You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa privoxy

Sigurnosni nedostaci programskog paketa privoxy

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2016-bc7acd24c6
2016-02-01 02:27:04.521626
——————————————————————————–

Name : privoxy
Product : Fedora 22
Version : 3.0.23
Release : 3.fc22
URL : http://www.privoxy.org/
Summary : Privacy enhancing proxy
Description :
Privoxy is a web proxy with advanced filtering capabilities for
protecting privacy, filtering web page content, managing cookies,
controlling access, and removing ads, banners, pop-ups and other
obnoxious Internet junk. Privoxy has a very flexible configuration and
can be customized to suit individual needs and tastes. Privoxy has application
for both stand-alone systems and multi-user networks.

Privoxy is based on the Internet Junkbuster.

——————————————————————————–
Update Information:

Patches for CVE-2016-1982,3
——————————————————————————–
References:

[ 1 ] Bug #1300975 – CVE-2016-1983 privoxy: invalid read via empty host header in client request [epel-7]
https://bugzilla.redhat.com/show_bug.cgi?id=1300975
[ 2 ] Bug #1300974 – CVE-2016-1983 privoxy: invalid read via empty host header in client request [epel-6]
https://bugzilla.redhat.com/show_bug.cgi?id=1300974
[ 3 ] Bug #1300969 – CVE-2016-1982 privoxy: invalid reads in case of corrupt chunk-encoded content [epel-7]
https://bugzilla.redhat.com/show_bug.cgi?id=1300969
[ 4 ] Bug #1300968 – CVE-2016-1982 privoxy: invalid reads in case of corrupt chunk-encoded content [epel-6]
https://bugzilla.redhat.com/show_bug.cgi?id=1300968
[ 5 ] Bug #1300973 – CVE-2016-1983 privoxy: invalid read via empty host header in client request [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1300973
[ 6 ] Bug #1300967 – CVE-2016-1982 privoxy: invalid reads in case of corrupt chunk-encoded content [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1300967
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update privoxy’ at the command line.
For more information, refer to “Managing Software with yum”,
available at https://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

——————————————————————————–
Fedora Update Notification
FEDORA-2016-29995fbd42
2016-01-31 22:59:56.628927
——————————————————————————–

Name : privoxy
Product : Fedora 23
Version : 3.0.23
Release : 3.fc23
URL : http://www.privoxy.org/
Summary : Privacy enhancing proxy
Description :
Privoxy is a web proxy with advanced filtering capabilities for
protecting privacy, filtering web page content, managing cookies,
controlling access, and removing ads, banners, pop-ups and other
obnoxious Internet junk. Privoxy has a very flexible configuration and
can be customized to suit individual needs and tastes. Privoxy has application
for both stand-alone systems and multi-user networks.

Privoxy is based on the Internet Junkbuster.

——————————————————————————–
Update Information:

Patches for CVE-2016-1982,3
——————————————————————————–
References:

[ 1 ] Bug #1300975 – CVE-2016-1983 privoxy: invalid read via empty host header in client request [epel-7]
https://bugzilla.redhat.com/show_bug.cgi?id=1300975
[ 2 ] Bug #1300974 – CVE-2016-1983 privoxy: invalid read via empty host header in client request [epel-6]
https://bugzilla.redhat.com/show_bug.cgi?id=1300974
[ 3 ] Bug #1300969 – CVE-2016-1982 privoxy: invalid reads in case of corrupt chunk-encoded content [epel-7]
https://bugzilla.redhat.com/show_bug.cgi?id=1300969
[ 4 ] Bug #1300968 – CVE-2016-1982 privoxy: invalid reads in case of corrupt chunk-encoded content [epel-6]
https://bugzilla.redhat.com/show_bug.cgi?id=1300968
[ 5 ] Bug #1300973 – CVE-2016-1983 privoxy: invalid read via empty host header in client request [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1300973
[ 6 ] Bug #1300967 – CVE-2016-1982 privoxy: invalid reads in case of corrupt chunk-encoded content [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1300967
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update privoxy’ at the command line.
For more information, refer to “Managing Software with yum”,
available at https://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

AutorMarko Stanec
Cert idNCERT-REF-2016-02-0005-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Ranjivosti programskog paketa privoxy

Otkrivene su dvije ranjivosti u funkcijama remove_chunked_transfer_coding (filters.c) i client_host (parsers.c) unutar Privoxya. Potencijalni udaljeni napadač ranjivosti bi mogao iskoristiti...

Close