MGASA-2014-0396

Source
https://advisories.mageia.org/MGASA-2014-0396.html
Import Source
https://advisories.mageia.org/MGASA-2014-0396.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2014-0396
Related
Published
2014-10-07T09:22:51Z
Modified
2014-10-07T09:00:07Z
Summary
Updated squid packages fix security vulnerabilities
Details

Updated squid packages fix security vulnerabilities:

Due to incorrect buffer management Squid can be caused by an attacker to write outside its allocated SNMP buffer (CVE-2014-6270).

Due to incorrect bounds checking Squid pinger binary is vulnerable to denial of service or information leak attack when processing larger than normal ICMP or ICMPv6 packets (CVE-2014-7141).

Due to incorrect input validation Squid pinger binary is vulnerable to denial of service or information leak attacks when processing ICMP or ICMPv6 packets (CVE-2014-7142).

References
Credits

Affected packages

Mageia:4 / squid

Package

Name
squid
Purl
pkg:rpm/mageia/squid?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.3.13-1.1.mga4

Ecosystem specific

{
    "section": "core"
}

Mageia:3 / squid

Package

Name
squid
Purl
pkg:rpm/mageia/squid?distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.2.10-1.8.mga3

Ecosystem specific

{
    "section": "core"
}