Bug 1144646 (CVE-2014-6272)
| Summary: | CVE-2014-6272 libevent: potential heap overflow in buffer/bufferevent APIs | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Vincent Danen <vdanen> | ||||||||||
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||||||||
| Status: | CLOSED WONTFIX | QA Contact: | |||||||||||
| Severity: | medium | Docs Contact: | |||||||||||
| Priority: | medium | ||||||||||||
| Version: | unspecified | CC: | carnil, erack, gotiwari, jhorak, mvyas, nobody, security-response-team, steved, tpopela | ||||||||||
| Target Milestone: | --- | Keywords: | Security | ||||||||||
| Target Release: | --- | ||||||||||||
| Hardware: | All | ||||||||||||
| OS: | Linux | ||||||||||||
| Whiteboard: | |||||||||||||
| Fixed In Version: | libevent 1.4.15, libevent 2.0.22, libevent 2.1.5 | Doc Type: | Bug Fix | ||||||||||
| Doc Text: |
Multiple integer overflow flaws were found in the libevent's evbuffer API. An attacker able to make an application pass an excessively long input to the libevent via evbuffer API could use this flaws to make application enter an infinite loop, crash, and, possibly, execute arbitrary code.
|
Story Points: | --- | ||||||||||
| Clone Of: | Environment: | ||||||||||||
| Last Closed: | 2021-06-14 15:03:58 UTC | Type: | --- | ||||||||||
| Regression: | --- | Mount Type: | --- | ||||||||||
| Documentation: | --- | CRM: | |||||||||||
| Verified Versions: | Category: | --- | |||||||||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||||||||
| Embargoed: | |||||||||||||
| Bug Depends On: | 1178963 | ||||||||||||
| Bug Blocks: | 1144648 | ||||||||||||
| Attachments: |
|
||||||||||||
|
Description
Vincent Danen
2014-09-20 04:30:29 UTC
Created attachment 957618 [details]
Upstream patch for 1.4
Created attachment 957619 [details]
Upstream patch for 2.0
Created attachment 975152 [details]
Updated upstream patch for 2.0
Created attachment 975153 [details]
Updated upstream patch for 2.1
Fixed now upstream in versions 1.4.15, 2.0.22 and 2.1.5. Upstream advisory: http://archives.seul.org/libevent/users/Jan-2015/msg00010.html Announcements of new releases and git commits: 1.4: http://archives.seul.org/libevent/users/Jan-2015/msg00013.html https://github.com/libevent/libevent/commit/7b21c4eabf1f3946d3f63cce1319c490caab8ecf 2.0: http://archives.seul.org/libevent/users/Jan-2015/msg00012.html https://github.com/libevent/libevent/commit/20d6d4458bee5d88bda1511c225c25b2d3198d6c 2.1: http://archives.seul.org/libevent/users/Jan-2015/msg00011.html https://github.com/libevent/libevent/commit/841ecbd96105c84ac2e7c9594aeadbcc6fb38bc4 Created libevent tracking bugs for this issue: Affects: fedora-all [bug 1178963] Statement: This issue affects the versions of libevent as shipped with Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/. Red Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This issue is not planned to be addressed in Red Hat Enterprise Linux 5. For additional information, refer to the Red Hat Enterprise Linux Life Cycle:https://access.redhat.com/support/policy/updates/errata/. This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2014-6272 |