openSUSE-SU-2021:1646-1: important: Security update for privoxy
openSUSE Security Update: Security update for privoxy ______________________________________________________________________________ Announcement ID: openSUSE-SU-2021:1646-1 Rating: important References: #1193584 Cross-References: CVE-2021-44540 CVE-2021-44541 CVE-2021-44542 CVE-2021-44543 Affected Products: openSUSE Leap 15.2 openSUSE Backports SLE-15-SP3 ______________________________________________________________________________ An update that fixes four vulnerabilities is now available. Description: This update for privoxy fixes the following issues: privoxy was updated to 3.0.33 (boo#1193584): * CVE-2021-44543: Encode the template name to prevent XSS (cross-side scripting) when Privoxy is configured to servce the user-manual itself * CVE-2021-44540: Free memory of compiled pattern spec before bailing * CVE-2021-44541: Free header memory when failing to get the request destination. * CVE-2021-44542: Prevent memory leaks when handling errors * Disable fast-redirects for a number of domains * Update default block lists * Many bug fixes and minor enhancements Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.2: zypper in -t patch openSUSE-2021-1646=1 - openSUSE Backports SLE-15-SP3: zypper in -t patch openSUSE-2021-1646=1 Package List: - openSUSE Leap 15.2 (x86_64): privoxy-3.0.33-lp152.3.12.1 privoxy-debuginfo-3.0.33-lp152.3.12.1 privoxy-debugsource-3.0.33-lp152.3.12.1 - openSUSE Leap 15.2 (noarch): privoxy-doc-3.0.33-lp152.3.12.1 - openSUSE Backports SLE-15-SP3 (aarch64 i586 ppc64le s390x x86_64): privoxy-3.0.33-bp153.2.3.1 - openSUSE Backports SLE-15-SP3 (noarch): privoxy-doc-3.0.33-bp153.2.3.1 References: https://www.suse.com/security/cve/CVE-2021-44540.html https://www.suse.com/security/cve/CVE-2021-44541.html https://www.suse.com/security/cve/CVE-2021-44542.html https://www.suse.com/security/cve/CVE-2021-44543.html https://bugzilla.suse.com/1193584
participants (1)
-
opensuse-security@opensuse.org