Bug#971394: libproxy: CVE-2020-25219

Salvatore Bonaccorso carnil at debian.org
Tue Sep 29 21:15:35 BST 2020


Source: libproxy
Version: 0.4.15-14
Severity: important
Tags: security upstream
Forwarded: https://github.com/libproxy/libproxy/issues/134
X-Debbugs-Cc: carnil at debian.org, Debian Security Team <team at security.debian.org>
Control: found -1 0.4.15-13
Control: found -1 0.4.15-5

Hi,

The following vulnerability was published for libproxy.

CVE-2020-25219[0]:
| url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a
| remote HTTP server to trigger uncontrolled recursion via a response
| composed of an infinite stream that lacks a newline character. This
| leads to stack exhaustion.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2020-25219
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25219
[1] https://github.com/libproxy/libproxy/issues/134

Regards,
Salvatore



More information about the pkg-gnome-maintainers mailing list