Summary: | <net-proxy/squid-3.1.16 Invalid free DoS vulnerability (CVE-2011-4096) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Sean Amoss (RETIRED) <ackle> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | eras, net-proxy+disabled |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.openwall.com/lists/oss-security/2011/10/31/5 | ||
Whiteboard: | B3 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Sean Amoss (RETIRED)
2011-10-31 22:36:43 UTC
+*squid-3.1.16 (01 Nov 2011) + + 01 Nov 2011; Eray Aslan <eras@gentoo.org> +squid-3.1.16.ebuild: + non-maintainer version bump - security bug #389133 + @security: Please test and stabilize squid-3.1.16. Thank you. Thanks eras. Arches, please test and mark stable: =net-proxy/squid-3.1.16 Target KEYWORDS="alpha amd64 hppa ia64 ppc ppc64 sparc x86" AMD64 stable Stable for HPPA. x86 stable, thanks. ppc done alpha/ia64/sparc stable CVE-2011-4096 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4096): The idnsGrokReply function in Squid before 3.1.16 does not properly free memory, which allows remote attackers to cause a denial of service (daemon abort) via a DNS reply containing a CNAME record that references another CNAME record that contains an empty A record. ppc64 done Thanks everyone. @security: please vote for GLSA. Thanks, folks. GLSA Vote: yes. Vote: Yes. GLSA request filed. This issue was resolved and addressed in GLSA 201309-22 at http://security.gentoo.org/glsa/glsa-201309-22.xml by GLSA coordinator Sergey Popov (pinkbyte). |