many fixes and improvements - see the ChangeLog file one marked as security relevant: If the redirect URL contains characters RFC 3986 doesn't permit, they are (re)encoded. Not doing this makes Privoxy versions from 3.0.5 to 3.0.17 susceptible to HTTP response splitting (CWE-113) attacks if the +fast-redirects{check-decoded-url} action is used.
9 lines
521 B
Text
9 lines
521 B
Text
$NetBSD: distinfo,v 1.18 2011/12/07 16:13:51 drochner Exp $
|
|
|
|
SHA1 (privoxy-3.0.18-stable-src.tar.gz) = ffc797c478f8acac4e4894f4a9cb8a400c87c67c
|
|
RMD160 (privoxy-3.0.18-stable-src.tar.gz) = 5c5e5ac43b5b4e746ee0df0c9794bbfaa426d5f8
|
|
Size (privoxy-3.0.18-stable-src.tar.gz) = 1720020 bytes
|
|
SHA1 (patch-aa) = c263d2a4b9522a33613f82ab2bc18d5c2b554b21
|
|
SHA1 (patch-ab) = 6ab77caae5e6ac2b67c4c795af38db4da1310c61
|
|
SHA1 (patch-ac) = 6b0f5c2b32108cf4366a9f7feaad8a5be634e2e9
|
|
SHA1 (patch-ag) = 631b73e17d2f825ae6c2fa2d832db98e166030ba
|