Mageia 2021-0570: privoxy security update | LinuxSecurity.com

Advisories

MGASA-2021-0570 - Updated privoxy packages fix security vulnerabilities

Publication date: 19 Dec 2021
URL: https://advisories.mageia.org/MGASA-2021-0570.html
Type: security
Affected Mageia releases: 8
CVE: CVE-2021-44540,
     CVE-2021-44541,
     CVE-2021-44542,
     CVE-2021-44543

Updated privoxy packages fix security vulnerabilities:

A security issue has been found in Privoxy before version 3.0.33.
get_url_spec_param() did not free memory of compiled pattern spec
before bailing (CVE-2021-44540).

A security issue has been found in Privoxy before version 3.0.33.
process_encrypted_request_headers() did not free header memory when
failing to get the request destination (CVE-2021-44541).

A security issue has been found in Privoxy before version 3.0.33.
send_http_request() leaked memory when handling errors (CVE-2021-44542).

A security issue has been found in Privoxy before version 3.0.33.
cgi_error_no_template() did not encode the template name, which could
lead to cross-site scripting when Privoxy is configured to servce the
user-manual itself (CVE-2021-44543).

References:
- https://bugs.mageia.org/show_bug.cgi?id=29745
- https://www.privoxy.org/announce.txt
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44540
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44541
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44542
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44543

SRPMS:
- 8/core/privoxy-3.0.32-1.1.mga8

Mageia 2021-0570: privoxy security update

Updated privoxy packages fix security vulnerabilities: A security issue has been found in Privoxy before version 3.0.33

Summary

Updated privoxy packages fix security vulnerabilities:
A security issue has been found in Privoxy before version 3.0.33. get_url_spec_param() did not free memory of compiled pattern spec before bailing (CVE-2021-44540).
A security issue has been found in Privoxy before version 3.0.33. process_encrypted_request_headers() did not free header memory when failing to get the request destination (CVE-2021-44541).
A security issue has been found in Privoxy before version 3.0.33. send_http_request() leaked memory when handling errors (CVE-2021-44542).
A security issue has been found in Privoxy before version 3.0.33. cgi_error_no_template() did not encode the template name, which could lead to cross-site scripting when Privoxy is configured to servce the user-manual itself (CVE-2021-44543).

References

- https://bugs.mageia.org/show_bug.cgi?id=29745

- https://www.privoxy.org/announce.txt

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44540

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44541

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44542

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44543

Resolution

MGASA-2021-0570 - Updated privoxy packages fix security vulnerabilities

SRPMS

- 8/core/privoxy-3.0.32-1.1.mga8

Severity
Publication date: 19 Dec 2021
URL: https://advisories.mageia.org/MGASA-2021-0570.html
Type: security
CVE: CVE-2021-44540, CVE-2021-44541, CVE-2021-44542, CVE-2021-44543

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.