Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: privoxy | Distribution: SUSE Linux Enterprise 15 SP5 |
Version: 3.0.33 | Vendor: openSUSE |
Release: bp155.2.8 | Build date: Mon May 22 17:19:05 2023 |
Group: Productivity/Networking/Web/Proxy | Build host: s390zp21 |
Size: 1109803 | Source RPM: privoxy-3.0.33-bp155.2.8.src.rpm |
Packager: https://bugs.opensuse.org | |
Url: https://www.privoxy.org/ | |
Summary: The Internet Junkbuster - HTTP Proxy Server |
The Internet Junkbuster - HTTP Proxy Server: A non-caching HTTP proxy server that runs between a web browser and a web server and filters contents as described in the configuration files.
GPL-3.0-or-later
* Fri Dec 10 2021 Andreas Stieger <andreas.stieger@gmx.de> - privoxy 3.0.33 (boo#1193584): * CVE-2021-44543: Encode the template name to prevent XSS (cross-side scripting) when Privoxy is configured to servce the user-manual itself * CVE-2021-44540: Free memory of compiled pattern spec before bailing * CVE-2021-44541: Free header memory when failing to get the request destination. * CVE-2021-44542: Prevent memory leaks when handling errors * Disable fast-redirects for a number of domains * Update default block lists * Many bug fixes and minor enhancements * Wed Oct 20 2021 Johannes Segitz <jsegitz@suse.com> - Added hardening to systemd service(s) (bsc#1181400). Modified: * privoxy.service * Fri Oct 15 2021 Michael Du <duyizhaozj321@yahoo.com> - Revert privoxy-nopcreposix.patch because of bsc#1184945. * Fri Apr 09 2021 Cristian RodrÃguez <crrodriguez@opensuse.org> - Using pcre is good, however using the pcreposix library is not and will lead to undefined behaviour as symbol clashes with glibc. (privoxy-nopcreposix.patch) * Sat Mar 06 2021 Carsten Ziepke <kieltux@gmail.com> - Update to version 3.0.32: - Security/Reliability (boo#1183129) - ssplit(): Remove an assertion that could be triggered with a crafted CGI request. Commit 2256d7b4d67. OVE-20210203-0001. CVE-2021-20272 Reported by: Joshua Rogers (Opera) - cgi_send_banner(): Overrule invalid image types. Prevents a crash with a crafted CGI request if Privoxy is toggled off. Commit e711c505c48. OVE-20210206-0001. CVE-2021-20273 Reported by: Joshua Rogers (Opera) - socks5_connect(): Don't try to send credentials when none are configured. Fixes a crash due to a NULL-pointer dereference when the socks server misbehaves. Commit 85817cc55b9. OVE-20210207-0001. CVE-2021-20274 Reported by: Joshua Rogers (Opera) - chunked_body_is_complete(): Prevent an invalid read of size two. Commit a912ba7bc9c. OVE-20210205-0001. CVE-2021-20275 Reported by: Joshua Rogers (Opera) - Obsolete pcre: Prevent invalid memory accesses with an invalid pattern passed to pcre_compile(). Note that the obsolete pcre code is scheduled to be removed before the 3.0.33 release. There has been a warning since 2008 already. Commit 28512e5b624. OVE-20210222-0001. CVE-2021-20276 Reported by: Joshua Rogers (Opera) - Bug fixes: - Properly parse the client-tag-lifetime directive. Previously it was not accepted as an obsolete hash value was being used. Reported by: Joshua Rogers (Opera) - decompress_iob(): Prevent reading of uninitialized data. Reported by: Joshua Rogers (Opera). - decompress_iob(): Don't advance cur past eod when looking for the end of the file name and comment. - decompress_iob(): Cast value to unsigned char before shifting. Prevents a left-shift of a negative value which is undefined behaviour. Reported by: Joshua Rogers (Opera) - gif_deanimate(): Confirm that that we have enough data before doing any work. Fixes a crash when fuzzing with an empty document. Reported by: Joshua Rogers (Opera). - buf_copy(): Fail if there's no data to write or nothing to do. Prevents undefined behaviour "applying zero offset to null pointer". Reported by: Joshua Rogers (Opera) - log_error(): Treat LOG_LEVEL_FATAL as fatal even when --stfu is being used while fuzzing. Reported by: Joshua Rogers (Opera). - Respect DESTDIR when considering whether or not to install config files with ".new" extension. - OpenSSL ssl_store_cert(): Fix two error messages. - Fix a couple of format specifiers. - Silence compiler