Bug#968366: libproxy#126: buffer overflow when PAC is enabled

2020-11-14 Thread Salvatore Bonaccorso
Control: tags -1 + fixed-upstream Hi, On Thu, Aug 13, 2020 at 04:36:59PM +0100, Simon McVittie wrote: > Source: libproxy > Version: 0.4.14-2 > Severity: grave > Justification: user security hole > Tags: security upstream > Forwarded: https://github.com/libproxy/libproxy/pull/126 > X-Debbugs-Cc: D

Bug#968366: libproxy#126: buffer overflow when PAC is enabled

2020-08-13 Thread Simon McVittie
Source: libproxy Version: 0.4.14-2 Severity: grave Justification: user security hole Tags: security upstream Forwarded: https://github.com/libproxy/libproxy/pull/126 X-Debbugs-Cc: Debian Security Team Li Fei (@lifeibiren on Github) reported that if the server serving a PAC file sends more than 10