| Summary: | squid-cachemgr new security issue CVE-2012-5643 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | |
| Severity: | normal | ||
| Priority: | Normal | CC: | davidwhodgins, oe, sysadmin-bugs, tmb |
| Version: | 2 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/530748/ | ||
| Whiteboard: | has_procedure MGA2-64-OK MGA2-32-OK | ||
| Source RPM: | squid-3.1.19-4.mga2.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2012-12-20 18:33:25 CET
David Walser
2012-12-20 18:33:30 CET
CC:
(none) =>
oe More info: http://cxsecurity.com/cveshow/CVE-2012-5643
David Walser
2012-12-27 00:31:10 CET
URL:
(none) =>
http://lwn.net/Vulnerabilities/530748/ No poc, that I can see, so just testing for regressions. The depcheck script doesn't show any new dependencies. Testing complete on Mageia 2 i586 and x86-64. Could someone from the sysadmin team push the srpm squid-3.1.19-4.1.mga2.src.rpm from Mageia 2 Core Updates Testing to Core Updates. Advisory: Updated squid packages fix security vulnerability: Due to missing input validation, the Squid cachemgr.cgi tool in Squid before 3.1.22 and 3.2.4 is vulnerable to a denial of service attack when processing specially crafted requests (CVE-2012-5643). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5643 http://www.squid-cache.org/Advisories/SQUID-2012_1.txt https://bugs.mageia.org/show_bug.cgi?id=8453 Keywords:
(none) =>
validated_update Update pushed: https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0368 Status:
NEW =>
RESOLVED Patch now checked into Mageia 1 SVN. |