Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1144646 - (CVE-2014-6272) CVE-2014-6272 libevent: potential heap overflow in buffer/bufferevent APIs
CVE-2014-6272 libevent: potential heap overflow in buffer/bufferevent APIs
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20150105,repor...
: Security
Depends On: 1178963
Blocks: 1144648
  Show dependency treegraph
 
Reported: 2014-09-20 00:30 EDT by Vincent Danen
Modified: 2018-01-29 20:03 EST (History)
4 users (show)

See Also:
Fixed In Version: libevent 1.4.15, libevent 2.0.22, libevent 2.1.5
Doc Type: Bug Fix
Doc Text:
Multiple integer overflow flaws were found in the libevent's evbuffer API. An attacker able to make an application pass an excessively long input to the libevent via evbuffer API could use this flaws to make application enter an infinite loop, crash, and, possibly, execute arbitrary code.
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
Upstream patch for 1.4 (2.11 KB, patch)
2014-11-14 09:49 EST, Tomas Hoger
no flags Details | Diff
Upstream patch for 2.0 (6.54 KB, patch)
2014-11-14 09:51 EST, Tomas Hoger
no flags Details | Diff
Updated upstream patch for 2.0 (8.14 KB, patch)
2015-01-02 04:08 EST, Tomas Hoger
no flags Details | Diff
Updated upstream patch for 2.1 (8.01 KB, patch)
2015-01-02 04:09 EST, Tomas Hoger
no flags Details | Diff

  None (edit)
Description Vincent Danen 2014-09-20 00:30:29 EDT
A defect in the Libevent evbuffer API could possibly leave some programs that use the evbuffer API open to potential heap overflows.  A program using the evbuffer_add(), evbuffer_expand(), or bufferevent_write() functions in Libevent 1.4 may be vulnerable if an attacker is able to coax the linked program into trying to make a buffer larger than that which would fit into a single size_t.  Similarly, for Libevent 2.0 and later, a program may be vulnerable if it uses the evbuffer_add(), evbuffer_prepend(), evbuffer_expand(), exbuffer_reserve_space(), or evbuffer_read() functions if an attacker is able to coax the linked program into trying to make a buffer chunk larger than that which will fit into a single size_t.

Upstream has attempted to identify any programs using Libevent in a vulnerable way and has not as of yet found any that do.  As a precaution, upstream recommends patching/upgrading Libevent to protect against this sort of scenario.  Upstream will be releasing Libevent 1.4.15-stable and 2.0.22-stable, as well as 2.1.5-alpha, to correct this issue.


Acknowledgements:

Red Hat would like to thank Nick Mathewson of Libevent upstream for reporting this issue. Upstream acknowledges Andrew Bartlett of Catalyst as the original reporter.
Comment 4 Tomas Hoger 2014-11-14 09:49:27 EST
Created attachment 957618 [details]
Upstream patch for 1.4
Comment 5 Tomas Hoger 2014-11-14 09:51:31 EST
Created attachment 957619 [details]
Upstream patch for 2.0
Comment 9 Tomas Hoger 2015-01-02 04:08:25 EST
Created attachment 975152 [details]
Updated upstream patch for 2.0
Comment 10 Tomas Hoger 2015-01-02 04:09:20 EST
Created attachment 975153 [details]
Updated upstream patch for 2.1
Comment 12 Tomas Hoger 2015-01-05 14:19:04 EST
Created libevent tracking bugs for this issue:

Affects: fedora-all [bug 1178963]
Comment 13 Francisco Alonso 2015-02-25 10:05:28 EST
Statement:

This issue affects the versions of libevent as shipped with Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Red Hat Enterprise Linux 5 is now in Production 3 Phase of the support and
maintenance life cycle. This issue is not planned to be addressed in Red Hat
Enterprise Linux 5. For additional information, refer to the Red Hat Enterprise
Linux Life Cycle:https://access.redhat.com/support/policy/updates/errata/.

Note You need to log in before you can comment on or make changes to this bug.