Home
Reading
Searching
Subscribe
Sponsors
Statistics
Posting
Contact
Spam
Lists
Links
About
Hosting
Filtering
Features Download
Marketing
Archives
FAQ
Blog
 
Gmane
From: Pat Riehecky <riehecky-13hema8v3vg <at> public.gmane.org>
Subject: Security ERRATA Moderate: libproxy on SL6.x i386/x86_64
Newsgroups: gmane.linux.scientific.errata
Date: Thursday 15th November 2012 14:45:18 UTC (over 4 years ago)
Synopsis:          Moderate: libproxy security update
Issue Date:        2012-11-14
CVE Numbers:       CVE-2012-4505
--

A buffer overflow flaw was found in the way libproxy handled the
downloading of proxy auto-configuration (PAC) files. A malicious server
hosting a PAC file or a man-in-the-middle attacker could use this flaw to
cause an application using libproxy to crash or, possibly, execute
arbitrary code, if the proxy settings obtained by libproxy (from the
environment or the desktop environment settings) instructed the use of a
PAC proxy configuration. (CVE-2012-4505)

All applications using libproxy must be restarted for this update to
take effect.
--

SL6
   x86_64
     libproxy-0.3.0-3.el6_3.i686.rpm
     libproxy-0.3.0-3.el6_3.x86_64.rpm
     libproxy-bin-0.3.0-3.el6_3.x86_64.rpm
     libproxy-python-0.3.0-3.el6_3.x86_64.rpm
     libproxy-devel-0.3.0-3.el6_3.i686.rpm
     libproxy-devel-0.3.0-3.el6_3.x86_64.rpm
     libproxy-gnome-0.3.0-3.el6_3.x86_64.rpm
     libproxy-kde-0.3.0-3.el6_3.x86_64.rpm
     libproxy-mozjs-0.3.0-3.el6_3.x86_64.rpm
     libproxy-webkit-0.3.0-3.el6_3.x86_64.rpm
   i386
     libproxy-0.3.0-3.el6_3.i686.rpm
     libproxy-bin-0.3.0-3.el6_3.i686.rpm
     libproxy-python-0.3.0-3.el6_3.i686.rpm
     libproxy-devel-0.3.0-3.el6_3.i686.rpm
     libproxy-gnome-0.3.0-3.el6_3.i686.rpm
     libproxy-kde-0.3.0-3.el6_3.i686.rpm
     libproxy-mozjs-0.3.0-3.el6_3.i686.rpm
     libproxy-webkit-0.3.0-3.el6_3.i686.rpm

- Scientific Linux Development Team
 
CD: 4ms