Users login

Create an account »

JOIN XATRIX

Users login

Home » Security Advisories» Debian » libevent security update

libevent security update

  • Vendor: Debian
  • Vendor ID: DSA 3789-1
  • Date: February 15, 2017


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3789-1 [email protected]
https://www.debian.org/security/ Sebastien Delafond
February 15, 2017 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : libevent
CVE ID : CVE-2016-10195 CVE-2016-10196 CVE-2016-10197
Debian Bug : 854092

Several vulnerabilities were discovered in libevent, an asynchronous
event notification library. They would lead to Denial Of Service via
application crash, or remote code execution.

For the stable distribution (jessie), these problems have been fixed in
version 2.0.21-stable-2+deb8u1.

For the unstable distribution (sid), these problems have been fixed in
version 2.0.21-stable-3.

We recommend that you upgrade your libevent packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]
-----BEGIN PGP SIGNATURE-----

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAlikWI0ACgkQEL6Jg/PV
nWT+CggAnD8JXfpNpmw0aQZPhPrKjNcNbfbaAFX3+YCcZlGgkr8G0Ql5iNgLzpE+
0X3+KasJV73gqJtY1fQs7eje1J/4GLUePzzZ0gaNwVpYdTk3BUYecGJiipe7yZBA
smoPDC4Ob8RN7LMnS7JlDtxb6yu3S++cl+UgVi3ArNAjkd2z7R5UJ7ou7hHlkI9I
H/MKpjjQp3sGK3sr9n/FyJ4VFzTqwP1vDQc32hIjp7a/E3Tga+UBeA7VCLCUufLV
BkWTS1Gn8oQsfGcRDhBTFWX2jGCfOC4JM3lXCtO++0xzkGbKB/4fls3TW8Foo4H8
u7Wr8dOr+xN7CJ5x+17eUCRk0N/GGg==
=YveA
-----END PGP SIGNATURE-----

Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.

Contact

Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »