A vulnerability has been reported in Polipo, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an unspecified error when handling POST requests that were aborted by the server. This can be exploited to e.g. crash the Polipo service by tricking a user into connecting to a malicious server. The vulnerability is reported in versions prior to 1.0.2. Note: This also fixes a crash when handling entities larger than 2 GB. Solution: Update to version 1.0.2.
setting status / cc'ing. net-proxy, please provide updated ebuild.
Version 1.0.2 is now in the tree. Arch teams, please test and mark it stable.
great, thanks for the reactivity :)
net-proxy/polipo-1.0.2 1. Emerges on AMD64. 2. Collision with /usr/info/dir
Fixed in -r1. Now it installs man and info pages in /usr/share/man respectively /usr/share/info.
net-proxy/polipo-1.0.2 1. Emerges on AMD64. 2. No collisions 3. It's a very easy to configure http proxy server. Browsed some webpages through proxy using cache. All OK.
net-proxy/polipo-1.0.2-r1 1. Emerges on AMD64. 2. No collisions 3. It's a very easy to configure http proxy server. Browsed some webpages through proxy using cache. All OK. PS: The test was on r1. Sorry!
amd64 stable
x86 stable, last arch, GLSA voting now open
thanks Christian. I tend to vote NO.
Voting NO.
I vote no, kick it to the curb.
Closing without GLSA.