Several vulnerabilities have been fixed in privoxy, a privacy enhancing
HTTP proxy:
unmap(): Prevent use-after-free if the map only consists of one item.
pcrs_execute(): Consistently set *result to NULL in case of errors.
Should make use-after-free in the caller less likely.
We recommend that you upgrade your privoxy packages.
For Debian 6 Squeeze, these issues have been fixed in privoxy version 3.0.16-1+deb6u1