libevent (2.0.21-stable-2ubuntu0.16.04.1) xenial-security; urgency=medium

  * SECURITY UPDATE: buffer overread in name_parse()
    - debian/patches/CVE-2016-10195.patch: fix length check in evdns.c.
    - CVE-2016-10195
  * SECURITY UPDATE: integer overflow in evutil_parse_sockaddr_port()
    - debian/patches/CVE-2016-10196.patch: use size_t for length in
      evutil.c.
    - CVE-2016-10196
  * SECURITY UPDATE: OOB read via empty hostname
    - debian/patches/CVE-2016-10197-1.patch: check result in evdns.c.
    - debian/patches/CVE-2016-10197-2.patch: add test to
      test/regress_dns.c.
    - CVE-2016-10197

Date: 2017-03-10 19:43:34.532661+00:00
Changed-By: Marc Deslauriers <marc.deslauri...@canonical.com>
Signed-By: Ubuntu Archive Robot 
<cjwatson+ubuntu-archive-ro...@chiark.greenend.org.uk>
https://launchpad.net/ubuntu/+source/libevent/2.0.21-stable-2ubuntu0.16.04.1
Sorry, changesfile not available.
-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes

Reply via email to