[USN-3228-1] libevent vulnerabilities
Severity
Medium
Affected Packages
12
CVEs
3
Several security issues were fixed in libevent.
Guido Vranken discovered that libevent incorrectly handled memory when
processing certain data. A remote attacker could possibly use this issue
with an application that uses libevent to cause a denial of service, or
possibly execute arbitrary code.
- ID
- USN-3228-1
- Severity
- medium
- URL
- https://ubuntu.com/security/notices/USN-3228-1
- Published
-
2017-03-13T16:48:55
(7 years ago) - Modified
-
2017-03-13T16:48:55
(7 years ago) - Other Advisories
-
- ALPINE:CVE-2016-10195
- ALPINE:CVE-2016-10196
- ALPINE:CVE-2016-10197
- DSA-3789-1
- ELSA-2017-1201
- FREEBSD:B8EE7A81-A879-4358-9B30-7DD1BD4C14B1
- GLSA-201705-01
- GLSA-201802-03
- MFSA-2017-10
- MFSA-2017-11
- MFSA-2017-12
- MFSA-2017-13
- RHSA-2017:1104
- RHSA-2017:1106
- RHSA-2017:1201
- SUSE-SU-2017:1669-1
- SUSE-SU-2017:2235-1
- SUSE-SU-2018:0200-1
- SUSE-SU-2018:0263-1
- USN-3278-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/libevent-pthreads-2.0-5?distro=xenial | ubuntu | libevent-pthreads-2.0-5 | < 2.0.21-stable-2ubuntu0.16.04.1 | xenial | ||
Affected | pkg:deb/ubuntu/libevent-pthreads-2.0-5?distro=trusty | ubuntu | libevent-pthreads-2.0-5 | < 2.0.21-stable-1ubuntu1.14.04.2 | trusty | ||
Affected | pkg:deb/ubuntu/libevent-openssl-2.0-5?distro=xenial | ubuntu | libevent-openssl-2.0-5 | < 2.0.21-stable-2ubuntu0.16.04.1 | xenial | ||
Affected | pkg:deb/ubuntu/libevent-openssl-2.0-5?distro=trusty | ubuntu | libevent-openssl-2.0-5 | < 2.0.21-stable-1ubuntu1.14.04.2 | trusty | ||
Affected | pkg:deb/ubuntu/libevent-extra-2.0-5?distro=xenial | ubuntu | libevent-extra-2.0-5 | < 2.0.21-stable-2ubuntu0.16.04.1 | xenial | ||
Affected | pkg:deb/ubuntu/libevent-extra-2.0-5?distro=trusty | ubuntu | libevent-extra-2.0-5 | < 2.0.21-stable-1ubuntu1.14.04.2 | trusty | ||
Affected | pkg:deb/ubuntu/libevent-dev?distro=xenial | ubuntu | libevent-dev | < 2.0.21-stable-2ubuntu0.16.04.1 | xenial | ||
Affected | pkg:deb/ubuntu/libevent-dev?distro=trusty | ubuntu | libevent-dev | < 2.0.21-stable-1ubuntu1.14.04.2 | trusty | ||
Affected | pkg:deb/ubuntu/libevent-core-2.0-5?distro=xenial | ubuntu | libevent-core-2.0-5 | < 2.0.21-stable-2ubuntu0.16.04.1 | xenial | ||
Affected | pkg:deb/ubuntu/libevent-core-2.0-5?distro=trusty | ubuntu | libevent-core-2.0-5 | < 2.0.21-stable-1ubuntu1.14.04.2 | trusty | ||
Affected | pkg:deb/ubuntu/libevent-2.0-5?distro=xenial | ubuntu | libevent-2.0-5 | < 2.0.21-stable-2ubuntu0.16.04.1 | xenial | ||
Affected | pkg:deb/ubuntu/libevent-2.0-5?distro=trusty | ubuntu | libevent-2.0-5 | < 2.0.21-stable-1ubuntu1.14.04.2 | trusty |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |