First published: Mon Sep 19 2022(Updated: )
Last updated 6 January 2025
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/tinyproxy | <=1.10.0-5 | 1.10.0-5+deb11u1 1.11.1-2.1+deb12u1 1.11.2-1 |
Tinyproxy | <=1.11.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-40468 is classified as a medium severity vulnerability due to the potential leak of sensitive data from uninitialized buffers.
To fix CVE-2022-40468, update Tinyproxy to version 1.10.0-5+deb11u1, 1.11.1-2.1+deb12u1, or 1.11.2-1.
CVE-2022-40468 affects Tinyproxy versions up to and including 1.11.1.
CVE-2022-40468 is caused by the use of uninitialized buffers in the process_request() function when custom error page templates are used.
Currently, no specific workaround is recommended for CVE-2022-40468 other than updating to a patched version.