warnings when compiling with NDEBUG. - fuzz_server_header(): Fix compiler warning. - fuzz_client_header(): Fix compiler warning. - cgi_send_user_manual(): Also reject requests if the user-manual directive specifies a https:// URL. Previously Privoxy would try and fail to open a local file. - General improvements: - Log the TLS version and the the cipher when debug 2 is enabled. - ssl_send_certificate_error(): Respect HEAD requests by not sending a body. - ssl_send_certificate_error(): End the body with a single new line. - serve(): Increase the chances that the host is logged when closing a server socket. - handle_established_connection(): Add parentheses to clarify an expression Suggested by: David Binderman - continue_https_chat(): Explicitly unset CSP_FLAG_CLIENT_CONNECTION_KEEP_ALIVE if process_encrypted_request() fails. This makes it more obvious that the connection will not be reused. Previously serve() relied on CSP_FLAG_SERVER_CONTENT_LENGTH_SET and CSP_FLAG_CHUNKED being unset. Inspired by a patch from Joshua Rogers (Opera). - decompress_iob(): Add periods to a couple of log messages - Terminate the body of the HTTP snipplets with a single new line instead of "\r\n". - configure: Add --with-assertions option and only enable assertions when it is used - windows build: Use --with-brotli and --with-mbedtls by default and enable dynamic error checking. - gif_deanimate(): Confirm we've got an image before trying to write it Saves a pointless buf_copy() call. - OpenSSL ssl_store_cert(): Remove a superfluous space before the serial number. - Action file improvements: - Disable fast-redirects for .golem.de/ - Unblock requests to adri*. - Block requests for trc*.taboola.com/ - Disable fast-redirects for .linkedin.com/ - Filter file improvements: - Make the second pcrs job of the img-reorder filter greedy again. The ungreedy version broke the img tags on: https://bulk.fefe.de/scalability/. - Privoxy-Log-Parser: - Highlight a few more messages. - Clarify the --statistics output. The shown "Reused connections" are server connections so name them appropriately. - Bump version to 0.9.3. - Privoxy-Regression-Test: - Add the --check-bad-ssl option to the --help output. - Bump version to 0.7.3. - Documentation: - Add pushing the created tag to the release steps in the developer manual. - Clarify that 'debug 32768' should be used in addition to the other debug directives when reporting problems. - Add a 'Third-party licenses and copyrights' section to the user manual. * Mon Feb 01 2021 Carsten Ziepke <kieltux@gmail.com> - Update to version 3.0.31: - Security/Reliability (boo#1181650) - Prevent an assertion from getting triggered by a crafted CGI request. Commit 5bba5b89193fa. OVE-20210130-0001. CVE-2021-20217 Reported by: Joshua Rogers (Opera) - Fixed a memory leak when decompression fails "unexpectedly". Commit f431d61740cc0. OVE-20210128-0001. CVE-2021-20216 - Bug fixes: - Fixed detection of insufficient data for decompression. Previously Privoxy could try to decompress a partly uninitialized buffer. - Update to version 3.0.30: - Bug fixes: - Check the actual URL for redirects when https inspecting requests. Previously Privoxy would only check the path which resulted in rewrite results being rejected as invalid URLs. Reported by withoutname in #1736. - Let the hide-referrer code tolerate Referer headers with https:// URLs. Previously they would always be treated like a changed host. - Use the https headers if the show-request handler is reached through https://. Previously Privoxy would use the http headers which may be empty on a reused connection. - Make CGI_PREFIX protocol-relative when building with FEATURE_HTTPS_INSPECTION. This unbreaks (at least) https://config.privoxy.org/client-tags whose buttons would previously use a http:// URL resulting in browser warnings. - Support using https-inspection and client-header-order at the same time. Previously Privoxy would crash. Reported by: Kai Raven - Properly reject rewrites from http to https as they currently aren't supported. Previously Privoxy would wait for the client to establish an encrypted connection which obviously would not happen. - When https inspection is enabled and Privoxy has been compiled with FEATURE_GRACEFUL_TERMINATION (not recommended for production builds), the TLS backend resources are free'd later on and only if no active connections are left. Prevents crashes when exiting "gracefully" at the wrong time. - Let the uninstall target remove the config file even if DESTDIR is set and properly announce the deletion of the configuration files. - General improvements: - Allow to rewrite the request destination for https-inspected requests behind the client's back. The documentation already sort of claimed that it was supported by not especially mentioning that it didn't work for https-inspected requests. Fixes SF bug #923 reported by withoutname. - Add support for filtering client request bodies by using CLIENT-BODY-FILTER filters which can be enabled with the client-body-filter action. Patch submitted by Maxim Antonov. Sponsored by: Robert Klemme - Add the new action suppress-tag{} which can be used to prevent a tagger from adding a tag. Patch submitted by Maxim Antonov. Sponsored by: Robert Klemme - Gracefully handle existing website keys without matching certificates. This can happen if Privoxy was previously running with an invalid TLS configuration that didn't allow it to create a certificate. - Recycle debug bit 4 for Tagging-related messages. - Improve the message shown when the client-tags CGI page is requested with no tags configured. - Shorten the 'donate' and 'participate' links used by templates using redirects. Currently the redirects lead to the FAQ entries but in the future we may want to relocate the content and using redirects makes this more convenient. - Log an error when a PCRE-HOST-PATTERN is used with FEATURE_PCRE_HOST_PATTERNS disabled. Don't treat this a fatal error so the regression tests can be used with and without FEATURE_PCRE_HOST_PATTERNS. - The code compiles with older C compilers again. - The chdir() return code is checked to fix a compiler warning. - The packages feed has been removed from the source tarball. It's usually out of date when the source tarball is generated for the release. - Fixed harmless compiler warnings from GCC9 with -D_FORTIFY_SOURCE=2. - windows: Remove obsolete '$(DEST)/doc/images' target. - windows: Install the images referenced in the user manual. - Remove obsolete 'gnu_regex.@OBJEXT@' target. - When installing from the GNUMAkefile, don't create an 'images' directory which is no longer used. The images were relocated to the user-manual directory years ago. - Add new FEATURES to the show-status page and resort list. - Remove unused variable in the OpenSSL-specific code. - Update bug tracker URL in cgi_error_unknown(). - Saved a couple of memory allocations when sorting client headers. - Improved a couple of error messages. - Saved memory allocations when using OpenSSL and checking if a key already exists. - The configure script will bail out if OpenSSL and mbedTLS are enabled at the same time. - Log a message right before exiting gracefully. - A couple of structures have been rearranged to require slightly less memory. - When https inspection is enabled and the certificate is invalid the error message is now sent with status code 403 instead of 200. - The Slackware rc script template has been renamed to slackware/rc.privoxy.in to silence complaints when building Debian packages. - When building with MbedTLS support, mbedtls_md5_ret() is used instead of mbedtls_md5() which is deprecated and causes a warning on Debian GNU/Linux. - Action file improvements: - Block requests to eu-tlp03.kameleoon.com/. - Unblock metrics.sr.ht/. - Disable fast-redirects for .fsf.org/. - Disable fast-redirects for .gravater.com/. - Disable fast-redirects for .ksta.de/. - Block requests to tag.crsspxl.com/. - Block requests to analytics.slashdotmedia.com/. - Block requests to ml314.com/. - Block requests to .adroll.com/. - Block requests to fastlane.rubiconproject.com/. - Block requests to api.theadex.com/. - Block requests to ih.adscale.de/. - Block requests to .s400.meetrics.net/. - Block requests for pp.lp4.io/. - Block requests for trc-events.taboola.com/. - Filter file improvements: - A allow-autocompletion filter has been added which changes autocomplete="off" to "on" on input fields to allow autocompletion. Requested by Jamie Zawinski in #370. Filter based on a submission by Aaron Linville. - Added an imdb filter. - Added a sourceforge filter that reduces the amount of ads for proprietary software. - Added a github filter that removes the annoying "Sign-Up" banner and the Cookie disclaimer. - Removed a duplicated pcrs command from the js-annoyances filter. - The crude-parental filter now provides a short reason when blocking, inserts a link to Privoxy's webinterface and adds a new line at the end of the generated page. - Privoxy-Log-Parser: - Highlight a few more messages. - Add a handler for tagging messages. - Properly deal with 'Certificate error' crunches Previously the error description was highlighted as 'host'. - Log truncated LOG_LEVEL_CLF messages more gracefully and note that the statistics will be imprecise. - Fixed perldoc typo. - Bump version to 0.9.2. - Privoxy-Regression-Test: - Use http://127.0.0.1:8118/ as default Privoxy address unless http_proxy is set through the environment. - Add a --privoxy-cgi-prefix option that specifies the prefix to use when building URLs that are supposed to reach Privoxy's CGI interface. If it's not set, http://p.p/ is used, which is supposed to work with the default Privoxy configuration. If Privoxy has been built with FEATURE_HTTPS_INSPECTION enabled, and if https inspection is activated with the +https-inspection action, this option can be used with "https://p.p/" provided the system running Privoxy-Regression-Test has been configured to trust the certificate used by Privoxy. Note that there are currently two tests in the official regression-tests.action file that are expected to fail when using "https://p.p/" as privoxy-cgi-prefix. - Skip the connection-established response in get_status_code() when looking for the status code with a CGI prefix that starts with https://. We care about the status code sent by the impersonated web server. - Use --proxy-header when using a CGI prefix with https:// and a "Host:" header. - Allow '|' in tokens and values to allow tag patterns like "TAG:^(application|text)/(x-)?javascript$". - When get_cgi_page_or_else() fails, include the URL of the requested page in the log message. - Added a --check-bad-ssl option that can be used to verify that Privoxy detects certificate problems when accessing the test sites from badssl.com. - Bumped version to 0.7.2 - uagen: - Update example output. - Recommend the use of the https-inspection action in the documentation. - Upgrade a couple of URLs to https://. - Add ElectroBSD to the list of operating systems. - Bumped generated Firefox version to 78 (ESR). - Bumped version to 1.2.2. - User documentation: - Remove reference to 'How to Report Bugs Effectively'. It was only rendered as text without URL in the README anyway and there's no indication that users read it ... - Let the dok-readme target fix the location embedded into the README file. This used to be done by CVS but since the git migration it has to be done through other means. - Remove 'experimental' warning for client-specific-tag-related directives. They seem to work reliably and there is no obvious reason why we would change the syntax in the near future. - Describe how to check if Privoxy has been built with FEATURE_HTTPS_INSPECTION. - Add a link to the trusted-cas-file documentation that explains how the user can create the file herself. - Don't explicitly mention the license for the code coming from 'Anonymous Coders' and Junkbusters. It's obviously licensed under the GNU GPL like the rest of Privoxy or we wouldn't be allowed to distribute it. - Update the +hide-user-agent example with uagen output. - Slightly improve the wording of the ca-key-file documentation. - Explicitly mention Windows 10 as supported so search engines and users looking for it can find it. - Import a bunch of contributors from the ChangeLog. - Remove obsolete doc/gpl.html. - Upgrade a couple of links to https://. - Don't