CVE-2016-10195

Priority
Description
The name_parse function in evdns.c in libevent before 2.1.6-beta allows
remote attackers to have unspecified impact via vectors involving the
label_len variable, which triggers an out-of-bounds stack read.
Notes
Package
Upstream:released (53.0)
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was ignored)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was released [53.0+build6-0ubuntu0.14.04.1])
Ubuntu 16.04 LTS (Xenial Xerus):released (53.0+build6-0ubuntu0.16.04.1)
Package
Upstream:released (2.0.21-stable-3)
Ubuntu 12.04 ESM (Precise Pangolin):released (2.0.16-stable-1ubuntu0.2)
Ubuntu 14.04 ESM (Trusty Tahr):released (2.0.21-stable-1ubuntu1.14.04.2)
Ubuntu 16.04 LTS (Xenial Xerus):released (2.0.21-stable-2ubuntu0.16.04.1)
Patches:
Upstream:https://github.com/libevent/libevent/commit/96f64a022014a208105ead6c8a7066018449d86d
Package
Priority: Low
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was released [1:52.1.1+build1-0ubuntu0.14.04.1])
Ubuntu 16.04 LTS (Xenial Xerus):released (1:52.1.1+build1-0ubuntu0.16.04.1)
More Information

Updated: 2020-03-18 22:43:16 UTC (commit 2ea7df7bd1e69e1e489978d2724a936eb3faa1b8)