{"schema_version":"1.7.2","id":"OESA-2022-1756","modified":"2022-07-22T11:03:59Z","published":"2022-07-22T11:03:59Z","upstream":["CVE-2020-25219"],"summary":"libproxy security update","details":"libproxy offers the following features:* extremely small core footprint (\u0026lt; 35k).* no external dependencies within libproxy core.(libproxy plugins may have dependencies).* only 3 functions in the stable external API.* dynamic adjustment to changing network topology.* a standard way of dealing with proxy settings across all scenarios.\r\n\r\nSecurity Fix(es):\r\n\r\nurl::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an infinite stream that lacks a newline character. This leads to stack exhaustion.(CVE-2020-25219)","affected":[{"package":{"ecosystem":"openEuler:20.03-LTS-SP1","name":"libproxy","purl":"pkg:rpm/openEuler/libproxy\u0026distro=openEuler-20.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.4.15-18.oe1"}]}],"ecosystem_specific":{"aarch64":["libproxy-0.4.15-18.oe1.aarch64.rpm","libproxy-debuginfo-0.4.15-18.oe1.aarch64.rpm","libproxy-debugsource-0.4.15-18.oe1.aarch64.rpm","libproxy-devel-0.4.15-18.oe1.aarch64.rpm","libproxy-webkitgtk4-0.4.15-18.oe1.aarch64.rpm"],"noarch":["libproxy-help-0.4.15-18.oe1.noarch.rpm","python2-libproxy-0.4.15-18.oe1.noarch.rpm","python3-libproxy-0.4.15-18.oe1.noarch.rpm"],"src":["libproxy-0.4.15-18.oe1.src.rpm"],"x86_64":["libproxy-0.4.15-18.oe1.x86_64.rpm","libproxy-debuginfo-0.4.15-18.oe1.x86_64.rpm","libproxy-debugsource-0.4.15-18.oe1.x86_64.rpm","libproxy-devel-0.4.15-18.oe1.x86_64.rpm","libproxy-webkitgtk4-0.4.15-18.oe1.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:20.03-LTS-SP3","name":"libproxy","purl":"pkg:rpm/openEuler/libproxy\u0026distro=openEuler-20.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.4.15-18.oe1"}]}],"ecosystem_specific":{"aarch64":["libproxy-0.4.15-18.oe1.aarch64.rpm","libproxy-debuginfo-0.4.15-18.oe1.aarch64.rpm","libproxy-debugsource-0.4.15-18.oe1.aarch64.rpm","libproxy-devel-0.4.15-18.oe1.aarch64.rpm","libproxy-webkitgtk4-0.4.15-18.oe1.aarch64.rpm"],"noarch":["libproxy-help-0.4.15-18.oe1.noarch.rpm","python2-libproxy-0.4.15-18.oe1.noarch.rpm","python3-libproxy-0.4.15-18.oe1.noarch.rpm"],"src":["libproxy-0.4.15-18.oe1.src.rpm"],"x86_64":["libproxy-0.4.15-18.oe1.x86_64.rpm","libproxy-debuginfo-0.4.15-18.oe1.x86_64.rpm","libproxy-debugsource-0.4.15-18.oe1.x86_64.rpm","libproxy-devel-0.4.15-18.oe1.x86_64.rpm","libproxy-webkitgtk4-0.4.15-18.oe1.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1756"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-25219"}],"database_specific":{"severity":"High"}}