prefer the SourceForge patch tracker over the privoxy-devel mailing list. While at it, link to the SourceForge patch tracker. - Mention http-inspection in the 'my browser warns me about unauthenticated content' FAQ entry. - Simplify the 'Is there is a license or fee?' FAQ entry. - Add another +redirect{} example. - Explicitly mention that interested sponsors should include the link target in their first mail. - Clarify that only Privoxy team members can object to new sponsors and link to the list of current team members. - Note that sponsor URLs may not contain keyword spam. - Garbage collect doc/webserver/images which isn't referenced anymore. - Update the method to reach the proxy settings in Firefox. - Update proxy_setup.jpg description to refer to Firefox. - Regenerate proxy_setup.jpg with a more recent Firefox (78.0). - Regenerate files-in-use.jpg without obsolete standard.action with modern colors and a slightly better quality. - Update URL to the actionsfile tracker. - Update a support request URL. - Rephrase the 'Can Privoxy run as service' FAQ entry and remove an obsolete paragraph. - Let the 'Where can I get updated Actions Files?' entry link to the gitweb version of default.action.master. - Update a link to the default.action file. - Update URLs for trackers and mailing lists. - Replace CVS reference with git. - Mention regression-tests.action in the config file. - Explicitly mention in the config file that access to the CA key should be limited to Privoxy. - List more client-specific-tag examples for inspiration. - Add additional headers to the client-header-order example. - Note that actions aren't updated after rewrites. - Explicitly mention that upgrading from http to https with a client-header filter is not supported - Note that protocol and host have to be added when rewriting the destination host for https-inspected requests. - Explicitly mention that the CA key is used to sign certificates. - Put openssl command in 'command' tags. - The man page has been moved from section 1 to man section 8. - Developer manual: - Flesh out the build instructions for Debian. - Remove the packaging instructions for RPM-based systems. They don't work and we don't release RPM packages anymore anyway. - Remove the packaging instructions for Solaris. They don't work and we don't release Solaris packages anymore anyway. - Update the suggested subject for the announce mails. - Update upload instructions. ftp://upload.sourceforge.net is no longer functional. - Remove a couple of package-dependent upload instructions that don't actually work. - Remove 'cd current' that no longer works. - Add regression-tests.action to the list of files that should be installed. - Stop claiming that there are text versions of the manuals. We stopped building them in 2008 (9ed36a3c5e6f12). - Note that the 'webserver' target creates the link needed for the user-manual. - Suggest to use the master branch as reference when creating the ChangeLog so the steps work when the current branch differs from master which is likely as the developer manual suggests to use a local branch for development. - Add the -s flag to the suggested 'git tag' command. We prefer signed tags. - Mention that merges into 'master' should be avoided. - Add git commands that should result in a merge-free history. - Mention Privoxy-Regression-Test. - Add a section id to reduce link churn. - Recommend the dok-tidy target when building docs for the webserver. - Add another plug for the privoxy-devel mailing list. - Let the intro link the copyright section in the user manual instead of giving an incomplete summary of the license status. - Clarify that the webserver target uploads to the SourceForge webserver. - Mark the documentation for the Mac OS X installers as out of date and change the SCM name back to CVS. - Fix the location of the installer modules for Mac OS X. They are not actually available through git (yet). - Don't speak of Privoxy version 3 in the past tense. - Update the list of programs required for the release process. - Update description of the webserver target which uses ssh, not scp. - Remove obsolete