libevent: User-assisted execution of arbitrary code — GLSA 201502-07

Multiple integer overflow errors in libevent could result in execution of arbitrary code or Denial of Service.

Affected packages

dev-libs/libevent on all architectures
Affected versions < 2.0.22
Unaffected versions >= 2.0.22

Background

libevent is a library to execute a function when a specific event occurs on a file descriptor.

Description

Multiple integer overflow errors in libevent could cause a heap-based buffer overflow.

Impact

A context-dependent attacker could cause an application linked against libevent to pass an excessively long input through evbuffer, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All libevent users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-libs/libevent-2.0.22"
 

References

Release date
February 07, 2015

Latest revision
February 07, 2015: 1

Severity
normal

Exploitable
local, remote

Bugzilla entries