Note: This is a public test instance of Red Hat Bugzilla. The data contained within is a snapshot of the live data so any changes you make will not be reflected in the production Bugzilla. Email is disabled so feel free to test any aspect of the site that you want. File any problems you find or give feedback at bugzilla.redhat.com.
Bug 1185922 (CVE-2015-1380)
Summary: | CVE-2015-1380 privoxy: denial of service in case of client requests with incorrect chunk-encoded body | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Vasyl Kaigorodov <vkaigoro> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED WONTFIX | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | carnil, gwync, jrusnack, karsten |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Privoxy 3.0.23 | Doc Type: | Bug Fix |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2015-03-19 10:15:06 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1185925, 1185926 | ||
Bug Blocks: |
Description
Vasyl Kaigorodov
2015-01-26 16:02:28 UTC
Created privoxy tracking bugs for this issue: Affects: fedora-all [bug 1185925] Affects: epel-all [bug 1185926] CVE assignments per http://seclists.org/oss-sec/2015/q1/285: > - Fixed a DoS issue in case of client requests with incorrect > chunk-encoded body. When compiled with assertions enabled > (the default) they could previously cause Privoxy to abort(). > Reported by Matthew Daley. > > http://ijbswa.cvs.sourceforge.net/viewvc/ijbswa/current/jcc.c?r1=1.433&r2=1. > 434 CVE-2015-1380 > > - Fixed multiple segmentation faults and memory leaks in the > pcrs code. This fix also increases the chances that an invalid > pcrs command is rejected as such. Previously some invalid commands > would be loaded without error. Note that Privoxy's pcrs sources > (action and filter files) are considered trustworthy input and > should not be writable by untrusted third-parties. > > http://ijbswa.cvs.sourceforge.net/viewvc/ijbswa/current/pcrs.c?r1=1.46&r2=1. > 47 CVE-2015-1381 > > - Fixed an 'invalid read' bug which could at least theoretically > cause Privoxy to crash. > > http://ijbswa.cvs.sourceforge.net/viewvc/ijbswa/current/parsers.c?r1=1. > 297&r2=1.298 CVE-2015-1382 CVE-2015-1381 has been split to https://bugzilla.redhat.com/1203246 CVE-2015-1382 has been split to https://bugzilla.redhat.com/1203248 |