Date: Wed, 24 Feb 2016 11:46:09 +0000 (UTC) From: Jason Unovitch <junovitch@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r409460 - head/security/vuxml Message-ID: <201602241146.u1OBk9ss093039@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: junovitch Date: Wed Feb 24 11:46:09 2016 New Revision: 409460 URL: https://svnweb.freebsd.org/changeset/ports/409460 Log: Document squid remote DoS in HTTP response processing PR: 207454 Reported by: Pavel Timofeev <timp87@gmail.com> Security: https://vuxml.FreeBSD.org/freebsd/660ebbf5-daeb-11e5-b2bd-002590263bf5.html Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Wed Feb 24 11:00:43 2016 (r409459) +++ head/security/vuxml/vuln.xml Wed Feb 24 11:46:09 2016 (r409460) @@ -58,6 +58,38 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="660ebbf5-daeb-11e5-b2bd-002590263bf5"> + <topic>squid -- remote DoS in HTTP response processing</topic> + <affects> + <package> + <name>squid</name> + <range><lt>3.5.15</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Amos Jeffries reports:</p> + <blockquote cite="http://www.openwall.com/lists/oss-security/2016/02/24/12"> + <p>The proxy contains a String object class with 64KB content limits. + Some code paths do not bounds check before appending to these + String and overflow leads to an assertion which terminates all + client transactions using the proxy, including those unrelated to + the limit being exceeded.</p> + <p>Error handling for malformed HTTP responses can lead to a second + assertion with the same effects as the first issue.</p> + </blockquote> + </body> + </description> + <references> + <freebsdpr>ports/207454</freebsdpr> + <url>http://www.openwall.com/lists/oss-security/2016/02/24/12</url> + </references> + <dates> + <discovery>2016-02-24</discovery> + <entry>2016-02-24</entry> + </dates> + </vuln> + <vuln vid="9e5bbffc-d8ac-11e5-b2bd-002590263bf5"> <topic>bsh -- remote code execution vulnerability</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201602241146.u1OBk9ss093039>