Gentoo Linux Security Advisory 201404-2 - A buffer overflow in libproxy might allow remote attackers to execute arbitrary code. Versions less than 0.4.10 are affected.
13c9b943b1ffcfba6bbba3bd40ae7cfa2ece2d10b6a05055367f668057cbd60d
Mandriva Linux Security Advisory 2012-172 - Stack-based buffer overflow in the url::get_pac function in url.cpp in libproxy 0.4.x before 0.4.9 allows remote servers to have an unspecified impact via a large proxy.pac file. The updated packages have been patched to correct this issue.
02a25e5905882a2a706131a0db3229bdc2ff4621ce2936bd1a05e5416c3a6d68
Ubuntu Security Notice 1629-1 - Tomas Mraz discovered that libproxy incorrectly handled certain PAC files. A remote attacker could use this issue to cause libproxy to crash, or to possibly execute arbitrary code.
2968459de6c88dc6181d4d9051c736f11dd989c514cf37bee924e54a846b2ca1