First published: Thu Feb 02 2017(Updated: )
A vulnerability was found in libevent. There is an out-of-bounds read in the DNS code of Libevent. Upstream bug: <a href="https://github.com/libevent/libevent/issues/332">https://github.com/libevent/libevent/issues/332</a> Upstream patch: <a href="https://github.com/libevent/libevent/commit/ec65c42052d95d2c23d1d837136d1cf1d9ecef9e">https://github.com/libevent/libevent/commit/ec65c42052d95d2c23d1d837136d1cf1d9ecef9e</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/libevent | 2.1.12-stable-1 2.1.12-stable-8 2.1.12-stable-10 | |
Debian Linux | =8.0 | |
Red Hat Libevent | <=2.1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10197 is classified as a moderate severity vulnerability due to its potential for out-of-bounds reads.
To fix CVE-2016-10197, update libevent to version 2.1.12-stable-1 or later.
CVE-2016-10197 affects multiple versions of the libevent library, particularly versions prior to 2.1.12-stable-1.
CVE-2016-10197 is an out-of-bounds read vulnerability found in the DNS code of libevent.
You can identify vulnerability to CVE-2016-10197 by checking if your version of libevent is older than 2.1.12-stable-1.