Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 30 Aug 2011 15:44:24 -0400 (EDT)
From: Josh Bressers <bressers@...hat.com>
To: oss-security@...ts.openwall.com
Cc: coley <coley@...re.org>
Subject: Re: CVE-request(?): squid: buffer overflow in Gopher
 reply parser

This needs a 2011 CVE id.

Use CVE-2011-3205.

Thanks.

-- 
    JB


----- Original Message -----
> Hi,
> 
> squid 3.x seems to have re-introduced a security issue found by Ben
> Hawkes of
> the Google Security Team in 2005,
> 
> 2011: http://www.squid-cache.org/Advisories/SQUID-2011_3.txt
> 2005: http://www.squid-cache.org/Advisories/SQUID-2005_1.txt
> (CVE-2005-0094)
> 
> Will there be a new CVE required? Not quite sure how such "special"
> cases are
> handled usually.
> 
> Thanks,
> Matthias
> 
> --
> Matthias Weckbecker, Junior Software Engineer, SUSE Security Team
> SUSE LINUX Products GmbH, Maxfeldstr. 5, D-90409 Nuernberg, Germany
> Tel: +49-911-74053-0; http://suse.com/
> SUSE LINUX Products GmbH, GF: Jeff Hawn, HRB 16746 (AG Nuernberg)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.