Headline
CVE-2021-20274: NULL-pointer dereference when the socks server misbehaves
A flaw was found in privoxy before 3.0.32. A crash may occur due a NULL-pointer dereference when the socks server misbehaves.
Bug 1936662 (CVE-2021-20274) - CVE-2021-20274 privoxy: NULL-pointer dereference when the socks server misbehaves
Summary: CVE-2021-20274 privoxy: NULL-pointer dereference when the socks server misbeh…
Keywords:
Status:
CLOSED DUPLICATE of bug 1935974
Alias:
CVE-2021-20274
Product:
Security Response
Classification:
Other
Component:
vulnerability
Sub Component:
Version:
unspecified
Hardware:
All
OS:
Linux
Priority:
medium
Severity:
medium
Target Milestone:
—
Assignee:
Red Hat Product Security
QA Contact:
Docs Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+
depends on / blocked
Reported:
2021-03-08 21:14 UTC by Pedro Sampaio
Modified:
2021-03-09 17:02 UTC (History)
CC List:
3 users (show)
Fixed In Version:
privoxy 3.0.32
Doc Type:
—
Doc Text:
A flaw was found in Privoxy, where a crash may occur due to a NULL-pointer dereference when the socks server misbehaves. The highest threat from this vulnerability is to system availability.
Clone Of:
Environment:
Last Closed:
2021-03-08 21:14:46 UTC
Attachments
(Terms of Use)
Add an attachment (proposed patch, testcase, etc.)
Description Pedro Sampaio 2021-03-08 21:14:19 UTC
A flaw was found in privoxy before 3.0.32. A crash may occur due a NULL-pointer dereference when the socks server misbehaves.
Upstream patch:
https://www.privoxy.org/gitweb/?p=privoxy.git;a=commit;h=85817cc55b9
Comment 1 Pedro Sampaio 2021-03-08 21:14:24 UTC
External References:
https://www.privoxy.org/announce.txt
Comment 2 Pedro Sampaio 2021-03-08 21:14:46 UTC
*** This bug has been marked as a duplicate of bug 1935974 ***
Note You need to log in before you can comment on or make changes to this bug.