[v3.1] privoxy: multiple fixes (CVE-2015-1030, CVE-2015-1031 etc.)
Privoxy 3.0.23 stable is a bug-fix release, but some of the fixed bugs
are security issues (CVE requests pending).
Alpine branches are from 3.0.21 to 3.0.22 at the moment and should be
upgraded to 3.0.23.
•Version 3.0.23 stable *
- Bug fixes:
- Fixed a DoS issue in case of client requests with incorrect chunk-encoded body. When compiled with assertions enabled (the default) they could previously cause Privoxy to abort(). Reported by Matthew Daley.
- Fixed multiple segmentation faults and memory leaks in the pcrs code. This fix also increases the chances that an invalid pcrs command is rejected as such. Previously some invalid commands would be loaded without error. Note that Privoxy’s pcrs sources (action and filter files) are considered trustworthy input and should not be writable by untrusted third-parties.
- Fixed an ‘invalid read’ bug which could at least theoretically cause Privoxy to crash. So far, no crashes have been observed.
- Compiles with —disable-force again. Reported by Kai Raven.
- Client requests with body that can’t be delivered no longer cause pipelined requests behind them to be rejected as invalid. Reported by Basil Hussain.
Some of the issues fixed in 3.0.22 (actual for Alpine Linux v2.6 up to v3.0) are CVE-2015-1030 and CVE-2015-1031.
References:
http://seclists.org/oss-sec/2015/q1/111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1030
http://www.privoxy.org/announce.txt
(from redmine: issue id 3839, created on 2015-01-29, closed on 2015-02-04)
- Relations:
- parent #3835 (closed)
- Changesets:
- Revision 0ffbacb7 by Natanael Copa on 2015-01-30T10:19:00Z:
main/privoxy: security upgrade to 3.0.23 (CVE-2015-1030, CVE-2015-1031)
fixes #3839
(cherry picked from commit b49992f595070138cedb536b7320199788836015)