diff options
| author | Martin Weinelt <hexa@darmstadt.ccc.de> | 2020-11-28 21:52:23 +0100 |
|---|---|---|
| committer | Martin Weinelt <hexa@darmstadt.ccc.de> | 2020-11-28 21:52:23 +0100 |
| commit | c0e0a6876f8377096223c39d035924f77c9dcff1 (patch) | |
| tree | 2831e5403de8ffc961f5e94ae5837682dfc856b6 /pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch | |
| parent | ebe455a410c261c033d4297954c73c3884511ea8 (diff) | |
libproxy: fix CVE-2020-25219, CVE-2020-26154
CVE-2020-25219:
url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a
remote HTTP server to trigger uncontrolled recursion via a response
composed of an infinite stream that lacks a newline character. This
leads to stack exhaustion.
CVE-2020-26154:
url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when
PAC is enabled, as demonstrated by a large PAC file that is delivered
without a Content-length header.
Fixes: CVE-2020-25219, CVE-2020-26154
Diffstat (limited to 'pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch')
0 files changed, 0 insertions, 0 deletions
