Security update for squid3
Announcement ID: | SUSE-SU-2016:2089-1 |
---|---|
Rating: | important |
References: | |
Cross-References: |
|
CVSS scores: |
|
Affected Products: |
|
An update that solves 25 vulnerabilities can now be installed.
Description:
This update for squid3 fixes the following issues:
-
Multiple issues in pinger ICMP processing. (CVE-2014-7141, CVE-2014-7142)
-
CVE-2016-3947: Buffer overrun issue in pinger ICMPv6 processing. (bsc#973782)
-
CVE-2016-4554: fix header smuggling issue in HTTP Request processing (bsc#979010)
-
Fix multiple Denial of Service issues in HTTP Response processing. (CVE-2016-2569, CVE-2016-2570, CVE-2016-2571, CVE-2016-2572, bsc#968392, bsc#968393, bsc#968394, bsc#968395)
-
Regression caused by the DoS fixes above (bsc#993299)
-
CVE-2016-3948: Fix denial of service in HTTP Response processing (bsc#973783)
-
CVE-2016-4051: fixes buffer overflow in cachemgr.cgi (bsc#976553)
-
CVE-2016-4052, CVE-2016-4053, CVE-2016-4054:
-
fixes multiple issues in ESI processing (bsc#976556)
-
CVE-2016-4556: fixes double free vulnerability in Esi.cc (bsc#979008)
-
CVE-2015-5400: Improper Protection of Alternate Path (bsc#938715)
-
CVE-2014-6270: fix off-by-one in snmp subsystem (bsc#895773)
-
Memory leak in squid3 when using external_acl (bsc#976708)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Server 11 SP4
zypper in -t patch slessp4-squid3-12701=1
-
SLES for SAP Applications 11-SP4
zypper in -t patch slessp4-squid3-12701=1
Package List:
-
SUSE Linux Enterprise Server 11 SP4 (s390x x86_64 i586 ppc64 ia64)
- squid3-3.1.23-8.16.30.1
-
SLES for SAP Applications 11-SP4 (ppc64 x86_64)
- squid3-3.1.23-8.16.30.1
References:
- https://www.suse.com/security/cve/CVE-2011-3205.html
- https://www.suse.com/security/cve/CVE-2011-4096.html
- https://www.suse.com/security/cve/CVE-2012-5643.html
- https://www.suse.com/security/cve/CVE-2013-0188.html
- https://www.suse.com/security/cve/CVE-2013-4115.html
- https://www.suse.com/security/cve/CVE-2014-0128.html
- https://www.suse.com/security/cve/CVE-2014-6270.html
- https://www.suse.com/security/cve/CVE-2014-7141.html
- https://www.suse.com/security/cve/CVE-2014-7142.html
- https://www.suse.com/security/cve/CVE-2015-5400.html
- https://www.suse.com/security/cve/CVE-2016-2390.html
- https://www.suse.com/security/cve/CVE-2016-2569.html
- https://www.suse.com/security/cve/CVE-2016-2570.html
- https://www.suse.com/security/cve/CVE-2016-2571.html
- https://www.suse.com/security/cve/CVE-2016-2572.html
- https://www.suse.com/security/cve/CVE-2016-3947.html
- https://www.suse.com/security/cve/CVE-2016-3948.html
- https://www.suse.com/security/cve/CVE-2016-4051.html
- https://www.suse.com/security/cve/CVE-2016-4052.html
- https://www.suse.com/security/cve/CVE-2016-4053.html
- https://www.suse.com/security/cve/CVE-2016-4054.html
- https://www.suse.com/security/cve/CVE-2016-4553.html
- https://www.suse.com/security/cve/CVE-2016-4554.html
- https://www.suse.com/security/cve/CVE-2016-4555.html
- https://www.suse.com/security/cve/CVE-2016-4556.html
- https://bugzilla.suse.com/show_bug.cgi?id=895773
- https://bugzilla.suse.com/show_bug.cgi?id=902197
- https://bugzilla.suse.com/show_bug.cgi?id=938715
- https://bugzilla.suse.com/show_bug.cgi?id=963539
- https://bugzilla.suse.com/show_bug.cgi?id=967011
- https://bugzilla.suse.com/show_bug.cgi?id=968392
- https://bugzilla.suse.com/show_bug.cgi?id=968393
- https://bugzilla.suse.com/show_bug.cgi?id=968394
- https://bugzilla.suse.com/show_bug.cgi?id=968395
- https://bugzilla.suse.com/show_bug.cgi?id=973782
- https://bugzilla.suse.com/show_bug.cgi?id=973783
- https://bugzilla.suse.com/show_bug.cgi?id=976553
- https://bugzilla.suse.com/show_bug.cgi?id=976556
- https://bugzilla.suse.com/show_bug.cgi?id=976708
- https://bugzilla.suse.com/show_bug.cgi?id=979008
- https://bugzilla.suse.com/show_bug.cgi?id=979009
- https://bugzilla.suse.com/show_bug.cgi?id=979010
- https://bugzilla.suse.com/show_bug.cgi?id=979011
- https://bugzilla.suse.com/show_bug.cgi?id=993299