|
|
Log in / Subscribe / Register

Scientific Linux alert SLSA-2014:1148-1 (squid)

From:  Pat Riehecky <riehecky@fnal.gov>
To:  <scientific-linux-errata@listserv.fnal.gov>
Subject:  Security ERRATA Important: squid on SL5.x, SL6.x i386/x86_64
Date:  Thu, 4 Sep 2014 14:42:22 +0000
Message-ID:  <20140904144222.306.61895@slpackages.fnal.gov>

Synopsis: Important: squid security update Advisory ID: SLSA-2014:1148-1 Issue Date: 2014-09-03 CVE Numbers: CVE-2013-4115 CVE-2014-3609 -- A flaw was found in the way Squid handled malformed HTTP Range headers. A remote attacker able to send HTTP requests to the Squid proxy could use this flaw to crash Squid. (CVE-2014-3609) A buffer overflow flaw was found in Squid's DNS lookup module. A remote attacker able to send HTTP requests to the Squid proxy could use this flaw to crash Squid. (CVE-2013-4115) After installing this update, the squid service will be restarted automatically. -- SL5 x86_64 squid-2.6.STABLE21-7.el5_10.x86_64.rpm squid-debuginfo-2.6.STABLE21-7.el5_10.x86_64.rpm i386 squid-2.6.STABLE21-7.el5_10.i386.rpm squid-debuginfo-2.6.STABLE21-7.el5_10.i386.rpm SL6 x86_64 squid-3.1.10-22.el6_5.x86_64.rpm squid-debuginfo-3.1.10-22.el6_5.x86_64.rpm i386 squid-3.1.10-22.el6_5.i686.rpm squid-debuginfo-3.1.10-22.el6_5.i686.rpm - Scientific Linux Development Team


to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds