summaryrefslogtreecommitdiff
path: root/pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch
diff options
context:
space:
mode:
authorMartin Weinelt <hexa@darmstadt.ccc.de>2020-11-28 21:52:23 +0100
committerMartin Weinelt <hexa@darmstadt.ccc.de>2020-11-28 21:52:23 +0100
commitc0e0a6876f8377096223c39d035924f77c9dcff1 (patch)
tree2831e5403de8ffc961f5e94ae5837682dfc856b6 /pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch
parentebe455a410c261c033d4297954c73c3884511ea8 (diff)
libproxy: fix CVE-2020-25219, CVE-2020-26154
CVE-2020-25219: url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an infinite stream that lacks a newline character. This leads to stack exhaustion. CVE-2020-26154: url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is enabled, as demonstrated by a large PAC file that is delivered without a Content-length header. Fixes: CVE-2020-25219, CVE-2020-26154
Diffstat (limited to 'pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch')
0 files changed, 0 insertions, 0 deletions