reference to config.new. - Tests: - Add another hide-referrer{conditional-block} test. - Add another hide-referrer{conditional-forge} test. - Fix a hide-referrer{conditional-forge} test that expected an acceptable header to be forged. - Fix a hide-referrer{conditional-block} test that expected an acceptable Referer to be removed. - Explain why the "Set Header = Host: whatever.example.org" test is expected to fail when using a CGI prefix that starts with "https://". - Explain why a connection-sharing test is known to fail when using "https://p.p/" as CGI prefix. - Add a link to Privoxy-Regression-Test to regression-tests.action in case it isn't packaged. - Add regression tests for pcre host patterns. - Fixed a regression test that is executed when FEATURE_GRACEFUL_TERMINATION is enabled. - Privoxy infrastructure: - Import a Privoxy logo for the website. - Update Tor onion service to HiddenServiceVersion 3. - Display the "model" photos in a single row and remove placeholder images. - Regenerate homepage with updated sponsor list. - Use the '/sponsor' redirect for the link to the sponsor page. - Git commit messages are sent to the Privoxy-commits mailing list. * Sun Dec 06 2020 Andreas Stieger <andreas.stieger@gmx.de> - privoxy 3.0.29: * Fixed memory leaks when a response is buffered and the buffer limit is reached or Privoxy is running out of memory. OVE-20201118-0001 * Fixed a memory leak in the show-status CGI handler when no action files are configured OVE-20201118-0002 * Fixed a memory leak in the show-status CGI handler when no filter files are configured OVE-20201118-0003 * Fixes a memory leak when client tags are active OVE-20201118-0004 * Fixed a memory leak if multiple filters are executed and the last one is skipped due to a pcre error OVE-20201118-0005 * Prevent an unlikely dereference of a NULL-pointer that could result in a crash if accept-intercepted-requests was enabled, Privoxy failed to get the request destination from the Host header and a memory allocation failed. OVE-20201118-0006 * Fixed memory leaks in the client-tags CGI handler when client tags are configured and memory allocations fail. OVE-20201118-0007 * Fixed memory leaks in the show-status CGI handler when memory allocations fail OVE-20201118-0008 * Add experimental https inspection support * Use JIT compilation for static filtering for speedup * Add support for Brotli decompression, add 'no-brotli-accepted' filter which prevents the use of Brotli compression * Add feature to gather exended statistics * Use IP_FREEBIND socket option to help with failover * Allow to use extended host patterns and vanilla host patterns at the same time by prefixing extended host patterns with "PCRE-HOST-PATTERN:" * Added "Cross-origin resource sharing" (CORS) support * Add SOCKS5 username/password support * Bump the maximum number of action and filter files to 100 each * Fixed handling of filters with "split-large-forms 1" when using the CGI editor. * Better detect a mismatch of connection details when figuring out whether or not a connection can be reused * Don't send a "Connection failure" message instead of the "DNS failure" message * Let LOG_LEVEL_REQUEST log all requests * Improvements to default Action file - license changed to GPLv3 - remove packaging vulnerability boo#1157449 - remove packaging for distributions without systemd drops privoxy-3.0.16-networkmanager.patch * Sun Dec 06 2020 Andreas Stieger <andreas.stieger@gmx.de> - add upstream signing key and verify source signature * Wed Aug 19 2020 Dominique Leuenberger <dimstar@opensuse.org> - Stop trying to mangle _unitdir: this is defined in all supported distros. * Mon Feb 03 2020 Dominique Leuenberger <dimstar@opensuse.org> - BuildRequire pkgconfig(systemd) instead of systemd: allow OBS to shortcut through the -mini flavors. * Thu Jul 25 2019 matthias.gerstner@suse.com - removal of SuSEfirewall2 service, since SuSEfirewall2 has been replaced by firewalld, see [1]. [1]: https://lists.opensuse.org/opensuse-factory/2019-01/msg00490.html * Mon Dec 31 2018 sean@suspend.net - Update to version 3.0.28: * Bug fixes: - Fix misplaced parentheses - Changed