CVE-2016-10195

Priority
Medium
Description
The name_parse function in evdns.c in libevent before 2.1.6-beta allows
remote attackers to have unspecified impact via vectors involving the
label_len variable, which triggers an out-of-bounds stack read.
References
Bugs
Package
Upstream:needs-triage
Ubuntu 17.10 (Artful Aardvark):released (1:52.1.1+build1-0ubuntu1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 LTS (Trusty Tahr):released (1:52.1.1+build1-0ubuntu0.14.04.1)
Ubuntu Core 15.04:DNE
Ubuntu 16.04 LTS (Xenial Xerus):released (1:52.1.1+build1-0ubuntu0.16.04.1)
Ubuntu 17.04 (Zesty Zapus):released (1:52.1.1+build1-0ubuntu0.17.04.1)
Package
Upstream:released (53.0)
Ubuntu 17.10 (Artful Aardvark):released (54.0+build3-0ubuntu1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was ignored)
Ubuntu 14.04 LTS (Trusty Tahr):released (53.0+build6-0ubuntu0.14.04.1)
Ubuntu Core 15.04:DNE
Ubuntu 16.04 LTS (Xenial Xerus):released (53.0+build6-0ubuntu0.16.04.1)
Ubuntu 17.04 (Zesty Zapus):released (53.0+build6-0ubuntu0.17.04.1)
Package
Upstream:released (2.0.21-stable-3)
Ubuntu 17.10 (Artful Aardvark):released (2.0.21-stable-3)
Ubuntu 12.04 ESM (Precise Pangolin):released (2.0.16-stable-1ubuntu0.2)
Ubuntu 14.04 LTS (Trusty Tahr):released (2.0.21-stable-1ubuntu1.14.04.2)
Ubuntu Core 15.04:DNE
Ubuntu 16.04 LTS (Xenial Xerus):released (2.0.21-stable-2ubuntu0.16.04.1)
Ubuntu 17.04 (Zesty Zapus):released (2.0.21-stable-3)
Patches:
Upstream:https://github.com/libevent/libevent/commit/96f64a022014a208105ead6c8a7066018449d86d
More Information

Updated: 2017-08-15 21:14:14 UTC (commit 13105)