CVE-2015-1031

NameCVE-2015-1031
DescriptionMultiple use-after-free vulnerabilities in Privoxy before 3.0.22 allow remote attackers to have unspecified impact via vectors related to (1) the unmap function in list.c or (2) "two additional unconfirmed use-after-free complaints made by Coverity scan." NOTE: some of these details are obtained from third party information.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-142-1, DSA-3133-1
NVD severityhigh (attack range: remote)
Debian Bugs775167

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
privoxy (PTS)wheezy, wheezy (security)3.0.19-2+deb7u3fixed
jessie (security), jessie3.0.21-7+deb8u1fixed
buster, sid, stretch3.0.26-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
privoxysource(unstable)3.0.21-5high775167
privoxysourcesqueeze3.0.16-1+deb6u1highDLA-142-1
privoxysourcewheezy3.0.19-2+deb7u1highDSA-3133-1

Notes

http://www.privoxy.org/announce.txt
http://ijbswa.cvs.sourceforge.net/viewvc/ijbswa/current/list.c?view=patch&r1=1.31&r2=1.32&pathrev=v_3_0_22

Search for package or bug name: Reporting problems