two regression tests to depend on config directive * Wed Sep 28 2016 kieltux@gmail.com - Update to version 3.0.26 * Bug fixes: - Fixed crashes with "listen-addr :8118" (SF Bug #902). The regression was introduced in 3.0.25 beta and reported by Marvin Renich in Debian bug #834941. * General improvements: - Log when privoxy is toggled on or off via cgi interface. - Highlight the "Info: Now toggled " on/off log message in the Windows log viewer. - Highlight the loading actions/filter file log message in the Windows log viewer. - Mention client-specific tags on the toggle page as a potentionally more appropriate alternative. * Infrastructure improvements: - Add perl script to generate an RSS feed for the packages Submitted by "Unknown". * Build system improvements: - strptime.h: fix a compiler warning about ambiguous else. - configure.in: Check for Docbook goo on the BSDs as well. - GNUMakefile.in: Let the dok-user target remove temporary files. - BuildArch for docs: noarch * Sat Jan 23 2016 astieger@suse.com - Privoxy 3.0.24 Includes fixes for two security issues that may be used to remotely trigger crashes on platforms that carefully check memory accesses. * Security fixes (denial of service): + Prevent invalid reads in case of corrupt chunk-encoded content. CVE-2016-1982 [boo#963151] + Remove empty Host headers in client requests. Previously they would result in invalid reads. CVE-2016-1983 [boo#963152] * General bug fixes and improvements * White and blacklist updates * Wed Jan 28 2015 andreas.stieger@gmx.de - add CVE IDs for [boo#914934] * Tue Jan 27 2015 andreas.stieger@gmx.de - add CVE and bug IDs to last two changelog entries * Mon Jan 26 2015 joerg.lorenzen@ki.tng.de - update to version 3.0.23 [boo#914934] - Bug fixes: - Fixed a DoS issue in case of client requests with incorrect chunk-encoded body. When compiled with assertions enabled (the default) they could previously cause Privoxy to abort(). [CVE-2015-1380] - Fixed multiple segmentation faults and memory leaks in the pcrs code. This fix also increases the chances that an invalid pcrs command is rejected as such. Previously some invalid commands would be loaded without error. Note that Privoxy's pcrs sources (action and filter files) are considered trustworthy input and should not be writable by untrusted third-parties. [CVE-2015-1381] - Fixed an 'invalid read' bug which could at least theoretically cause Privoxy to crash. So far, no crashes have been observed. - Compiles with --disable-force again. Reported by Kay Raven. - Client requests with body that can't be delivered no longer cause pipelined requests behind them to be rejected as invalid. [CVE-2015-1382] - General improvements: - If a pcrs command is rejected as invalid, Privoxy now logs the cause of the problem as text. Previously the pcrs error code was logged. - The tests are less likely to cause false positives. - Action file improvements: - '.sify.com/' is no longer blocked. Apparently it is not actually a pure tracking site (anymore?). Reported by Andrew on ijbswa-users@. - Unblock banners on .amnesty.de/ which aren't ads. - Documentation improvements: - The 'Would you like to donate?' section now also contains a "Paypal" address. - The list of supported operating systems has been updated. - The existence of the SF support and feature trackers has been deemphasized because they have been broken for months. Most of the time the mailing lists still work. - The claim that default.action updates are sometimes released on their own has been removed. It hasn't happened in years. - Explicitly mention that Tor's port may deviate from the default when using a bundle. Requested by Andrew on ijbswa-users@. * Fri Nov 28 2014 andreas.stieger@gmx.de - Privoxy 3.0.22 [boo#907675] - Bug fixes: - Fixed a memory leak when rejecting client connections [CVE-2015-1030 [CVE-2015-1031] [boo#913094] - Fixed an immediate-use-after-free bug and two additional unconfirmed use-after-free complaints [CVE-2015-1201] [boo#914450] - Actually show the FORCE_PREFIX value on the show-status page. - Properly deal with Keep-Alive headers with timeout= parameters - Not using any