Report forwarded
to bug-guix@gnu.org: bug#47142; Package guix.
(Sun, 14 Mar 2021 21:37:02 GMT) (full text, mbox, link).
Acknowledgement sent
to Mark H Weaver <mhw@netris.org>:
New bug report received and forwarded. Copy sent to bug-guix@gnu.org.
(Sun, 14 Mar 2021 21:37:02 GMT) (full text, mbox, link).
I'm forwarding this to bug-guix@gnu.org so that it won't be forgotten.
Mark
-------------------- Start of forwarded message --------------------
Subject: squid package vulnerable to CVE-2021-28116
From: Léo Le Bouter <lle-bout@zaclys.net>
To: guix-devel@gnu.org
Date: Wed, 10 Mar 2021 01:22:51 +0100
CVE-2021-28116 09.03.21 23:15
Squid through 4.14 and 5.x through 5.0.5, in some configurations,
allows information disclosure because of an out-of-bounds read in WCCP
protocol data. This can be leveraged as part of a chain for remote code
execution as nobody.
Upstream did not release a patch yet. CVE entry to be monitored for a
fix.
https://www.zerodayinitiative.com/advisories/ZDI-21-157/ - says it is a
low impact issue.
-------------------- End of forwarded message --------------------
Added tag(s) security.
Request was from Ludovic Courtès <ludo@gnu.org>
to control@debbugs.gnu.org.
(Mon, 15 Mar 2021 13:44:02 GMT) (full text, mbox, link).
Added indication that bug 47142 blocks47297
Request was from Leo Famulari <leo@famulari.name>
to control@debbugs.gnu.org.
(Wed, 24 Mar 2021 04:07:02 GMT) (full text, mbox, link).
Information forwarded
to bug-guix@gnu.org: bug#47142; Package guix.
(Mon, 05 Apr 2021 20:43:02 GMT) (full text, mbox, link).
Removed indication that bug 47142 blocks
Request was from Leo Famulari <leo@famulari.name>
to control@debbugs.gnu.org.
(Sat, 10 Apr 2021 18:48:02 GMT) (full text, mbox, link).
Reply sent
to Maxim Cournoyer <maxim.cournoyer@gmail.com>:
You have taken responsibility.
(Wed, 23 Mar 2022 03:07:03 GMT) (full text, mbox, link).
Notification sent
to Mark H Weaver <mhw@netris.org>:
bug acknowledged by developer.
(Wed, 23 Mar 2022 03:07:03 GMT) (full text, mbox, link).
Cc: Léo Le Bouter <lle-bout@zaclys.net>,
47142-done@debbugs.gnu.org
Subject: Re: bug#47142: squid package vulnerable to CVE-2021-28116
Date: Tue, 22 Mar 2022 23:05:54 -0400
Hello,
Mark H Weaver <mhw@netris.org> writes:
> I'm forwarding this to bug-guix@gnu.org so that it won't be forgotten.
>
> Mark
>
> -------------------- Start of forwarded message --------------------
> Subject: squid package vulnerable to CVE-2021-28116
> From: Léo Le Bouter <lle-bout@zaclys.net>
> To: guix-devel@gnu.org
> Date: Wed, 10 Mar 2021 01:22:51 +0100
>
> CVE-2021-28116 09.03.21 23:15
> Squid through 4.14 and 5.x through 5.0.5, in some configurations,
We're now using squid 4.17.
Closing.
Thanks,
Maxim
bug archived.
Request was from Debbugs Internal Request <help-debbugs@gnu.org>
to internal_control@debbugs.gnu.org.
(Wed, 20 Apr 2022 11:24:10 GMT) (full text, mbox, link).
Debbugs is free software and licensed under the terms of the
GNU Public License version 2. The current version can be
obtained from https://bugs.debian.org/debbugs-source/.