-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Mon, 08 Mar 2021 13:57:15 +0100 Source: privoxy Architecture: source Version: 3.0.28-2+deb10u1 Distribution: buster Urgency: medium Maintainer: Roland Rosenfeld <roland@debian.org> Changed-By: Roland Rosenfeld <roland@debian.org> Changes: privoxy (3.0.28-2+deb10u1) buster; urgency=medium . * 38_CVE-2021-20217: Prevent an assertion by a crafted CGI request (CVE-2021-20217). * 39_decompress_iob: Fix detection of insufficient data. * 40_CVE-2021-20216: Fix a memory leak (CVE-2021-20216). * 41_CVE-2020-35502: Fixed memory leaks when a response is buffered and the buffer limit is reached or Privoxy is running out of memory (CVE-2020-35502). * 42_CVE-2021-20209: Fixed a memory leak in the show-status CGI handler when no action files are configured (CVE-2021-20209). * 43_CVE-2021-20210: Fixed a memory leak in the show-status CGI handler when no filter files are configured (CVE-2021-20210). * 44_CVE-2021-20211: Fixes a memory leak when client tags are active (CVE-2021-20211). * 45_CVE-2021-20212: Fixed a memory leak if multiple filters are executed and the last one is skipped due to a pcre error (CVE-2021-20212). * 46_CVE-2021-20213: Prevent an unlikely dereference of a NULL-pointer that could result in a crash if accept-intercepted-requests was enabled, Privoxy failed to get the request destination from the Host header and a memory allocation failed (CVE-2021-20213). * 47_CVE-2021-20214: Fixed memory leaks in the client-tags CGI handler when client tags are configured and memory allocations fail (CVE-2021-20214). * 48_CVE-2021-20215: Fixed memory leaks in the show-status CGI handler when memory allocations fail (CVE-2021-20215). * 49_CVE-2021-20272: ssplit(): Remove an assertion that could be triggered with a crafted CGI request (CVE-2021-20272). * 50_CVE-2021-20273: cgi_send_banner(): Overrule invalid image types. Prevents a crash with a crafted CGI request if Privoxy is toggled off (CVE-2021-20273). * 51_CVE-2021-20275: chunked_body_is_complete(): Prevent invalid read of size two (CVE-2021-20275). * 52_CVE-2021-20276: Obsolete pcre: Prevent invalid memory accesses (CVE-2021-20276). Checksums-Sha1: 20f3cbedf95f6c898d584ba67053bc4279101214 2263 privoxy_3.0.28-2+deb10u1.dsc fa8f9f355a48afe94afcaef31c5404b2294c1043 1753809 privoxy_3.0.28.orig.tar.gz 4e0777eb601ac08e6881641d2f36f097ed045995 833 privoxy_3.0.28.orig.tar.gz.asc 31481843d358063ce87895fdd14d34397e61fb44 32540 privoxy_3.0.28-2+deb10u1.debian.tar.xz cae6dda5e97663a10f11438f768248b1d905b2bc 10334 privoxy_3.0.28-2+deb10u1_source.buildinfo Checksums-Sha256: 4519984b05271379ef1b7844bee841b3eaa927f76864c476208a2fd90f73bb70 2263 privoxy_3.0.28-2+deb10u1.dsc b5d78cc036aaadb3b7cf860e9d598d7332af468926a26e2d56167f1cb6f2824a 1753809 privoxy_3.0.28.orig.tar.gz bf4981d7c5da05019c5586d2e8785ad01e27813de3eb7f44c716df2dceb911c8 833 privoxy_3.0.28.orig.tar.gz.asc e5fc6c5ca4ee12dd8ce36784f7e1d19318743862b747b2e2aa02419a5f998a30 32540 privoxy_3.0.28-2+deb10u1.debian.tar.xz 99dba0bdb603cef547cb0a6cd0fdf58d7e529e3875a27aa18e9d3718c5f58aa0 10334 privoxy_3.0.28-2+deb10u1_source.buildinfo Files: 38b274c5c7096976b5ab3fb5b5261374 2263 web optional privoxy_3.0.28-2+deb10u1.dsc c7e8900d5aff33d9a5fc37ac28154f21 1753809 web optional privoxy_3.0.28.orig.tar.gz 72cd2e9835330ea3343165549a35d6ad 833 web optional privoxy_3.0.28.orig.tar.gz.asc 341a1e9a75b2ce7b25138893b96b8e9a 32540 web optional privoxy_3.0.28-2+deb10u1.debian.tar.xz 6386e355abc50370ffa7918df16e92a1 10334 web optional privoxy_3.0.28-2+deb10u1_source.buildinfo -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEErC+9sQSUPYpEoCEdAnE7z8pUELIFAmBM+FEACgkQAnE7z8pU ELLkTQ//Sz1FmmwWOhzkG+0wNV5oRh6CPJQQHlk7ir9EyTp695PTYq9li/v1pB6X cDu2w3LY5riT5mBds2GbJli8HgoGxoaoj0dXBk2HQjS6LXJ/ZKiPfCshUDNI4Hxt /9P3VFteXA9AxIANj76bOxw5cBhwPoOx8Oh62roGg1fl4B4j/1oGh4u7fHB97AT5 8GopOszcToon/Bp/QIXpZ8ThSPMKeedfuAwiYSfTtewQLD+DQ9U/C0CePod3ohNb CPDEu/XUqPpWhm92hafu/Wk1IbxL0Bw7a8FdP4//jjixiWoBAZrsm2vdMzEL3LiR qvS6VeBJs3Blyw7J5JOCaoHPJ7KPkJycJgK6T2aBOny19YaMKJomQyJnkW1lyKix y0Af7WT2kIELd7Lj5chD9ocoVnQckvdsb4pd1tMqZM5OhUJ98GOZGe2dAmlESmvm jA7y4bvwNXYubI3XY49YOtgva1xiQl+FtnCCdH3vxzwRvgxq0mi7RPobiPyzX3ou QUPRSIgmQC6KYHO0pu3NHndd1Q+kGLkf9DMLSb659MOd5Eim51y7hfMyI8mlxcrv SntJeTBegPSlOR9723+RcUjOAUEYdmVEsPcrxPA5f1inH4hR7tGCvS+SvZY9wBE9 Z1oSbmAlXgH4NJWFHI39S4g6HQh2FvRUcJNup0N7A9hedU+y7Uc= =NCEW -----END PGP SIGNATURE-----