CVE-2020-26154

NameCVE-2020-26154
Descriptionurl.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is enabled, as demonstrated by a large PAC file that is delivered without a Content-length header.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium
Debian Bugs968366

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libproxy (PTS)stretch0.4.14-2vulnerable
stretch (security)0.4.14-2+deb9u1vulnerable
buster0.4.15-5vulnerable
bullseye, sid0.4.15-14vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libproxysource(unstable)(unfixed)968366

Notes

https://github.com/libproxy/libproxy/pull/126

Search for package or bug name: Reporting problems