CVE-2015-1031

NameCVE-2015-1031
DescriptionMultiple use-after-free vulnerabilities in Privoxy before 3.0.22 allow remote attackers to have unspecified impact via vectors related to (1) the unmap function in list.c or (2) "two additional unconfirmed use-after-free complaints made by Coverity scan." NOTE: some of these details are obtained from third party information.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-142-1, DSA-3133-1
NVD severityhigh
Debian Bugs775167

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
privoxy (PTS)stretch3.0.26-3fixed
stretch (security)3.0.26-3+deb9u2fixed
buster3.0.28-2+deb10u1fixed
bullseye3.0.32-2fixed
bookworm, sid3.0.32-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
privoxysourcesqueeze3.0.16-1+deb6u1DLA-142-1
privoxysourcewheezy3.0.19-2+deb7u1DSA-3133-1
privoxysource(unstable)3.0.21-5775167

Notes

http://www.privoxy.org/announce.txt
http://ijbswa.cvs.sourceforge.net/viewvc/ijbswa/current/list.c?view=patch&r1=1.31&r2=1.32&pathrev=v_3_0_22

Search for package or bug name: Reporting problems