This bug was fixed in the package squid3 - 3.1.11-1ubuntu0.1 --------------- squid3 (3.1.11-1ubuntu0.1) natty-security; urgency=low
* SECURITY UPDATE: Fix DoS (memory corruption and daemon restart) or possibly have unspecified other impact via a long line in a response by remote Gopher servers. (LP: #907687) - debian/patches/CVE-2011-3205.dpatch: patch derived from upstream. - CVE-2011-3205 * SECURITY UPDATE: Fix DoS (daemon abort) via DNS reply containing a CNAME record that references another CNAME record that contains an empty A record. - debian/patches/CVE-2011-4096.dpatch - CVE-2011-4096 -- Mahyuddin Susanto <udi...@ubuntu.com> Thu, 22 Dec 2011 21:54:02 +0700 ** Changed in: squid3 (Ubuntu Maverick) Status: Invalid => Fix Released -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to squid3 in Ubuntu. https://bugs.launchpad.net/bugs/907687 Title: CVE-2010-0639: DoS (NULL pointer dereference and daemon crash) via crafted packets to the HTCP port To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/squid3/+bug/907687/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs