On 20:59, Amos Jeffries wrote:
This DNS failure is a DoS condition triggerable by internal clients.

The patch as supplied earlier makes Squid treat IPv6 addresses as IPv4
ones and leaves the hole open when the system is configured in
split-stack mode.

The correct upstream patch can be found at:

http://www.squid-cache.org/Versions/v3/3.1/changesets/squid-3.1-10072.patch

The patch you mentioned is already applied to the Debian package (see debian/patches/17-CVE-2010-2951.dpatch). So it doesn't fix the bug I reported.

This is a different bug, which happens in another code path and produces different error messages, although it seems to be triggered by the same conditions.

--
Etienne Dechamps / e-t172 - AKE Group
Phone: +33 6 23 42 24 82



--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to