|
Message-Id: <6A5EBF40-21D7-44B6-A3DD-C559B771BDC0@technologysecure.com> Date: Wed, 7 Jan 2015 19:40:12 -0500 From: Yury German <yurylie@...yweb.com> To: oss-security@...ts.openwall.com, cve-assign@...re.org Cc: fk@...iankeil.de Subject: CVE Request for Privoxy Version: 3.0.22 Privoxy Version 3.0.22 has two vulnerabilities that were fixed in the version of Privoxy 3.0.22. Can we please assign CVE(s) to this. Fixed a memory leak when rejecting client connections due to the socket limit being reached (CID 66382). This affected Privoxy 3.0.21 when compiled with IPv6 support (on most platforms this is the default). Fixed an immediate-use-after-free bug (CID 66394) and two additional unconfirmed use-after-free complaints made by Coverity scan (CID 66391, CID 66376). URL to the Page: http://www.privoxy.org/announce.txt <http://www.privoxy.org/announce.txt> Thank you, Yury German E-Mail: BlueKnight@...hnologysecure.com PGP/GPG Key ID: 35001B8C Content of type "text/html" skipped Download attachment "signature.asc" of type "application/pgp-signature" (843 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.