Mageia 2020-0373: libproxy security update
Summary
url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote
HTTP server to trigger uncontrolled recursion via a response composed of an
infinite stream that lacks a newline character. This leads to stack
exhaustion. (CVE-2020-25219)
References
- https://bugs.mageia.org/show_bug.cgi?id=27302
- https://www.debian.org/lts/security/2020/dla-2372
- https://ubuntu.com/security/notices/USN-4514-1
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/CNID6EZVOVH7EZB7KFU2EON54CFDIVUR/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25219
Resolution
MGASA-2020-0373 - Updated libproxy packages fix security vulnerability
SRPMS
- 7/core/libproxy-0.4.15-4.1.mga7