| Summary: | squid new security issue: incomplete fix for CVE-2012-5643 (CVE-2013-0189) | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | Oden Eriksson <oe> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | |
| Severity: | major | ||
| Priority: | Normal | CC: | luigiwalser, sysadmin-bugs, tmb |
| Version: | 2 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/535428/ | ||
| Whiteboard: | has_procedure mga2-64-OK mga2-32-ok | ||
| Source RPM: | squid-3.1.19-4.1.mga2.src.rpm | CVE: | |
| Status comment: | |||
|
Description
Oden Eriksson
2013-01-23 17:08:14 CET
fixed in r391672 (mga2, updates_testing, squid-3.1.19-4.2.mga2) squid-3.2.6 in cauldron is unaffected. Ubuntu has issued an advisory on January 30: http://www.ubuntu.com/usn/usn-1713-1/ Advisory: ======================== Updated squid packages fix security vulnerability: It was discovered that the patch for CVE-2012-5643 was incorrect. A remote attacker could exploit this flaw to perform a denial of service attack (CVE-2013-0189). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0189 http://www.ubuntu.com/usn/usn-1713-1/ ======================== Updated packages in core/updates_testing: ======================== squid-3.1.19-4.2.mga2 squid-cachemgr-3.1.19-4.2.mga2 from squid-3.1.19-4.2.mga2.src.rpm URL:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0189 =>
http://lwn.net/Vulnerabilities/535428/
David Walser
2013-01-31 21:25:07 CET
Summary:
CVE-2013-0189: squid - incomplete fix for CVE-2012-5643 =>
squid new security issue: incomplete fix for CVE-2012-5643 (CVE-2013-0189) No PoC so just testing it works. Testing mga2 64 Testing complete mga2 64 Whiteboard:
has_procedure =>
has_procedure mga2-64-OK Testing complete mga2 32 Validating Advisory & SRPM in comment 3 Can sysadmin please push from core/updates_testing to core/updates Thanks! Keywords:
(none) =>
validated_update Forgot to mention, patch checked into Mageia 1 SVN. Update pushed: https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0029 Status:
NEW =>
RESOLVED |