Bug#971394: libproxy: CVE-2020-25219
Salvatore Bonaccorso
carnil at debian.org
Tue Sep 29 21:15:35 BST 2020
Source: libproxy
Version: 0.4.15-14
Severity: important
Tags: security upstream
Forwarded: https://github.com/libproxy/libproxy/issues/134
X-Debbugs-Cc: carnil at debian.org, Debian Security Team <team at security.debian.org>
Control: found -1 0.4.15-13
Control: found -1 0.4.15-5
Hi,
The following vulnerability was published for libproxy.
CVE-2020-25219[0]:
| url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a
| remote HTTP server to trigger uncontrolled recursion via a response
| composed of an infinite stream that lacks a newline character. This
| leads to stack exhaustion.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2020-25219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25219
[1] https://github.com/libproxy/libproxy/issues/134
Regards,
Salvatore
More information about the pkg-gnome-maintainers
mailing list