Mailinglist Archive: opensuse-updates (101 mails)

< Previous Next >
openSUSE-SU-2015:0230-1: moderate: Security update for privoxy
openSUSE Security Update: Security update for privoxy
______________________________________________________________________________

Announcement ID: openSUSE-SU-2015:0230-1
Rating: moderate
References: #914934
Cross-References: CVE-2015-1380 CVE-2015-1381 CVE-2015-1382

Affected Products:
openSUSE 13.2
openSUSE 13.1
______________________________________________________________________________

An update that fixes three vulnerabilities is now available.

Description:

privoxy was updated to version 3.0.23 to fix three security issues.

These security issues were fixed:
- Fixed a DoS issue in case of client requests with incorrect
chunk-encoded body. When compiled with assertions enabled (the default)
they could previously cause Privoxy to abort() (CVE-2015-1380).
- Fixed multiple segmentation faults and memory leaks in the pcrs code.
This fix also increases the chances that an invalid pcrs command is
rejected as such (CVE-2015-1381).
- Client requests with body that can't be delivered no longer cause
pipelined requests behind them to be rejected as invalid (CVE-2015-1382).


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 13.2:

zypper in -t patch openSUSE-2015-115=1

- openSUSE 13.1:

zypper in -t patch openSUSE-2015-115=1

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 13.2 (i586 x86_64):

privoxy-3.0.23-8.8.1
privoxy-debuginfo-3.0.23-8.8.1
privoxy-debugsource-3.0.23-8.8.1
privoxy-doc-3.0.23-8.8.1

- openSUSE 13.1 (i586 x86_64):

privoxy-3.0.23-2.20.1
privoxy-debuginfo-3.0.23-2.20.1
privoxy-debugsource-3.0.23-2.20.1
privoxy-doc-3.0.23-2.20.1


References:

http://support.novell.com/security/cve/CVE-2015-1380.html
http://support.novell.com/security/cve/CVE-2015-1381.html
http://support.novell.com/security/cve/CVE-2015-1382.html
https://bugzilla.suse.com/show_bug.cgi?id=914934


< Previous Next >
This Thread
  • No further messages