"http://www.privoxy.org/" target="_top">Privoxy
Developers</a></sub><br></p>
- <p class="PUBDATE">$Id: developer-manual.sgml,v 2.59 2016/01/17
- 14:32:18 fabiankeil Exp $<br></p>
+ <p class="PUBDATE">$Id: developer-manual.sgml,v 2.60 2016/01/21
+ 15:55:48 fabiankeil Exp $<br></p>
<div>
<div class="ABSTRACT">
2001-2014 by <a href="http://www.privoxy.org/" target="_top">Privoxy
Developers</a></sub><br></p>
- <p class="PUBDATE">$Id: faq.sgml,v 2.110 2016/01/17 14:32:19 fabiankeil
+ <p class="PUBDATE">$Id: faq.sgml,v 2.111 2016/01/21 15:55:49 fabiankeil
Exp $<br></p>
<div>
2001-2014 by <a href="http://www.privoxy.org/" target="_top">Privoxy
Developers</a></sub><br></p>
- <p class="PUBDATE">$Id: user-manual.sgml,v 2.198 2016/01/17 14:32:19
+ <p class="PUBDATE">$Id: user-manual.sgml,v 2.199 2016/01/21 15:55:49
fabiankeil Exp $<br></p>
<div>
<p><span class="APPLICATION">Privoxy 3.0.24</span> stable contains a
couple of new features but is mainly a bug-fix release. Two of the fixed
- bugs are security issues (CVE requests pending) and may be used to
- remotely trigger crashes on platforms that carefully check memory
- accesses (most don't).</p>
+ bugs are security issues and may be used to remotely trigger crashes on
+ platforms that carefully check memory accesses (most don't).</p>
<ul>
<li>
<ul>
<li>
<p>Prevent invalid reads in case of corrupt chunk-encoded
- content. Bug discovered with afl-fuzz and AddressSanitizer.</p>
+ content. CVE-2016-1982. Bug discovered with afl-fuzz and
+ AddressSanitizer.</p>
</li>
<li>
<p>Remove empty Host headers in client requests. Previously they
- would result in invalid reads. Bug discovered with afl-fuzz and
- AddressSanitizer.</p>
+ would result in invalid reads. CVE-2016-1983. Bug discovered with
+ afl-fuzz and AddressSanitizer.</p>
</li>
</ul>
</li>
<li>
<p>Fixed crashes when executing external filters on platforms
- like Mac OS X. Reported by Jonathan McKenzie on ijbswa-users@.</p>
+ like Mac OS X. Reported by Jonathan McKenzie on
+ ijbswa-users@.</p>
</li>
<li>