Advisories ยป MGASA-2013-0228

Updated squid packages fix security vulnerabilities

Publication date: 21 Jul 2013
Modification date: 21 Jul 2013
Type: security
Affected Mageia releases : 3
CVE: CVE-2013-4115 , CVE-2013-4123

Description

Due to incorrect data validation Squid is vulnerable to a buffer overflow
attack when processing specially crafted HTTP requests. This problem allows
any trusted client or client script who can generate HTTP requests to trigger
a buffer overflow in Squid, resulting in a termination of the Squid service
(CVE-2013-4115).

Due to incorrect data validation Squid is vulnerable to a denial of service
attack when processing specially crafted HTTP requests. This problem allows
any client who can generate HTTP requests to perform a denial of service
attack on the Squid service (CVE-2013-4123).

Also, due to being renamed in Squid 3.2, the Squid external acl helpers for
matching against IP addresses and LDAP groups were not selected to be built
in the squid package for Mageia 3.

This has been corrected and these helpers are now included.  Additionally,
the helpers for eDirectory IP address lookups and matching LDAP groups using
Kerberos credentials have also been included.
                

References

SRPMS

3/core