vulnerability
SUSE: CVE-2020-26154: SUSE Linux Security Advisory
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:M/Au:N/C:P/I:P/A:P) | Sep 30, 2020 | Feb 7, 2021 | Feb 4, 2022 |
Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
Sep 30, 2020
Added
Feb 7, 2021
Modified
Feb 4, 2022
Description
url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is enabled, as demonstrated by a large PAC file that is delivered without a Content-length header.
Solutions
suse-upgrade-libproxy-develsuse-upgrade-libproxy-sharpsuse-upgrade-libproxy-toolssuse-upgrade-libproxy1suse-upgrade-libproxy1-32bitsuse-upgrade-libproxy1-config-gnome3suse-upgrade-libproxy1-config-gnome3-32bitsuse-upgrade-libproxy1-config-kdesuse-upgrade-libproxy1-networkmanagersuse-upgrade-libproxy1-networkmanager-32bitsuse-upgrade-libproxy1-pacrunner-webkitsuse-upgrade-perl-net-libproxysuse-upgrade-python-libproxysuse-upgrade-python3-libproxy
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.