ALT-PU-2021-2148-1
Closed vulnerabilities
BDU:2022-00328
Уязвимость компонента url.cpp библиотеки для управления конфигурацией прокси Libproxy, связанная с недостатком механизма проверки размера копируемых данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-00336
Уязвимость функции url::recvline компонента url.cpp библиотеки для управления конфигурацией прокси Libproxy, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-25219
url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an infinite stream that lacks a newline character. This leads to stack exhaustion.
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00030.html
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00033.html
- https://github.com/libproxy/libproxy/issues/134
- https://lists.debian.org/debian-lts-announce/2020/09/msg00012.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CNID6EZVOVH7EZB7KFU2EON54CFDIVUR/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JF5JSONJNO64ARWRVOS6K6HSIPHEF3H2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SSVZAAVHBJR3Z4MZNR55QW3OQFAS2STH/
- https://usn.ubuntu.com/4514-1/
- https://www.debian.org/security/2020/dsa-4800
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00030.html
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00033.html
- https://github.com/libproxy/libproxy/issues/134
- https://lists.debian.org/debian-lts-announce/2020/09/msg00012.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CNID6EZVOVH7EZB7KFU2EON54CFDIVUR/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JF5JSONJNO64ARWRVOS6K6HSIPHEF3H2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SSVZAAVHBJR3Z4MZNR55QW3OQFAS2STH/
- https://usn.ubuntu.com/4514-1/
- https://www.debian.org/security/2020/dsa-4800
Modified: 2024-11-21
CVE-2020-26154
url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is enabled, as demonstrated by a large PAC file that is delivered without a Content-length header.
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00030.html
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00033.html
- https://bugs.debian.org/968366
- https://github.com/libproxy/libproxy/pull/126
- https://lists.debian.org/debian-lts-announce/2020/11/msg00024.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3BID3HVHAF6DA3YJOFDBSAZSMR3ODNIW/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WZVZXTFMFTSML3J6OOCDBDYH474BRJSW/
- https://www.debian.org/security/2020/dsa-4800
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00030.html
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00033.html
- https://bugs.debian.org/968366
- https://github.com/libproxy/libproxy/pull/126
- https://lists.debian.org/debian-lts-announce/2020/11/msg00024.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3BID3HVHAF6DA3YJOFDBSAZSMR3ODNIW/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WZVZXTFMFTSML3J6OOCDBDYH474BRJSW/
- https://www.debian.org/security/2020/dsa-4800