SCIENTIFIC-LINUX-ERRATA Archives

November 2012

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Pat Riehecky <[log in to unmask]>
Reply To:
Pat Riehecky <[log in to unmask]>
Date:
Thu, 15 Nov 2012 08:45:18 -0600
Content-Type:
text/plain
Parts/Attachments:
text/plain (41 lines)
Synopsis:          Moderate: libproxy security update
Issue Date:        2012-11-14
CVE Numbers:       CVE-2012-4505
--

A buffer overflow flaw was found in the way libproxy handled the
downloading of proxy auto-configuration (PAC) files. A malicious server
hosting a PAC file or a man-in-the-middle attacker could use this flaw to
cause an application using libproxy to crash or, possibly, execute
arbitrary code, if the proxy settings obtained by libproxy (from the
environment or the desktop environment settings) instructed the use of a
PAC proxy configuration. (CVE-2012-4505)

All applications using libproxy must be restarted for this update to
take effect.
--

SL6
   x86_64
     libproxy-0.3.0-3.el6_3.i686.rpm
     libproxy-0.3.0-3.el6_3.x86_64.rpm
     libproxy-bin-0.3.0-3.el6_3.x86_64.rpm
     libproxy-python-0.3.0-3.el6_3.x86_64.rpm
     libproxy-devel-0.3.0-3.el6_3.i686.rpm
     libproxy-devel-0.3.0-3.el6_3.x86_64.rpm
     libproxy-gnome-0.3.0-3.el6_3.x86_64.rpm
     libproxy-kde-0.3.0-3.el6_3.x86_64.rpm
     libproxy-mozjs-0.3.0-3.el6_3.x86_64.rpm
     libproxy-webkit-0.3.0-3.el6_3.x86_64.rpm
   i386
     libproxy-0.3.0-3.el6_3.i686.rpm
     libproxy-bin-0.3.0-3.el6_3.i686.rpm
     libproxy-python-0.3.0-3.el6_3.i686.rpm
     libproxy-devel-0.3.0-3.el6_3.i686.rpm
     libproxy-gnome-0.3.0-3.el6_3.i686.rpm
     libproxy-kde-0.3.0-3.el6_3.i686.rpm
     libproxy-mozjs-0.3.0-3.el6_3.i686.rpm
     libproxy-webkit-0.3.0-3.el6_3.i686.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2