openSUSE: 2021:1646-1 important: privoxy
Description
This update for privoxy fixes the following issues: privoxy was updated to 3.0.33 (boo#1193584): * CVE-2021-44543: Encode the template name to prevent XSS (cross-side scripting) when Privoxy is configured to servce the user-manual itself * CVE-2021-44540: Free memory of compiled pattern spec before bailing * CVE-2021-44541: Free header memory when failing to get the request destination. * CVE-2021-44542: Prevent memory leaks when handling errors * Disable fast-redirects for a number of domains * Update default block lists * Many bug fixes and minor enhancements
Patch
Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.2: zypper in -t patch openSUSE-2021-1646=1 - openSUSE Backports SLE-15-SP3: zypper in -t patch openSUSE-2021-1646=1
Package List
- openSUSE Leap 15.2 (x86_64): privoxy-3.0.33-lp152.3.12.1 privoxy-debuginfo-3.0.33-lp152.3.12.1 privoxy-debugsource-3.0.33-lp152.3.12.1 - openSUSE Leap 15.2 (noarch): privoxy-doc-3.0.33-lp152.3.12.1 - openSUSE Backports SLE-15-SP3 (aarch64 i586 ppc64le s390x x86_64): privoxy-3.0.33-bp153.2.3.1 - openSUSE Backports SLE-15-SP3 (noarch): privoxy-doc-3.0.33-bp153.2.3.1
References
https://www.suse.com/security/cve/CVE-2021-44540.html https://www.suse.com/security/cve/CVE-2021-44541.html https://www.suse.com/security/cve/CVE-2021-44542.html https://www.suse.com/security/cve/CVE-2021-44543.html https://bugzilla.suse.com/1193584