filter files no longer results in warning messages unless an action file is referencing header taggers or filters. - Fixed a bug that prevented Privoxy from reusing some reusable connections. - General improvements: - Introduced NO-REQUEST-TAG and NO-RESPONSE-TAG. - Add support for the 'PATCH' method as defined in RFC5789. - Reject requests with unsupported Expect header values. - Normalize the HTTP-version in forwarded requests and responses. - Server 'Keep-Alive' headers are no longer forwarded. - Change declared template file encoding to UTF-8. - Do not pass rejected keep-alive timeouts to the server. - CGI templates no longer enforce new windows for some links. - Documentation improvements - Build system improvements - Action file improvements: - The pattern 'promotions.' is no longer being blocked. - Various updated filter rules and exceptions. - Filter file improvements & bug fixes: - Decrease the chances that js-annoyances creates invalid JavaScript. - Let the msn filter hide 'related' ads again. - Prevent img-reorder from messing up img tags with empty src attributes. - add source URL - fix self-obsoletion - clean up spec file * Sun Nov 09 2014 Led <ledest@gmail.com> - fix bashisms in pre script
/etc/NetworkManager /etc/NetworkManager/dispatcher.d /etc/NetworkManager/dispatcher.d/privoxyd /etc/logrotate.d/privoxy /etc/privoxy /usr/lib/systemd/system/privoxy.service /usr/sbin/privoxy /usr/sbin/rcprivoxy /usr/share/doc/packages/privoxy /usr/share/doc/packages/privoxy/AUTHORS /usr/share/doc/packages/privoxy/ChangeLog /usr/share/doc/packages/privoxy/README /usr/share/licenses/privoxy /usr/share/licenses/privoxy/LICENSE /usr/share/man/man8/privoxy.8.gz /var/lib/privoxy /var/lib/privoxy/etc /var/lib/privoxy/etc/config /var/lib/privoxy/etc/default.action /var/lib/privoxy/etc/default.filter /var/lib/privoxy/etc/match-all.action /var/lib/privoxy/etc/regression-tests.action /var/lib/privoxy/etc/templates /var/lib/privoxy/etc/templates/blocked /var/lib/privoxy/etc/templates/cgi-error-404 /var/lib/privoxy/etc/templates/cgi-error-bad-param /var/lib/privoxy/etc/templates/cgi-error-disabled /var/lib/privoxy/etc/templates/cgi-error-file /var/lib/privoxy/etc/templates/cgi-error-file-read-only /var/lib/privoxy/etc/templates/cgi-error-modified /var/lib/privoxy/etc/templates/cgi-error-parse /var/lib/privoxy/etc/templates/cgi-style.css /var/lib/privoxy/etc/templates/client-tags /var/lib/privoxy/etc/templates/connect-failed /var/lib/privoxy/etc/templates/connection-timeout /var/lib/privoxy/etc/templates/default /var/lib/privoxy/etc/templates/edit-actions-add-url-form /var/lib/privoxy/etc/templates/edit-actions-for-url /var/lib/privoxy/etc/templates/edit-actions-for-url-filter /var/lib/privoxy/etc/templates/edit-actions-for-url-string-action /var/lib/privoxy/etc/templates/edit-actions-list /var/lib/privoxy/etc/templates/edit-actions-list-button /var/lib/privoxy/etc/templates/edit-actions-list-section /var/lib/privoxy/etc/templates/edit-actions-list-url /var/lib/privoxy/etc/templates/edit-actions-remove-url-form /var/lib/privoxy/etc/templates/edit-actions-url-form /var/lib/privoxy/etc/templates/forwarding-failed /var/lib/privoxy/etc/templates/mod-local-help /var/lib/privoxy/etc/templates/mod-support-and-service /var/lib/privoxy/etc/templates/mod-title /var/lib/privoxy/etc/templates/mod-unstable-warning /var/lib/privoxy/etc/templates/no-server-data /var/lib/privoxy/etc/templates/no-such-domain /var/lib/privoxy/etc/templates/show-request /var/lib/privoxy/etc/templates/show-status /var/lib/privoxy/etc/templates/show-status-file /var/lib/privoxy/etc/templates/show-url-info /var/lib/privoxy/etc/templates/toggle /var/lib/privoxy/etc/templates/toggle-mini /var/lib/privoxy/etc/templates/untrusted /var/lib/privoxy/etc/templates/url-info-osd.xml /var/lib/privoxy/etc/templates/wpad.dat /var/lib/privoxy/etc/trust /var/lib/privoxy/etc/user.action /var/lib/privoxy/etc/user.filter /var/lib/privoxy/lib64 /var/lib/privoxy/log /var/lib/privoxy/var /var/lib/privoxy/var/log /var/lib/privoxy/var/log/privoxy /var/lib/privoxy/var/run
Generated by rpm2html 1.8.1
Fabrice Bellet, Tue Jul 9 18:25:27 2024