Linux Security
    Linux Security
    Linux Security

    Debian: New squid packages fix ACL bypass

    Posted By
    Updated package.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 721-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.                             Martin Schulze
    May 6th, 2005                 
    - --------------------------------------------------------------------------
    Package        : squid
    Vulnerability  : design flaw
    Problem-Type   : remote
    Debian-specific: no
    CVE ID         : CAN-2005-1345
    Debian Bug     : 307132
    Michael Bhola discovered a bug in Squid, the popular WWW proxy cache.
    Squid does not trigger a fatal error when it identifies missing or
    invalid ACLs in the http_access configuration, which could lead to
    less restrictive ACLs than intended by the administrator.
    For the stable distribution (woody) this problem has been fixed in
    version 2.4.6-2woody8.
    For the unstable distribution (sid) this problem has been fixed in
    version 2.5.9-7.
    We recommend that you upgrade your squid packages.
    Upgrade Instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 3.0 alias woody
    - --------------------------------
      Source archives:
          Size/MD5 checksum:      612 53feac84e4e4ecc33c49da72b19d03ce
          Size/MD5 checksum:   238447 fdca973b0098bec555c54d50fd4d825f
          Size/MD5 checksum:  1081920 59ce2c58da189626d77e27b9702ca228
      Alpha architecture:
          Size/MD5 checksum:   815672 71156933524c446b2056c2d43b83c255
          Size/MD5 checksum:    75684 01282867162d783c29e8c31048d1c7d1
          Size/MD5 checksum:    60434 9e1b6fc7dda0eab2461980ba3c601337
      ARM architecture:
          Size/MD5 checksum:   725990 be504dba20c3857d9257ca79db64f28b
          Size/MD5 checksum:    73444 3157fba853dcad244e53e045be3812b4
          Size/MD5 checksum:    58776 5d0a6e83a8fdb1b3f02d4d76bdb3e76c
      Intel IA-32 architecture:
          Size/MD5 checksum:   685178 636bc74eb7575c22b391a9d744085e52
          Size/MD5 checksum:    73190 a53ef2e81bbe8a908d837e456af60636
          Size/MD5 checksum:    58350 16d63016b39bdb71cc2569a860ff9300
      Intel IA-64 architecture:
          Size/MD5 checksum:   953944 e1f1fc3ca69d5a8a079e3514982fb16c
          Size/MD5 checksum:    79512 92baefa027ec7e313f2ff69eeadcd31a
          Size/MD5 checksum:    63100 c22baca32d79b783bd4df4f742353973
      HP Precision architecture:
          Size/MD5 checksum:   779586 d07eae05a882a32d3809a01ba1a07d3f
          Size/MD5 checksum:    74892 566815610e5e5d43f3807a12571ec277
          Size/MD5 checksum:    59920 03ae17bf5ad0c51c4bac6533d1b782f0
      Motorola 680x0 architecture:
          Size/MD5 checksum:   666818 cedebbb1487b2ff2dc6d2ee4096631c6
          Size/MD5 checksum:    72794 cee01a187d3afe5d0866cdc9c29bf1fa
          Size/MD5 checksum:    57998 b35f7217f592535478d89dec7c2372f8
      Big endian MIPS architecture:
          Size/MD5 checksum:   765442 f8d04a6d87db1afaabdc944b4b1ab4cb
          Size/MD5 checksum:    74428 5cdf921497904cfaf841270eacae6f74
          Size/MD5 checksum:    59076 6a4530a52e84ca6765bb4c18bc521d84
      Little endian MIPS architecture:
          Size/MD5 checksum:   765628 629ce4ef86a0e32e78107f0eca97afd7
          Size/MD5 checksum:    74492 c95fb63d8dc8295f422bb1b360ebd793
          Size/MD5 checksum:    59144 d3a40e25907c956669b97d8c6a43507e
      PowerPC architecture:
          Size/MD5 checksum:   722882 dd8a603159d5398f9565e9f70eeeced6
          Size/MD5 checksum:    73438 0f1ea718f0375f6fcde20840c2dc90fb
          Size/MD5 checksum:    58664 0deffdff3cacef7e3682aa082f855951
      IBM S/390 architecture:
          Size/MD5 checksum:   712120 3bc34ba3065fc68242034907e6241d31
          Size/MD5 checksum:    73780 58f9fecad5b06ce515a21586f1ac9b54
          Size/MD5 checksum:    59222 c176c8ca8e740324e57ac23a8bfbe180
      Sun Sparc architecture:
          Size/MD5 checksum:   724896 a89f49f6f8beba1b39c547f00cfc1131
          Size/MD5 checksum:    76054 066f1682352684e84ae84009a24ddbd7
          Size/MD5 checksum:    61096 37868ef3bd01101ab914ff39c1ab0766
      These files will probably be moved into the stable distribution on
      its next update.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.

    LinuxSecurity Poll

    Which statement best describes how you feel about the recent Linux 5.9 release?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    [{"id":"140","title":"Not a game-changer for me.","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"141","title":"I'm happy with the performance improvements it offers.","votes":"3","type":"x","order":"2","pct":100,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.