MGASA-2016-0423

Source
https://advisories.mageia.org/MGASA-2016-0423.html
Import Source
https://advisories.mageia.org/MGASA-2016-0423.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2016-0423
Related
Published
2016-12-22T21:41:01Z
Modified
2016-12-22T21:32:57Z
Summary
Updated squid packages fix security vulnerabilities
Details

Incorrect processing of responses to If-None-Modified HTTP conditional requests leads to client-specific Cookie data being leaked to other clients. Attack requests can easily be crafted by a client to probe a cache for this information (CVE-2016-10002).

Incorrect HTTP Request header comparison results in Collapsed Forwarding feature mistakenly identifying some private responses as being suitable for delivery to multiple clients (CVE-2016-10003).

References
Credits

Affected packages

Mageia:5 / squid

Package

Name
squid
Purl
pkg:rpm/mageia/squid?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.5.23-1.mga5

Ecosystem specific

{
    "section": "core"
}