Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 21 Jan 2016 15:46:50 +0100
From: Fabian Keil <>
To: OSS Security Mailinglist <>
Subject: CVE request for Privoxy 3.0.24

Privoxy is a non-caching web proxy with advanced filtering capabilities
for enhancing privacy, modifying web page data and HTTP headers, controlling
access, and removing ads and other obnoxious Internet junk. For details see: or http://jvauzb4sb3bwlsnc.onion/

A couple of invalid reads were fixed in Privoxy 3.0.24 whose
release is scheduled for this weekend.

Two of them are security issues (remote DoS when built with ASAN),
please assign CVEs:

- Prevent invalid reads in case of corrupt chunk-encoded content.

- Remove empty Host headers in client requests.
  Previously they would result in invalid reads.

The issues were found with afl-fuzz and AddressSanitizer.


[ CONTENT OF TYPE application/pgp-signature SKIPPED ]

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