Change logs for privoxy source package in Xenial

  • privoxy (3.0.24-1ubuntu0.1) xenial-security; urgency=medium
    
      * SECURITY UPDATE: Buffer overflow
        - debian/patches/38_CVE-2021-20217.patch: Prevent an assertion by a
          crafted CGI request.
        - CVE-2021-20217
      * SECURITY UPDATE: Memory leak
        - debian/patches/40_CVE-2021-20216.patch: Fix a memory leak.
        - debian/patches/41_CVE-2020-35502.patch: Fixed memory leaks when a
          response is buffered and the buffer limit is reached or Privoxy is
          running out of memory.
        - debian/patches/42_CVE-2021-20209.patch: Fixed a memory leak in the
          show-status CGI handler when no action files are configured.
        - debian/patches/43_CVE-2021-20210.patch: Fixed a memory leak in the show-status
          CGI handler when no filter files are configured.
        - debian/patches/45_CVE-2021-20212.patch: Fixed a memory leak if multiple
          filters are executed and the last one is skipped due to a pcre error.
        - debian/patches/48_CVE-2021-20215.patch: Fixed memory leaks in the show-status
          CGI handler when memory allocations fail.
        - CVE-2021-20216
        - CVE-2020-35502
        - CVE-2021-20209
        - CVE-2021-20210
        - CVE-2021-20212
        - CVE-2021-20215
      * SECURITY UPDATE: Denial of Service
        - debian/patches/46_CVE-2021-20213.patch: Prevent an unlikely dereference of a
          NULL-pointer that could result in a crash if accept-intercepted-requests
          was enabled.
        - debian/patches/49_CVE-2021-20272.patch: Remove an assertion that could be
          triggered with a crafted CGI request.
        - debian/patches/50_CVE-2021-20273.patch: Overrule invalid image types.
          Prevents a crash with a crafted CGI request if Privoxy is toggled off.
        - debian/patches/51_CVE-2021-20275.patch: Prevent invalid read of size two.
        - debian/patches/52_CVE-2021-20276.patch: Obsolete pcre: Prevent invalid memory
          accesses.
        - CVE-2021-20213
        - CVE-2021-20272
        - CVE-2021-20273
        - CVE-2021-20275
        - CVE-2021-20276
      * Fix detection of insufficient data: debian/patches/39_decompress_iob.patch
    
     -- Eduardo Barretto <email address hidden>  Wed, 17 Mar 2021 17:28:00 +0100
  • privoxy (3.0.24-1) unstable; urgency=medium
    
      * New upstream version 3.0.24.
      * This fixes CVE-2016-1982 and CVE-2016-1983.
      * Adapt all patches to new upstream version.
    
     -- Roland Rosenfeld <email address hidden>  Fri, 22 Jan 2016 16:08:05 +0100
  • privoxy (3.0.23-5) unstable; urgency=medium
    
      * Remove /lib/init/vars.sh from init script since it is no longer used.
        As a consequence remove initscripts dependency (Closes: #804961).
      * --enable-external-filters (Closes: #805296).
    
     -- Roland Rosenfeld <email address hidden>  Mon, 16 Nov 2015 21:05:41 +0100
  • privoxy (3.0.23-4) unstable; urgency=medium
    
      * Add rotate option to init.d script.
      * Change logrotate to use rotate option (Closes: #783399).
      * privoxy.service: define SuccessExitStatus=15.
      * Set locales to C.UTF-8 for doc generation to make build reproducible.
      * Run wrap-and-sort.
      * 34_system-docbook2man: Use Debian docbook2man-spec.pl (from
        docbook-utils) instead of local copy, to make package reproducible.
      * Stop runing "make man2html", since this overrides "make man", which
        should work reproducible.
    
     -- Roland Rosenfeld <email address hidden>  Sat, 19 Sep 2015 15:05:41 +0200
  • privoxy (3.0.23-3) unstable; urgency=medium
    
    
      * Since there are no new bugs found, this goes to unstable now.
      * Depend on perl-base instead of full perl.
    
     -- Roland Rosenfeld <email address hidden>  Sun, 26 Apr 2015 11:01:08 +0200