First published: Wed Sep 09 2020(Updated: )
url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an infinite stream that lacks a newline character. This leads to stack exhaustion.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Libproxy Project Libproxy | >=0.4.0<=0.4.15 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
openSUSE Leap | =15.1 | |
openSUSE Leap | =15.2 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =20.04 | |
debian/libproxy | <=0.4.15-13<=0.4.15-14<=0.4.15-5 | 0.4.15-15 0.4.15-5+deb10u1 |
ubuntu/libproxy | <0.4.15-1ubuntu0.1 | 0.4.15-1ubuntu0.1 |
ubuntu/libproxy | <0.4.15-10ubuntu1.1 | 0.4.15-10ubuntu1.1 |
ubuntu/libproxy | <0.4.11-5ubuntu1.1 | 0.4.11-5ubuntu1.1 |
debian/libproxy | 0.4.17-1 0.4.18-1.2 0.5.8-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.