CVE-2020-26154

Published: 30 September 2020

url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is enabled, as demonstrated by a large PAC file that is delivered without a Content-length header.

Priority

Medium

CVSS 3 base score: 9.8

Status

Package Release Status
libproxy
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 21.04 (Hirsute Hippo) Not vulnerable

Ubuntu 20.10 (Groovy Gorilla)
Released (0.4.15-13ubuntu1.1)
Ubuntu 20.04 LTS (Focal Fossa)
Released (0.4.15-10ubuntu1.2)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (0.4.15-1ubuntu0.2)
Ubuntu 16.04 LTS (Xenial Xerus)
Released (0.4.11-5ubuntu1.2)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist

Patches:
Upstream: https://github.com/libproxy/libproxy/pull/126
Upstream: https://github.com/libproxy/libproxy/commit/6d342b50366a048d3d543952e2be271b5742c5f8