Date: Sat, 7 May 2016 11:56:27 +0000 (UTC) From: Matthew Seaman <matthew@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r414774 - head/security/vuxml Message-ID: <201605071156.u47BuR6v084963@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: matthew Date: Sat May 7 11:56:27 2016 New Revision: 414774 URL: https://svnweb.freebsd.org/changeset/ports/414774 Log: Document three security advisories for the squid and squid-devel ports. CVE numbers are not yet available. PR: 209334 Submitted by: timp87@gmail.com (maintainer) Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Sat May 7 11:27:49 2016 (r414773) +++ head/security/vuxml/vuln.xml Sat May 7 11:56:27 2016 (r414774) @@ -58,6 +58,82 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="25e5205b-1447-11e6-9ead-6805ca0b3d42"> + <topic>squid -- multiple vulnerabilities</topic> + <affects> + <package> + <name>squid</name> + <range><ge>3.0.0</ge><lt>3.5.18</lt></range> + </package> + <package> + <name>squid-devel</name> + <range><ge>4.0.0</ge><lt>4.0.10</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The squid development team reports:</p> + <blockquote cite="http://www.squid-cache.org/Advisories/SQUID-2016_7.txt"> + <dl> + <dt>Problem Description:</dt> + <dd>Due to incorrect data validation of intercepted HTTP + Request messages Squid is vulnerable to clients bypassing + the protection against CVE-2009-0801 related issues. This + leads to cache poisoning.</dd> + <dt>Severity:</dt> + <dd>This problem is serious because it allows any client, + including browser scripts, to bypass local security and + poison the proxy cache and any downstream caches with + content from an arbitrary source.</dd> + </dl> + </blockquote> + <blockquote cite="http://www.squid-cache.org/Advisories/SQUID-2016_8.txt"> + <dl> + <dt>Problem Description:</dt> + <dd>Due to incorrect input validation Squid is vulnerable + to a header smuggling attack leading to cache poisoning + and to bypass of same-origin security policy in Squid and + some client browsers.</dd> + <dt>Severity:</dt> + <dd>This problem allows a client to smuggle Host header + value past same-origin security protections to cause Squid + operating as interception or reverse-proxy to contact the + wrong origin server. Also poisoning any downstream cache + which stores the response.</dd> + <dd>However, the cache poisoning is only possible if the + caching agent (browser or explicit/forward proxy) is not + following RFC 7230 processing guidelines and lets the + smuggled value through.</dd> + </dl> + </blockquote> + <blockquote cite="http://www.squid-cache.org/Advisories/SQUID-2016_9.txt"> + <dl> + <dt>Problem Description:</dt> + <dd>Due to incorrect pointer handling and reference + counting Squid is vulnerable to a denial of service attack + when processing ESI responses.</dd> + <dt>Severity:</dt> + <dd>These problems allow a remote server delivering + certain ESI response syntax to trigger a denial of service + for all clients accessing the Squid service.</dd> + <dd>Due to unrelated changes Squid-3.5 has become + vulnerable to some regular ESI server responses also + triggering one or more of these issues.</dd> + </dl> + </blockquote> + </body> + </description> + <references> + <url>http://www.squid-cache.org/Advisories/SQUID-2016_7.txt</url> + <url>http://www.squid-cache.org/Advisories/SQUID-2016_8.txt</url> + <url>http://www.squid-cache.org/Advisories/SQUID-2016_9.txt</url> + </references> + <dates> + <discovery>2016-05-06</discovery> + <entry>2016-05-07</entry> + </dates> + </vuln> + <vuln vid="0d724b05-687f-4527-9c03-af34d3b094ec"> <topic>ImageMagick -- multiple vulnerabilities</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201605071156.u47BuR6v084963>