Back to privoxy PTS page

Accepted privoxy 3.0.28-2+deb10u1 (source) into proposed-updates->stable-new, proposed-updates



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Mon, 08 Mar 2021 13:57:15 +0100
Source: privoxy
Architecture: source
Version: 3.0.28-2+deb10u1
Distribution: buster
Urgency: medium
Maintainer: Roland Rosenfeld <roland@debian.org>
Changed-By: Roland Rosenfeld <roland@debian.org>
Changes:
 privoxy (3.0.28-2+deb10u1) buster; urgency=medium
 .
   * 38_CVE-2021-20217: Prevent an assertion by a crafted CGI request
     (CVE-2021-20217).
   * 39_decompress_iob: Fix detection of insufficient data.
   * 40_CVE-2021-20216: Fix a memory leak (CVE-2021-20216).
   * 41_CVE-2020-35502: Fixed memory leaks when a response is buffered and
     the buffer limit is reached or Privoxy is running out of memory
     (CVE-2020-35502).
   * 42_CVE-2021-20209: Fixed a memory leak in the show-status CGI handler
     when no action files are configured (CVE-2021-20209).
   * 43_CVE-2021-20210: Fixed a memory leak in the show-status CGI handler
     when no filter files are configured (CVE-2021-20210).
   * 44_CVE-2021-20211: Fixes a memory leak when client tags are active
     (CVE-2021-20211).
   * 45_CVE-2021-20212: Fixed a memory leak if multiple filters are
     executed and the last one is skipped due to a pcre error (CVE-2021-20212).
   * 46_CVE-2021-20213: Prevent an unlikely dereference of a NULL-pointer
     that could result in a crash if accept-intercepted-requests was
     enabled, Privoxy failed to get the request destination from the Host
     header and a memory allocation failed (CVE-2021-20213).
   * 47_CVE-2021-20214: Fixed memory leaks in the client-tags CGI handler
     when client tags are configured and memory allocations fail
     (CVE-2021-20214).
   * 48_CVE-2021-20215: Fixed memory leaks in the show-status CGI handler
     when memory allocations fail (CVE-2021-20215).
   * 49_CVE-2021-20272: ssplit(): Remove an assertion that could be
     triggered with a crafted CGI request (CVE-2021-20272).
   * 50_CVE-2021-20273: cgi_send_banner(): Overrule invalid image types.
     Prevents a crash with a crafted CGI request if Privoxy is toggled off
     (CVE-2021-20273).
   * 51_CVE-2021-20275: chunked_body_is_complete(): Prevent invalid read of
     size two (CVE-2021-20275).
   * 52_CVE-2021-20276: Obsolete pcre: Prevent invalid memory accesses
     (CVE-2021-20276).
Checksums-Sha1:
 20f3cbedf95f6c898d584ba67053bc4279101214 2263 privoxy_3.0.28-2+deb10u1.dsc
 fa8f9f355a48afe94afcaef31c5404b2294c1043 1753809 privoxy_3.0.28.orig.tar.gz
 4e0777eb601ac08e6881641d2f36f097ed045995 833 privoxy_3.0.28.orig.tar.gz.asc
 31481843d358063ce87895fdd14d34397e61fb44 32540 privoxy_3.0.28-2+deb10u1.debian.tar.xz
 cae6dda5e97663a10f11438f768248b1d905b2bc 10334 privoxy_3.0.28-2+deb10u1_source.buildinfo
Checksums-Sha256:
 4519984b05271379ef1b7844bee841b3eaa927f76864c476208a2fd90f73bb70 2263 privoxy_3.0.28-2+deb10u1.dsc
 b5d78cc036aaadb3b7cf860e9d598d7332af468926a26e2d56167f1cb6f2824a 1753809 privoxy_3.0.28.orig.tar.gz
 bf4981d7c5da05019c5586d2e8785ad01e27813de3eb7f44c716df2dceb911c8 833 privoxy_3.0.28.orig.tar.gz.asc
 e5fc6c5ca4ee12dd8ce36784f7e1d19318743862b747b2e2aa02419a5f998a30 32540 privoxy_3.0.28-2+deb10u1.debian.tar.xz
 99dba0bdb603cef547cb0a6cd0fdf58d7e529e3875a27aa18e9d3718c5f58aa0 10334 privoxy_3.0.28-2+deb10u1_source.buildinfo
Files:
 38b274c5c7096976b5ab3fb5b5261374 2263 web optional privoxy_3.0.28-2+deb10u1.dsc
 c7e8900d5aff33d9a5fc37ac28154f21 1753809 web optional privoxy_3.0.28.orig.tar.gz
 72cd2e9835330ea3343165549a35d6ad 833 web optional privoxy_3.0.28.orig.tar.gz.asc
 341a1e9a75b2ce7b25138893b96b8e9a 32540 web optional privoxy_3.0.28-2+deb10u1.debian.tar.xz
 6386e355abc50370ffa7918df16e92a1 10334 web optional privoxy_3.0.28-2+deb10u1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=NCEW
-----END PGP SIGNATURE-----