Описание
A flaw was found in Privoxy in versions before 3.0.29. Dereference of a NULL-pointer that could result in a crash if accept-intercepted-requests was enabled, Privoxy failed to get the request destination from the Host header and a memory allocation failed.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 3.0.26-5ubuntu0.1 |
| devel | not-affected | 3.0.29-1 |
| esm-apps/bionic | released | 3.0.26-5ubuntu0.1 |
| esm-apps/focal | released | 3.0.28-2ubuntu0.1 |
| esm-apps/xenial | released | 3.0.24-1ubuntu0.1 |
| esm-infra-legacy/trusty | released | 3.0.21-7+deb8u1ubuntu0.1~esm1 |
| focal | released | 3.0.28-2ubuntu0.1 |
| groovy | released | 3.0.28-3ubuntu0.1 |
| precise/esm | DNE | |
| trusty | ignored | end of standard support |
Показывать по
4.3 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
A flaw was found in Privoxy in versions before 3.0.29. Dereference of a NULL-pointer that could result in a crash if accept-intercepted-requests was enabled, Privoxy failed to get the request destination from the Host header and a memory allocation failed.
A flaw was found in Privoxy in versions before 3.0.29. Dereference of ...
A flaw was found in Privoxy in versions before 3.0.29. Dereference of a NULL-pointer that could result in a crash if accept-intercepted-requests was enabled, Privoxy failed to get the request destination from the Host header and a memory allocation failed.
4.3 Medium
CVSS2
7.5 High
CVSS3