A vulnerability was found in Privoxy which was fixed in get_url_spec_param() by freeing memory of compiled pattern spec before bailing.
The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Privoxy | Privoxy | * | 3.0.33 (excluding) |
Privoxy | Ubuntu | bionic | * |
Privoxy | Ubuntu | esm-apps/bionic | * |
Privoxy | Ubuntu | esm-apps/focal | * |
Privoxy | Ubuntu | esm-infra-legacy/trusty | * |
Privoxy | Ubuntu | focal | * |
Privoxy | Ubuntu | hirsute | * |
Privoxy | Ubuntu | impish | * |
Privoxy | Ubuntu | trusty | * |
Privoxy | Ubuntu | trusty/esm | * |
Privoxy | Ubuntu | upstream | * |
Privoxy | Ubuntu | xenial | * |