Updated libproxy packages fix a security vulnerability
Publication date: 08 Nov 2020Modification date: 08 Nov 2020
Type: security
Affected Mageia releases : 7
CVE: CVE-2020-26154
Description
url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is enabled, as demonstrated by a large PAC file that is delivered without a Content-length header. (CVE-2020-26154)
References
- https://bugs.mageia.org/show_bug.cgi?id=27411
- https://lists.suse.com/pipermail/sle-security-updates/2020-October/007540.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/3BID3HVHAF6DA3YJOFDBSAZSMR3ODNIW/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26154
SRPMS
7/core
- libproxy-0.4.15-4.2.mga7