MGASA-2025-0003

Source
https://advisories.mageia.org/MGASA-2025-0003.html
Import Source
https://advisories.mageia.org/MGASA-2025-0003.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2025-0003
Related
Published
2025-01-10T19:54:34Z
Modified
2025-01-10T19:23:52Z
Summary
Updated tinyproxy packages fix security vulnerabilities
Details

Potential leak of left-over heap data if custom error page templates containing special non-standard variables are used. Tinyproxy commit 84f203f and earlier use uninitialized buffers in process_request() function.. (CVE-2022-40468) A use-after-free vulnerability exists in the HTTP Connection Headers parsing in Tinyproxy 1.11.1 and Tinyproxy 1.10.0. A specially crafted HTTP header can trigger reuse of previously freed memory, which leads to memory corruption and could lead to remote code execution. An attacker needs to make an unauthenticated HTTP request to trigger this vulnerability. (CVE-2023-49606)

References
Credits

Affected packages

Mageia:9 / tinyproxy

Package

Name
tinyproxy
Purl
pkg:rpm/mageia/tinyproxy?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.10.0-3.1.mga9

Ecosystem specific

{
    "section": "core"
}