Processing control commands:
> tags -1 + fixed-upstream
Bug #968366 [src:libproxy] libproxy: CVE-2020-26154: buffer overflow when PAC
is enabled
Ignoring request to alter tags of bug #968366 to the same tags previously set
--
968366: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968366
Debi
Control: tags -1 + fixed-upstream
Hi,
On Thu, Aug 13, 2020 at 04:36:59PM +0100, Simon McVittie wrote:
> Source: libproxy
> Version: 0.4.14-2
> Severity: grave
> Justification: user security hole
> Tags: security upstream
> Forwarded: https://github.com/libproxy/libproxy/pull/126
> X-Debbugs-Cc: D
Source: libproxy
Version: 0.4.14-2
Severity: grave
Justification: user security hole
Tags: security upstream
Forwarded: https://github.com/libproxy/libproxy/pull/126
X-Debbugs-Cc: Debian Security Team
Li Fei (@lifeibiren on Github) reported that if the server serving a PAC
file sends more than 10
3 matches
Mail list logo