Mandrake Security Advisory MDVSA-2009:161-1 (squid)

Summary
The remote host is missing an update to squid announced via advisory MDVSA-2009:161-1.
Solution
To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:161-1 http://www.squid-cache.org/Advisories/SQUID-2009_2.txt
Insight
Multiple vulnerabilities has been found and corrected in squid: Due to incorrect buffer limits and related bound checks Squid is vulnerable to a denial of service attack when processing specially crafted requests or responses (CVE-2009-2621). Due to incorrect data validation Squid is vulnerable to a denial of service attack when processing specially crafted responses (CVE-2009-2622). This update provides fixes for these vulnerabilities. Update: Additional upstream security patches were applied: Debug warnings fills up the logs. Upstream Bug 2728: regression: assertion failed: http.cc:705: !eof Affected: 2008.1, 2009.0, 2009.1, Enterprise Server 5.0