--------------------------------------------------------------------
ChangeLog for Privoxy
--------------------------------------------------------------------
-*** Version 3.0.30 UNRELEASED ***
+*** Version 3.0.31 stable ***
+
+- Security/Reliability:
+ - Prevent an assertion from getting triggered by a crafted CGI request.
+ Commit 5bba5b89193fa. OVE-20210130-0001. CVE-2021-20217.
+ Reported by: Joshua Rogers (Opera)
+ - Fixed a memory leak when decompression fails "unexpectedly".
+ Commit f431d61740cc0. OVE-20210128-0001. CVE-2021-20216.
+
+- Bug fixes:
+ - Fixed detection of insufficient data for decompression.
+ Previously Privoxy could try to decompress a partly
+ uninitialized buffer.
+
+*** Version 3.0.30 stable ***
- Bug fixes:
- Check the actual URL for redirects when https inspecting requests.
the TLS backend resources are free'd later on and only if no active
connections are left. Prevents crashes when exiting "gracefully" at the
wrong time.
+ - Let the uninstall target remove the config file even if DESTDIR
+ is set and properly announce the deletion of the configuration files.
- General improvements:
- Allow to rewrite the request destination for https-inspected
- The configure script will bail out if OpenSSL and mbedTLS are
enabled at the same time.
- Log a message right before exiting gracefully.
- - A couple of structure have been rearranged to require slightly
+ - A couple of structures have been rearranged to require slightly
less memory.
- - When HTTPS inspection is enabled and the certificate is invalid
+ - When https inspection is enabled and the certificate is invalid
the error message is now sent with status code 403 instead of 200.
- The Slackware rc script template has been renamed to
slackware/rc.privoxy.in to silence complaints when building
- When building with MbedTLS support, mbedtls_md5_ret() is used
instead of mbedtls_md5() which is deprecated and causes a warning
on Debian GNU/Linux.
- - The man page has been moved from section 1 to man section 8.
- Action file improvements:
- Block requests to eu-tlp03.kameleoon.com/.
inserts a link to Privoxy's webinterface and adds a new line at
the end of the generated page.
-- privoxy-log-parser:
+- Privoxy-Log-Parser:
- Highlight a few more messages.
- Add a handler for tagging messages.
- - Bump version to 0.9.2.
- Properly deal with 'Certificate error' crunches
Previously the error description was highlighted as 'host'.
- Log truncated LOG_LEVEL_CLF messages more gracefully
and note that the statistics will be imprecise.
- Fixed perldoc typo.
+ - Bump version to 0.9.2.
-- privoxy-regression-test:
+- Privoxy-Regression-Test:
- Use http://127.0.0.1:8118/ as default Privoxy address
unless http_proxy is set through the environment.
- Add a --privoxy-cgi-prefix option that specifies the prefix
"TAG:^(application|text)/(x-)?javascript$".
- When get_cgi_page_or_else() fails, include the URL of the
requested page in the log message.
+ - Added a --check-bad-ssl option that can be used to verify that
+ Privoxy detects certificate problems when accessing the test
+ sites from badssl.com.
- Bumped version to 0.7.2
- uagen:
- Bumped generated Firefox version to 78 (ESR).
- Bumped version to 1.2.2.
- - User Documentation:
+ - User documentation:
- Remove reference to 'How to Report Bugs Effectively'.
It was only rendered as text without URL in the README anyway
and there's no indication that users read it ...
- Replace CVS reference with git.
- Mention regression-tests.action in the config file.
- Explicitly mention in the config file that access to the
- ca key should be limited to Privoxy.
+ CA key should be limited to Privoxy.
- List more client-specific-tag examples for inspiration.
- Add additional headers to the client-header-order example.
- Note that actions aren't updated after rewrites.
- Note that protocol and host have to be added when rewriting
the destination host for https-inspected requests.
- Explicitly mention that the CA key is used to sign certificates.
+ - Put openssl command in 'command' tags.
+ - The man page has been moved from section 1 to man section 8.
-- Developer Manual:
+- Developer manual:
- Flesh out the build instructions for Debian.
- Remove the packaging instructions for RPM-based systems.
They don't work and we don't release RPM packages anymore anyway.
They are not actually available through git (yet).
- Don't speak of Privoxy version 3 in the past tense.
- Update the list of programs required for the release process.
- - Put openssl command in 'command' tags.
- Update description of the webserver target which uses ssh, not scp.
- Remove obsolete reference to config.new.
- Add a link to Privoxy-Regression-Test to regression-tests.action
in case it isn't packaged.
- Add regression tests for pcre host patterns.
+ - Fixed a regression test that is executed when
+ FEATURE_GRACEFUL_TERMINATION is enabled.
-- Privoxy Infrastructure:
+- Privoxy infrastructure:
- Import a Privoxy logo for the website.
- Update Tor onion service to HiddenServiceVersion 3.
- Display the "model" photos in a single row and remove placeholder images.
- Fixed memory leaks when a response is buffered and the buffer
limit is reached or Privoxy is running out of memory.
Commits bbd53f1010b and 4490d451f9b. OVE-20201118-0001.
+ CVE-2020-35502.
Sponsored by: Robert Klemme
- Fixed a memory leak in the show-status CGI handler when
no action files are configured. Commit c62254a686.
- OVE-20201118-0002.
+ OVE-20201118-0002. CVE-2021-20209.
Sponsored by: Robert Klemme
- Fixed a memory leak in the show-status CGI handler when
no filter files are configured. Commit 1b1370f7a8a.
- OVE-20201118-0003.
+ OVE-20201118-0003. CVE-2021-20210.
Sponsored by: Robert Klemme
- Fixes a memory leak when client tags are active.
- Commit 245e1cf32. OVE-20201118-0004.
+ Commit 245e1cf32. OVE-20201118-0004. CVE-2021-20211.
Sponsored by: Robert Klemme
- Fixed a memory leak if multiple filters are executed
and the last one is skipped due to a pcre error.
- Commit 5cfb7bc8fe. OVE-20201118-0005.
+ Commit 5cfb7bc8fe. OVE-20201118-0005. CVE-2021-20212.
- Prevent an unlikely dereference of a NULL-pointer that
could result in a crash if accept-intercepted-requests
was enabled, Privoxy failed to get the request destination
from the Host header and a memory allocation failed.
- Commit 7530132349. CID 267165. OVE-20201118-0006.
+ Commit 7530132349. CID 267165. OVE-20201118-0006. CVE-2021-20213.
- Fixed memory leaks in the client-tags CGI handler when
client tags are configured and memory allocations fail.
- Commit cf5640eb2a. CID 267168. OVE-20201118-0007.
+ Commit cf5640eb2a. CID 267168. OVE-20201118-0007. CVE-2021-20214.
- Fixed memory leaks in the show-status CGI handler when memory
allocations fail. Commit 064eac5fd0 and commit fdee85c0bf3.
- CID 305233. OVE-20201118-0008.
+ CID 305233. OVE-20201118-0008. CVE-2021-20215.
- General improvements:
- Added experimental https inspection support which allows to filter