libevent (2.0.21-stable-2ubuntu0.16.04.1) xenial-security; urgency=medium
* SECURITY UPDATE: buffer overread in name_parse()
- debian/patches/CVE-2016-10195.patch: fix length check in evdns.c.
- CVE-2016-10195
* SECURITY UPDATE: integer overflow in evutil_parse_sockaddr_port()
- debian/patches/CVE-2016-10196.patch: use size_t for length in
evutil.c.
- CVE-2016-10196
* SECURITY UPDATE: OOB read via empty hostname
- debian/patches/CVE-2016-10197-1.patch: check result in evdns.c.
- debian/patches/CVE-2016-10197-2.patch: add test to
test/regress_dns.c.
- CVE-2016-10197
Date: 2017-03-10 19:43:34.532661+00:00
Changed-By: Marc Deslauriers <marc.deslauri...@canonical.com>
https://launchpad.net/ubuntu/+source/libevent/2.0.21-stable-2ubuntu0.16.04.1
Sorry, changesfile not available.
--
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at:
https://lists.ubuntu.com/mailman/listinfo/xenial-changes