Change logs for privoxy source package in Bionic

  • privoxy (3.0.26-5ubuntu0.3) bionic-security; urgency=medium
    
      * SECURITY UPDATE: Denial of Service
        - debian/patches/CVE-2021-44540.patch: fixed the  get_url_spec_param()
          by freeing memory of compiled pattern spec before bailing.
        - CVE-2021-44540
      * SECURITY UPDATE: XSS
        - debian/patches/CVE-2021-44543.patch: fixed the cgi_error_no_template()
          by encoding the template name.
        - CVE-2021-44543
    
     -- Amir Naseredini <email address hidden>  Thu, 19 Jan 2023 11:16:20 +0000
  • privoxy (3.0.26-5ubuntu0.1) bionic-security; urgency=medium
    
      * SECURITY UPDATE: Buffer overflow
        - debian/patches/38_CVE-2021-20217.patch: Prevent an assertion by a
          crafted CGI request.
        - CVE-2021-20217
      * SECURITY UPDATE: Memory leak
        - debian/patches/40_CVE-2021-20216.patch: Fix a memory leak.
        - debian/patches/41_CVE-2020-35502.patch: Fixed memory leaks when a
          response is buffered and the buffer limit is reached or Privoxy is
          running out of memory.
        - debian/patches/42_CVE-2021-20209.patch: Fixed a memory leak in the
          show-status CGI handler when no action files are configured.
        - debian/patches/43_CVE-2021-20210.patch: Fixed a memory leak in the show-status
          CGI handler when no filter files are configured.
        - debian/patches/44_CVE-2021-20211.patch: Fixes a memory leak when client tags
          are active.
        - debian/patches/45_CVE-2021-20212.patch: Fixed a memory leak if multiple
          filters are executed and the last one is skipped due to a pcre error.
        - debian/patches/48_CVE-2021-20215.patch: Fixed memory leaks in the show-status
          CGI handler when memory allocations fail.
        - CVE-2021-20216
        - CVE-2020-35502
        - CVE-2021-20209
        - CVE-2021-20210
        - CVE-2021-20211
        - CVE-2021-20212
        - CVE-2021-20215
      * SECURITY UPDATE: Denial of Service
        - debian/patches/46_CVE-2021-20213.patch: Prevent an unlikely dereference of a
          NULL-pointer that could result in a crash if accept-intercepted-requests
          was enabled.
        - debian/patches/49_CVE-2021-20272.patch: Remove an assertion that could be
          triggered with a crafted CGI request.
        - debian/patches/50_CVE-2021-20273.patch: Overrule invalid image types.
          Prevents a crash with a crafted CGI request if Privoxy is toggled off.
        - debian/patches/51_CVE-2021-20275.patch: Prevent invalid read of size two.
        - debian/patches/52_CVE-2021-20276.patch: Obsolete pcre: Prevent invalid memory
          accesses.
        - CVE-2021-20213
        - CVE-2021-20272
        - CVE-2021-20273
        - CVE-2021-20275
        - CVE-2021-20276
      * Fix detection of insufficient data: debian/patches/39_decompress_iob.patch
    
     -- Eduardo Barretto <email address hidden>  Tue, 16 Mar 2021 15:51:43 +0100
  • privoxy (3.0.26-5) unstable; urgency=medium
    
      * Add ru debconf translation.  Thanks to Lev Lamberov (Closes: #883110).
      * Optimize patches for gbp pq.
      * Upgrade to Standards-Version 4.1.3 (no changes).
      * Upgrade to debhelper v11 (remove systemd from dh call).
    
     -- Roland Rosenfeld <email address hidden>  Sat, 20 Jan 2018 12:49:42 +0100
  • privoxy (3.0.26-4) unstable; urgency=medium
    
      * Add pt debconf translation.  Thanks to Rui Branco (Closes: #858743).
      * Add description top 36_openspopenjade.patch.
      * Upgrade to debhelper v10 and remove dh-systemd build dependency.
      * debhelper v10 replaces autotools-dev.
      * Remove Testsuite header, since this is automatically added.
      * Upgrade to Standards-Version 4.1.1
        - change copyrights-format to https.
    
     -- Roland Rosenfeld <email address hidden>  Wed, 01 Nov 2017 10:45:49 +0100
  • privoxy (3.0.26-3) unstable; urgency=medium
    
      * Add da debconf translation.  Thanks to Joe Dalton (Closes: #850876).
      * 37_adventofcode: unlock adventofcode.com (Closes: #848211).
    
     -- Roland Rosenfeld <email address hidden>  Wed, 11 Jan 2017 22:24:55 +0100