From $URL: "An invalid free flaw was found in the way Squid proxy caching server processed DNS requests, where one CNAME record pointed to another CNAME record pointing to an empty A-record. A remote attacker could issue a specially-crafted DNS request, leading to denial of service (squid daemon abort)." Fixed in Squid 3.1.16.
+*squid-3.1.16 (01 Nov 2011) + + 01 Nov 2011; Eray Aslan <eras@gentoo.org> +squid-3.1.16.ebuild: + non-maintainer version bump - security bug #389133 + @security: Please test and stabilize squid-3.1.16. Thank you.
Thanks eras. Arches, please test and mark stable: =net-proxy/squid-3.1.16 Target KEYWORDS="alpha amd64 hppa ia64 ppc ppc64 sparc x86"
AMD64 stable
Stable for HPPA.
x86 stable, thanks.
ppc done
alpha/ia64/sparc stable
CVE-2011-4096 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4096): The idnsGrokReply function in Squid before 3.1.16 does not properly free memory, which allows remote attackers to cause a denial of service (daemon abort) via a DNS reply containing a CNAME record that references another CNAME record that contains an empty A record.
ppc64 done
Thanks everyone. @security: please vote for GLSA.
Thanks, folks. GLSA Vote: yes.
Vote: Yes. GLSA request filed.
This issue was resolved and addressed in GLSA 201309-22 at http://security.gentoo.org/glsa/glsa-201309-22.xml by GLSA coordinator Sergey Popov (pinkbyte).