Bug 27411 - libproxy new security issue CVE-2020-26154
Summary: libproxy new security issue CVE-2020-26154
Status: ASSIGNED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 7
Hardware: All Linux
Priority: Normal major
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2020-10-13 20:14 CEST by David Walser
Modified: 2020-10-15 12:02 CEST (History)
1 user (show)

See Also:
Source RPM: libproxy-0.4.15-4.1.mga7.src.rpm
CVE: CVE-2020-26154
Status comment:


Attachments

Description David Walser 2020-10-13 20:14:30 CEST
SUSE has issued an advisory today (October 13):
https://lists.suse.com/pipermail/sle-security-updates/2020-October/007540.html

Mageia 7 is also affected.
David Walser 2020-10-13 20:14:46 CEST

Whiteboard: (none) => MGA7TOO

Comment 1 David Walser 2020-10-13 20:52:42 CEST
Fedora has issued an advisory for this on October 2:
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/3BID3HVHAF6DA3YJOFDBSAZSMR3ODNIW/
Comment 2 Aurelien Oudelet 2020-10-14 18:46:34 CEST
Hi, thanks for reporting this bug.
Assigned to all package maintainer, as no registered one.
CC'ed recent commiter.

(Please set the status to 'assigned' if you are working on it)

CC: (none) => nicolas.salguero
Assignee: bugsquad => pkg-bugs
Keywords: (none) => Triaged

Comment 3 Nicolas Salguero 2020-10-15 12:02:51 CEST
Suggested advisory:
========================

The updated packages fix a security vulnerability:

url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is enabled, as demonstrated by a large PAC file that is delivered without a Content-length header. (CVE-2020-26154)

References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26154
https://lists.suse.com/pipermail/sle-security-updates/2020-October/007540.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/3BID3HVHAF6DA3YJOFDBSAZSMR3ODNIW/
========================

Updated packages in core/updates_testing:
========================
lib(64)proxy1-0.4.15-4.2.mga7
libproxy-utils-0.4.15-4.2.mga7
python2-libproxy-0.4.15-4.2.mga7
python3-libproxy-0.4.15-4.2.mga7
libproxy-perl-0.4.15-4.2.mga7
libproxy-gxsettings-0.4.15-4.2.mga7
lib(64)proxy-gnome-0.4.15-4.2.mga7
lib(64)proxy-kde-0.4.15-4.2.mga7
lib(64)proxy-networkmanager-0.4.15-4.2.mga7
lib(64)proxy-webkit-0.4.15-4.2.mga7
libproxy-pacrunner-0.4.15-4.2.mga7
lib(64)proxy-devel-0.4.15-4.2.mga7

from SRPM:
libproxy-0.4.15-4.2.mga7.src.rpm

Version: Cauldron => 7
Keywords: Triaged => (none)
Source RPM: libproxy-0.4.15-10.mga8.src.rpm => libproxy-0.4.15-4.1.mga7.src.rpm
Whiteboard: MGA7TOO => (none)
Status: NEW => ASSIGNED
Assignee: pkg-bugs => qa-bugs
CVE: (none) => CVE-2020-26154


Note You need to log in before you can comment on or make changes to this bug.