A vulnerability was found in Privoxy which was fixed in get_url_spec_param() by freeing memory of compiled pattern spec before bailing.
The product does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Privoxy | Privoxy | * | 3.0.33 (excluding) |
Privoxy | Ubuntu | bionic | * |
Privoxy | Ubuntu | esm-apps/bionic | * |
Privoxy | Ubuntu | esm-apps/focal | * |
Privoxy | Ubuntu | esm-infra-legacy/trusty | * |
Privoxy | Ubuntu | focal | * |
Privoxy | Ubuntu | hirsute | * |
Privoxy | Ubuntu | impish | * |
Privoxy | Ubuntu | trusty | * |
Privoxy | Ubuntu | trusty/esm | * |
Privoxy | Ubuntu | upstream | * |
Privoxy | Ubuntu | xenial | * |