-----BEGIN PGP SIGNATURE-----
wnsEABYIACMWIQSyA9nA4R5iZYAVzFrgLM9xllPy5AUCZ1abxwUDAAAAAAAKCRDgLM9xllPy5AxW
AQDFuF3FDfWkuuu66sPfh21+9STCw7id3L468xck6prfiwD/difQ6k9/qU0YepJ2WxhXduS1rK9F
83ScJmvRTpbhgAs=
=UqBp
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-7140-1
December 09, 2024
tinyproxy vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
tinyproxy could be made to expose sensitive information.
Software Description:
- tinyproxy: Lightweight, non-caching, optionally anonymizing HTTP proxy
Details:
It was discovered that Tinyproxy did not properly manage memory under
certain circumstances. An attacker could possibly use this issue to leak
left-over heap data if custom error page templates containing special
non-standard variables are used.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS
tinyproxy 1.11.0-1ubuntu0.1~esm1
Available with Ubuntu Pro
tinyproxy-bin 1.11.0-1ubuntu0.1~esm1
Available with Ubuntu Pro
Ubuntu 20.04 LTS
tinyproxy 1.10.0-4ubuntu0.1
tinyproxy-bin 1.10.0-4ubuntu0.1
Ubuntu 18.04 LTS
tinyproxy 1.8.4-5ubuntu0.1~esm2
Available with Ubuntu Pro
tinyproxy-bin 1.8.4-5ubuntu0.1~esm2
Available with Ubuntu Pro
Ubuntu 16.04 LTS
tinyproxy 1.8.3-3ubuntu16.04.1~esm2
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-7140-1
CVE-2022-40468
Package Information:
https://launchpad.net/ubuntu/+source/tinyproxy/1.10.0-4ubuntu0.1
No comments:
Post a Comment