Already answered yesterday. https://lists.torproject.org/pipermail/tor-talk/2015-January/036379.html On 01/06/2015 09:50 PM, Nikolas Raiser wrote: > Hi folks, > > can anyone tell me if Tor, since it uses libevent, is affected by this > vulnerability "Advisory: integer overflow in evbuffers for Libevent <= > 1.4.14b,2.0.21,2.1.4-alpha [CVE-2014-6272]" > http://archives.seul.org/libevent/users/Jan-2015/msg00010.html . > Thanks a lot in advance! > Yours, > Nick > -- PGP fingerprint: 8516 5FFC 011A 6465 D042 6AC1 D719 1F41 B7CE EDFF OTR fingerprint OFTC: FF6D1AC2 13F38B15 EDB21522 D3530A6F 6EE01996 OTR fingerprint freenode: 293FAFD3 1155A465 C5B77015 B65E8AEC 63A1AF21 Full PGP public key: https://justaguy.pw
Attachment:
signature.asc
Description: OpenPGP digital signature
-- tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk