Date: Wed, 7 Jan 2015 19:40:12 -0500 From: Yury German <yurylie@...yweb.com> To: oss-security@...ts.openwall.com, cve-assign@...re.org Cc: fk@...iankeil.de Subject: CVE Request for Privoxy Version: 3.0.22 Privoxy Version 3.0.22 has two vulnerabilities that were fixed in the version of Privoxy 3.0.22. Can we please assign CVE(s) to this. Fixed a memory leak when rejecting client connections due to the socket limit being reached (CID 66382). This affected Privoxy 3.0.21 when compiled with IPv6 support (on most platforms this is the default). Fixed an immediate-use-after-free bug (CID 66394) and two additional unconfirmed use-after-free complaints made by Coverity scan (CID 66391, CID 66376). URL to the Page: http://www.privoxy.org/announce.txt <http://www.privoxy.org/announce.txt> Thank you, Yury German E-Mail: BlueKnight@...hnologysecure.com PGP/GPG Key ID: 35001B8C [ CONTENT OF TYPE text/html SKIPPED ] [ CONTENT OF TYPE application/pgp-signature SKIPPED ]
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