vulnerability
SUSE: CVE-2020-25219: SUSE Linux Security Advisory
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:N/AC:L/Au:N/C:N/I:N/A:P) | Sep 9, 2020 | Oct 14, 2020 | Feb 4, 2022 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
Sep 9, 2020
Added
Oct 14, 2020
Modified
Feb 4, 2022
Description
url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an infinite stream that lacks a newline character. This leads to stack exhaustion.
Solution(s)
suse-upgrade-libproxy-develsuse-upgrade-libproxy-sharpsuse-upgrade-libproxy-toolssuse-upgrade-libproxy1suse-upgrade-libproxy1-32bitsuse-upgrade-libproxy1-config-gnome3suse-upgrade-libproxy1-config-gnome3-32bitsuse-upgrade-libproxy1-config-kdesuse-upgrade-libproxy1-networkmanagersuse-upgrade-libproxy1-networkmanager-32bitsuse-upgrade-libproxy1-pacrunner-webkitsuse-upgrade-perl-net-libproxysuse-upgrade-python-libproxysuse-upgrade-python3-libproxy

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.