Security update for squid
Announcement ID: | SUSE-SU-2022:2359-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves one vulnerability can now be installed.
Description:
This update for squid fixes the following issues:
-
CVE-2021-46784: Fixed DoS when processing gopher server responses. (bsc#1200907)
-
Update to 5.6:
- Improve handling of Gopher responses
-
Changes in 5.5:
- fixes regression Bug 5192: esi_parser default is incorrect
- Bug 5177: clientca certificates sent to https_port clients
- Bug 5090: Must(!request->pinnedConnection()) violation
- Kid restart leads to persistent queue overflows, delays/timeouts
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
openSUSE Leap 15.4
zypper in -t patch openSUSE-SLE-15.4-2022-2359=1
-
Server Applications Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP4-2022-2359=1
Package List:
-
openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
- squid-debuginfo-5.6-150400.3.3.1
- squid-debugsource-5.6-150400.3.3.1
- squid-5.6-150400.3.3.1
-
Server Applications Module 15-SP4 (aarch64 ppc64le s390x x86_64)
- squid-debuginfo-5.6-150400.3.3.1
- squid-debugsource-5.6-150400.3.3.1
- squid-5.6-150400.3.3.1