Slackware: 2016-085-01: libevent Security Update
Summary
Here are the details from the Slackware 14.1 ChangeLog: patches/packages/libevent-2.0.22-i486-1_slack14.1.txz: Upgraded. Multiple integer overflows in the evbuffer API allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_expand, or (3) bufferevent_write function, which triggers a heap-based buffer overflow or an infinite loop. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6272 (* Security fix *)
Where Find New Packages
Thanks to the friendly folks at the OSU Open Source Lab
(https://osuosl.org/) for donating FTP and rsync hosting
to the Slackware project! :-)
Also see the "Get Slack" section on http://www.slackware.com/ for
additional mirror sites near you.
Updated package for Slackware 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/libevent-2.0.22-i486-1_slack14.1.txz
Updated package for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/libevent-2.0.22-x86_64-1_slack14.1.txz
Updated package for Slackware -current:
Updated package for Slackware x86_64 -current:
MD5 Signatures
Slackware 14.1 package:
ab84c0702044de88f1b051ed3d3d1c40 libevent-2.0.22-i486-1_slack14.1.txz
Slackware x86_64 14.1 package:
bc5d1dff8d2f3758b0feddf00d2c6229 libevent-2.0.22-x86_64-1_slack14.1.txz
Slackware -current package:
b195a6e34b8ce7043da6cd57670db4a7 l/libevent-2.0.22-i586-1.txz
Slackware x86_64 -current package:
7a755ece3e378f244a3c327369e7f2ac l/libevent-2.0.22-x86_64-1.txz
Installation Instructions
Installation instructions: Upgrade the package as root: # upgradepkg libevent-2.0.22-i486-1_slack14.1.txz