Advisories
Mandriva Advisories
|
![]() |
Problem Description |
A bug was found in the way that Squid handles DNS replies. If the
port Squid uses for DNS requests is not protected by a firewall, it is
possible for a remote attacker to spoof DNS replies, possibly
redirecting a user to spoofed or malicious content.
Updated Packages |
Mandrakelinux 10.1
efa0ff6a4392d73c07f9dbc8c3b66438 10.1/RPMS/squid-2.5.STABLE9-1.2.101mdk.x86_64.rpm 794a1ae90ec7094bdccdefefdfcb2d61 10.1/SRPMS/squid-2.5.STABLE9-1.2.101mdk.src.rpm
Mandrakelinux 10.1/X86_64
efa0ff6a4392d73c07f9dbc8c3b66438 x86_64/10.1/RPMS/squid-2.5.STABLE9-1.2.101mdk.x86_64.rpm 794a1ae90ec7094bdccdefefdfcb2d61 x86_64/10.1/SRPMS/squid-2.5.STABLE9-1.2.101mdk.src.rpm
Corporate Server 2.1
e0ed76fed0fec9bf6e70bf38c3b8fed0 corporate/2.1/RPMS/squid-2.4.STABLE7-2.7.C21mdk.i586.rpm fb62666cca753d0dee0fff76286c537b corporate/2.1/SRPMS/squid-2.4.STABLE7-2.7.C21mdk.src.rpm
Corporate Server 2.1/X86_64
19347f85c069b33d30fb569674dc8580 x86_64/corporate/2.1/RPMS/squid-2.4.STABLE7-2.7.C21mdk.x86_64.rpm fb62666cca753d0dee0fff76286c537b x86_64/corporate/2.1/SRPMS/squid-2.4.STABLE7-2.7.C21mdk.src.rpm
Corporate Server 3.0
bba66d7a12eeece71d20a0f1a98bcebd corporate/3.0/RPMS/squid-2.5.STABLE9-1.2.C30mdk.i586.rpm 7e1685cce7144065a952e2ee7905265b corporate/3.0/SRPMS/squid-2.5.STABLE9-1.2.C30mdk.src.rpm
Corporate Server 3.0/X86_64
494442194cc6259050d7ab80076bc6e3 x86_64/corporate/3.0/RPMS/squid-2.5.STABLE9-1.2.C30mdk.x86_64.rpm 7e1685cce7144065a952e2ee7905265b x86_64/corporate/3.0/SRPMS/squid-2.5.STABLE9-1.2.C30mdk.src.rpm
Multi Network Firewall 2.0
8b9ff5995bfac07c5e44dd8205092c0e mnf/2.0/RPMS/squid-2.5.STABLE9-1.2.M20mdk.i586.rpm b384530077516bd4fac4c0b90cef2cd8 mnf/2.0/SRPMS/squid-2.5.STABLE9-1.2.M20mdk.src.rpm
Mandriva Linux LE2005
73a8aa85012fef6a9c4f366c26bb1337 10.2/RPMS/squid-2.5.STABLE9-1.2.102mdk.i586.rpm ad7f452e1a09d1f8d1a6aa2345e25084 10.2/SRPMS/squid-2.5.STABLE9-1.2.102mdk.src.rpm
Mandriva Linux LE2005/X86_64
eb149b54fcb1dca0c62c7dc255d6185d x86_64/10.2/RPMS/squid-2.5.STABLE9-1.2.102mdk.x86_64.rpm ad7f452e1a09d1f8d1a6aa2345e25084 x86_64/10.2/SRPMS/squid-2.5.STABLE9-1.2.102mdk.src.rpm
References |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1519
Upgrade |
To upgrade automatically, use MandrivaUpdate.
Verification |
Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :
rpm --checksig package.rpm
You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.
If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.