Updated privoxy packages fix security vulnerabilities
Publication date: 19 Dec 2021Modification date: 19 Dec 2021
Type: security
Affected Mageia releases : 8
CVE: CVE-2021-44540 , CVE-2021-44541 , CVE-2021-44542 , CVE-2021-44543
Description
Updated privoxy packages fix security vulnerabilities: A security issue has been found in Privoxy before version 3.0.33. get_url_spec_param() did not free memory of compiled pattern spec before bailing (CVE-2021-44540). A security issue has been found in Privoxy before version 3.0.33. process_encrypted_request_headers() did not free header memory when failing to get the request destination (CVE-2021-44541). A security issue has been found in Privoxy before version 3.0.33. send_http_request() leaked memory when handling errors (CVE-2021-44542). A security issue has been found in Privoxy before version 3.0.33. cgi_error_no_template() did not encode the template name, which could lead to cross-site scripting when Privoxy is configured to servce the user-manual itself (CVE-2021-44543).
References
- https://bugs.mageia.org/show_bug.cgi?id=29745
- http://www.privoxy.org/announce.txt
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44540
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44541
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44542
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44543
SRPMS
8/core
- privoxy-3.0.32-1.1.mga8