Jump to content
Compatible Support Forums
Sign in to follow this  
news

[security-announce] SUSE-SU-2016:2089-1: important: Security update for squid3

Recommended Posts

SUSE Security Update: Security update for squid3

______________________________________________________________________________

 

Announcement ID: SUSE-SU-2016:2089-1

Rating: important

References: #895773 #902197 #938715 #963539 #967011 #968392

#968393 #968394 #968395 #973782 #973783 #976553

#976556 #976708 #979008 #979009 #979010 #979011

#993299

Cross-References: CVE-2011-3205 CVE-2011-4096 CVE-2012-5643

CVE-2013-0188 CVE-2013-4115 CVE-2014-0128

CVE-2014-6270 CVE-2014-7141 CVE-2014-7142

CVE-2015-5400 CVE-2016-2390 CVE-2016-2569

CVE-2016-2570 CVE-2016-2571 CVE-2016-2572

CVE-2016-3947 CVE-2016-3948 CVE-2016-4051

CVE-2016-4052 CVE-2016-4053 CVE-2016-4054

CVE-2016-4553 CVE-2016-4554 CVE-2016-4555

CVE-2016-4556

Affected Products:

SUSE Linux Enterprise Server 11-SP4

SUSE Linux Enterprise Debuginfo 11-SP4

______________________________________________________________________________

 

An update that fixes 25 vulnerabilities is now available.

 

Description:

 

 

 

This update for squid3 fixes the following issues:

 

- Multiple issues in pinger ICMP processing. (CVE-2014-7141,

CVE-2014-7142)

 

- CVE-2016-3947: Buffer overrun issue in pinger ICMPv6 processing.

(bsc#973782)

 

- CVE-2016-4554: fix header smuggling issue in HTTP Request processing

(bsc#979010)

 

- Fix multiple Denial of Service issues in HTTP Response processing.

(CVE-2016-2569, CVE-2016-2570, CVE-2016-2571, CVE-2016-2572, bsc#968392,

bsc#968393, bsc#968394, bsc#968395)

- Regression caused by the DoS fixes above (bsc#993299)

 

- CVE-2016-3948: Fix denial of service in HTTP Response processing

(bsc#973783)

 

- CVE-2016-4051: fixes buffer overflow in cachemgr.cgi (bsc#976553)

 

- CVE-2016-4052, CVE-2016-4053, CVE-2016-4054:

* fixes multiple issues in ESI processing (bsc#976556)

 

- CVE-2016-4556: fixes double free vulnerability in Esi.cc (bsc#979008)

 

- CVE-2015-5400: Improper Protection of Alternate Path (bsc#938715)

 

- CVE-2014-6270: fix off-by-one in snmp subsystem (bsc#895773)

 

- Memory leak in squid3 when using external_acl (bsc#976708)

 

 

Patch Instructions:

 

To install this SUSE Security Update use YaST online_update.

Alternatively you can run the command listed for your product:

 

- SUSE Linux Enterprise Server 11-SP4:

 

zypper in -t patch slessp4-squid3-12701=1

 

- SUSE Linux Enterprise Debuginfo 11-SP4:

 

zypper in -t patch dbgsp4-squid3-12701=1

 

To bring your system up-to-date, use "zypper patch".

 

 

Package List:

 

- SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):

 

squid3-3.1.23-8.16.30.1

 

- SUSE Linux Enterprise Debuginfo 11-SP4 (x86_64):

 

squid3-debuginfo-3.1.23-8.16.30.1

 

 

References:

 

https://www.suse.com/security/cve/CVE-2011-3205.html

https://www.suse.com/security/cve/CVE-2011-4096.html

https://www.suse.com/security/cve/CVE-2012-5643.html

https://www.suse.com/security/cve/CVE-2013-0188.html

https://www.suse.com/security/cve/CVE-2013-4115.html

https://www.suse.com/security/cve/CVE-2014-0128.html

https://www.suse.com/security/cve/CVE-2014-6270.html

https://www.suse.com/security/cve/CVE-2014-7141.html

https://www.suse.com/security/cve/CVE-2014-7142.html

https://www.suse.com/security/cve/CVE-2015-5400.html

https://www.suse.com/security/cve/CVE-2016-2390.html

https://www.suse.com/security/cve/CVE-2016-2569.html

https://www.suse.com/security/cve/CVE-2016-2570.html

https://www.suse.com/security/cve/CVE-2016-2571.html

https://www.suse.com/security/cve/CVE-2016-2572.html

https://www.suse.com/security/cve/CVE-2016-3947.html

https://www.suse.com/security/cve/CVE-2016-3948.html

https://www.suse.com/security/cve/CVE-2016-4051.html

https://www.suse.com/security/cve/CVE-2016-4052.html

https://www.suse.com/security/cve/CVE-2016-4053.html

https://www.suse.com/security/cve/CVE-2016-4054.html

https://www.suse.com/security/cve/CVE-2016-4553.html

https://www.suse.com/security/cve/CVE-2016-4554.html

https://www.suse.com/security/cve/CVE-2016-4555.html

https://www.suse.com/security/cve/CVE-2016-4556.html

https://bugzilla.suse.com/895773

https://bugzilla.suse.com/902197

https://bugzilla.suse.com/938715

https://bugzilla.suse.com/963539

https://bugzilla.suse.com/967011

https://bugzilla.suse.com/968392

https://bugzilla.suse.com/968393

https://bugzilla.suse.com/968394

https://bugzilla.suse.com/968395

https://bugzilla.suse.com/973782

https://bugzilla.suse.com/973783

https://bugzilla.suse.com/976553

https://bugzilla.suse.com/976556

https://bugzilla.suse.com/976708

https://bugzilla.suse.com/979008

https://bugzilla.suse.com/979009

https://bugzilla.suse.com/979010

https://bugzilla.suse.com/979011

https://bugzilla.suse.com/993299

 

--

To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org

For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org

 

 

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×