|
Message-ID: <52e2df07020643ae977e2f5fd739fe04@imshyb01.MITRE.ORG> Date: Thu, 2 Feb 2017 00:58:00 -0500 From: <cve-assign@...re.org> To: <leo@...ulari.name> CC: <cve-assign@...re.org>, <oss-security@...ts.openwall.com> Subject: Re: Bugs fixed in libevent 2.1.6 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 > [] https://github.com/libevent/libevent/issues/317 > libevent dns remote stack overread vulnerability Use CVE-2016-10195. > [] https://github.com/libevent/libevent/issues/318 > libevent (stack) buffer overflow in evutil_parse_sockaddr_port() Use CVE-2016-10196. > [] https://github.com/libevent/libevent/issues/332 > out-of-bounds read in search_make_new() Use CVE-2016-10197. - -- CVE Assignment Team M/S M300, 202 Burlington Road, Bedford, MA 01730 USA [ A PGP key is available for encrypted communications at http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJYkscCAAoJEHb/MwWLVhi2YewP/1u5OS30qLHSRq1rCr7C9kDL DE8/09mH0y5dgW0DPYllVLv6tUdQT9QwKoYQI/rWUYZ9j5oxEEeKo/Kr+klhTQLY cpvNrtZGhwTXynq/BC69s74n3mi8lXxxnV+XRwQgDKkdYSvaT19yrVG337WZKZq+ A03c78NJQEn6Gw/p7hyhGmQZA2AKO/DhqccSX4YlSKfarH3yhCd0rvionaclxyPa 2O+ldYbDElwFD1nfSBW8HLvjl3YeUgKFl0r1mqQSg/rCvYoEcXBfqJ5KmCFNI+3C eTkSZ2q7yWQBPIEkldQBEJAGP5LxXxAm0FWfuoj2VHFFl6I3Pm7R7oNULiEqKDeD rQ6SRQ43H0Qf8E6c3HkPGhRS9OI+pfcFrbX4hAtCwMVpWhdKwv4gYNI3yg9Mjnnp gfj7Uu0BESQupGBOPi9Ex2Am7k6JQSFUyz6Fzy3eHumCj4WxxjtWljVY8uevlu57 sL8P3esH15174t/iMhXw0SS+DEs4CiCk0vH1M2Qd2tEqoLHZ2TCNDoska9KdUifh hsJU9vxEn+uIZIKpffx/OIMntzoqCoRHlCgDNMiKZPW4oi6FYARzhLVnhkB/ayY0 f2ha9TBXUtm8m/S4KU0MKPfZWjiudFbS5yqYNJFfpVCT8GG04SFc4Zd4WYEo3Vih Nc8R5cRbqqFTMK1ZCcK9 =VKif -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.