First published: Thu Feb 02 2017(Updated: )
A vulnerability was found in libevent. The name_parse() function in libevent's DNS code is vulnerable to a buffer overread. Upstream bug: <a href="https://github.com/libevent/libevent/issues/317">https://github.com/libevent/libevent/issues/317</a> Upstream patch: <a href="https://github.com/libevent/libevent/commit/96f64a022014a208105ead6c8a7066018449d86d">https://github.com/libevent/libevent/commit/96f64a022014a208105ead6c8a7066018449d86d</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Libevent Project Libevent | <=2.1.5 | |
Debian Debian Linux | =8.0 | |
debian/libevent | 2.1.12-stable-1 2.1.12-stable-8 2.1.12-stable-10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.