* SECURITY UPDATE: Fix DoS (assertion failure) via a crafted DNS packet
that only contains header. (LP: #907686)
- debian/patches/CVE-2010-0308.dpatch: patch derived from upstream.
- CVE-2010-0308
* SECURITY UDPATE: Fix DoS (NULL pointer dereference and daemon crash) via
crafted packets to the HTCP port. (LP: #907690)
- debian/patches/CVE-2010-0639.dpatch: patch derived from upstream.
- CVE-2010-0639
* SECURITY UPDATE: Fix DoS (memory corruption and daemon restart) or possibly
have unspecified other impact via a long line in a response by remote
Gopher servers. (LP: #907687)
- debian/patches/CVE-2011-3205.dpatch: patch derived from upstream.
- CVE-2011-3205
-- Mahyuddin Susanto <email address hidden> Wed, 18 Jan 2012 12:46:59 +0700
This bug was fixed in the package squid3 - 3.0.STABLE19- 1ubuntu0. 2
--------------- 1ubuntu0. 2) lucid-security; urgency=low
squid3 (3.0.STABLE19-
* SECURITY UPDATE: Fix DoS (assertion failure) via a crafted DNS packet patches/ CVE-2010- 0308.dpatch: patch derived from upstream. patches/ CVE-2010- 0639.dpatch: patch derived from upstream. patches/ CVE-2011- 3205.dpatch: patch derived from upstream.
that only contains header. (LP: #907686)
- debian/
- CVE-2010-0308
* SECURITY UDPATE: Fix DoS (NULL pointer dereference and daemon crash) via
crafted packets to the HTCP port. (LP: #907690)
- debian/
- CVE-2010-0639
* SECURITY UPDATE: Fix DoS (memory corruption and daemon restart) or possibly
have unspecified other impact via a long line in a response by remote
Gopher servers. (LP: #907687)
- debian/
- CVE-2011-3205
-- Mahyuddin Susanto <email address hidden> Wed, 18 Jan 2012 12:46:59 +0700