|
|
Subscribe / Log in / New account

Mageia alert MGASA-2016-0055 (privoxy)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2016-0055: Updated privoxy packages fix security vulnerabilities
Date:  Tue, 9 Feb 2016 14:05:51 +0100
Message-ID:  <20160209130551.B28D69F6FB@duvel.mageia.org>

MGASA-2016-0055 - Updated privoxy packages fix security vulnerabilities Publication date: 09 Feb 2016 URL: http://advisories.mageia.org/MGASA-2016-0055.html Type: security Affected Mageia releases: 5 CVE: CVE-2016-1982, CVE-2016-1983 Description: This update fixes two denial-of-service vulnerabilities that have been discovered in privoxy 3.0.23: The remove_chunked_transfer_coding function in filters.c in Privoxy before 3.0.24 allows remote attackers to cause a denial of service (invalid read and crash) via crafted chunk-encoded content. (CVE-2016-1982) The client_host function in parsers.c in Privoxy before 3.0.24 allows remote attackers to cause a denial of service (invalid read and crash) via an empty HTTP Host header. (CVE-2016-1983) References: - https://bugs.mageia.org/show_bug.cgi?id=17566 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1982 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1983 SRPMS: - 5/core/privoxy-3.0.23-1.1.mga5


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds