MGASA-2020-0399 - Updated libproxy packages fix a security vulnerability

Publication date: 08 Nov 2020
URL: https://advisories.mageia.org/MGASA-2020-0399.html
Type: security
Affected Mageia releases: 7
CVE: CVE-2020-26154

url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is
enabled, as demonstrated by a large PAC file that is delivered without a
Content-length header. (CVE-2020-26154)

References:
- https://bugs.mageia.org/show_bug.cgi?id=27411
- https://lists.suse.com/pipermail/sle-security-updates/2020-October/007540.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/3BID3HVHAF6DA3YJOFDBSAZSMR3ODNIW/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26154

SRPMS:
- 7/core/libproxy-0.4.15-4.2.mga7

Mageia 2020-0399: libproxy security update

url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is enabled, as demonstrated by a large PAC file that is delivered without a Content-length header

Summary

url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is enabled, as demonstrated by a large PAC file that is delivered without a Content-length header. (CVE-2020-26154)

References

- https://bugs.mageia.org/show_bug.cgi?id=27411

- https://lists.suse.com/pipermail/sle-security-updates/2020-October/007540.html

- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/3BID3HVHAF6DA3YJOFDBSAZSMR3ODNIW/

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26154

Resolution

MGASA-2020-0399 - Updated libproxy packages fix a security vulnerability

SRPMS

- 7/core/libproxy-0.4.15-4.2.mga7

Severity
Publication date: 08 Nov 2020
URL: https://advisories.mageia.org/MGASA-2020-0399.html
Type: security
CVE: CVE-2020-26154

Related News