5-dbgsym": "2.0.21-stable-1ubuntu1.14.04.2", "libevent-core-2.0-5-dbgsym": "2.0.21-stable-1ubuntu1.14.04.2", "libevent-2.0-5": "2.0.21-stable-1ubuntu1.14.04.2", "libevent-extra-2.0-5": "2.0.21-stable-1ubuntu1.14.04.2", "libevent-dbg": "2.0.21-stable-1ubuntu1.14.04.2", "libevent-core-2.0-5": "2.0.21-stable-1ubuntu1.14.04.2", "libevent-openssl-2.0-5": "2.0.21-stable-1ubuntu1.14.04.2", "libevent-openssl-2.0-5-dbgsym": "2.0.21-stable-1ubuntu1.14.04.2", "libevent-pthreads-2.0-5": "2.0.21-stable-1ubuntu1.14.04.2", "libevent-dev-dbgsym": "2.0.21-stable-1ubuntu1.14.04.2", "libevent-extra-2.0-5-dbgsym": "2.0.21-stable-1ubuntu1.14.04.2" } ] }
{ "availability": "No subscription required", "binaries": [ { "libevent-2.0-5-dbgsym": "2.0.21-stable-2ubuntu0.16.04.1", "libevent-dev": "2.0.21-stable-2ubuntu0.16.04.1", "libevent-pthreads-2.0-5-dbgsym": "2.0.21-stable-2ubuntu0.16.04.1", "libevent-core-2.0-5-dbgsym": "2.0.21-stable-2ubuntu0.16.04.1", "libevent-2.0-5": "2.0.21-stable-2ubuntu0.16.04.1", "libevent-extra-2.0-5": "2.0.21-stable-2ubuntu0.16.04.1", "libevent-dbg": "2.0.21-stable-2ubuntu0.16.04.1", "libevent-core-2.0-5": "2.0.21-stable-2ubuntu0.16.04.1", "libevent-openssl-2.0-5": "2.0.21-stable-2ubuntu0.16.04.1", "libevent-openssl-2.0-5-dbgsym": "2.0.21-stable-2ubuntu0.16.04.1", "libevent-pthreads-2.0-5": "2.0.21-stable-2ubuntu0.16.04.1", "libevent-dev-dbgsym": "2.0.21-stable-2ubuntu0.16.04.1", "libevent-extra-2.0-5-dbgsym": "2.0.21-stable-2ubuntu0.16.04.1" } ] }