Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 2 Feb 2017 00:58:00 -0500
From: <cve-assign@...re.org>
To: <leo@...ulari.name>
CC: <cve-assign@...re.org>, <oss-security@...ts.openwall.com>
Subject: Re: Bugs fixed in libevent 2.1.6

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> [] https://github.com/libevent/libevent/issues/317
> libevent dns remote stack overread vulnerability

Use CVE-2016-10195.


> [] https://github.com/libevent/libevent/issues/318
> libevent (stack) buffer overflow in evutil_parse_sockaddr_port()

Use CVE-2016-10196.


> [] https://github.com/libevent/libevent/issues/332
> out-of-bounds read in search_make_new()

Use CVE-2016-10197.


- -- 
CVE Assignment Team
M/S M300, 202 Burlington Road, Bedford, MA 01730 USA
[ A PGP key is available for encrypted communications at
  http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=VKif
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