Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 7 Jan 2015 19:40:12 -0500
From: Yury German <yurylie@...yweb.com>
To: oss-security@...ts.openwall.com,
 cve-assign@...re.org
Cc: fk@...iankeil.de
Subject: CVE Request for Privoxy Version: 3.0.22

Privoxy Version 3.0.22 has two vulnerabilities that were fixed in the version of Privoxy 3.0.22. Can we please assign CVE(s) to this.

Fixed a memory leak when rejecting client connections due to
the socket limit being reached (CID 66382). This affected
Privoxy 3.0.21 when compiled with IPv6 support (on most
platforms this is the default).


Fixed an immediate-use-after-free bug (CID 66394) and two
additional unconfirmed use-after-free complaints made by
Coverity scan (CID 66391, CID 66376).

URL to the Page: http://www.privoxy.org/announce.txt <http://www.privoxy.org/announce.txt>


Thank you,
Yury German
E-Mail: BlueKnight@...hnologysecure.com

PGP/GPG Key ID: 35001B8C






Content of type "text/html" skipped

Download attachment "signature.asc" of type "application/pgp-signature" (843 bytes)

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