CVE-2022-40468

NameCVE-2022-40468
DescriptionPotential leak of left-over heap data if custom error page templates containing special non-standard variables are used. Tinyproxy commit 84f203f and earlier use uninitialized buffers in process_request() function.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3892-1
Debian Bugs1021015

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
tinyproxy (PTS)jessie, jessie (lts)1.8.3-3+deb8u1vulnerable
stretch1.8.4-3~deb9u2fixed
buster1.10.0-2+deb10u1vulnerable
bullseye1.10.0-5vulnerable
bullseye (security)1.10.0-5+deb11u1fixed
bookworm (security), bookworm1.11.1-2.1+deb12u1fixed
sid, trixie1.11.2-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
tinyproxysourcejessie(unfixed)end-of-life
tinyproxysourcestretch(not affected)
tinyproxysourcebullseye1.10.0-5+deb11u1DLA-3892-1
tinyproxysource(unstable)1.11.1-21021015

Notes

[buster] - tinyproxy <postponed> (Minor issue)
https://github.com/tinyproxy/tinyproxy/issues/457
https://github.com/tinyproxy/tinyproxy/commit/3764b8551463b900b5b4e3ec0cd9bb9182191cb7
[stretch] - tinyproxy <not-affected> (Vulnerable code not present)

Search for package or bug name: Reporting problems