SCIENTIFIC-LINUX-ERRATA Archives

September 2011

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Pat Riehecky <[log in to unmask]>
Reply To:
Pat Riehecky <[log in to unmask]>
Date:
Wed, 14 Sep 2011 15:08:53 -0500
Content-Type:
text/plain
Parts/Attachments:
text/plain (28 lines)
Synopsis:    Moderate: squid security update
Issue Date:  2011-09-14
CVE Numbers: CVE-2011-3205


Squid is a high-performance proxy caching server for web clients,
supporting FTP, Gopher, and HTTP data objects.

A buffer overflow flaw was found in the way Squid parsed replies from
remote Gopher servers. A remote user allowed to send Gopher requests to a
Squid proxy could possibly use this flaw to cause the squid child process
to crash or execute arbitrary code with the privileges of the squid user,
by making Squid perform a request to an attacker-controlled Gopher server.

Users of squid should upgrade to this updated package, which contains a
backported patch to correct this issue. After installing this update, the
squid service will be restarted automatically.

SL6:
   i386
      squid-3.1.10-1.el6_1.1.i686.rpm
      squid-debuginfo-3.1.10-1.el6_1.1.i686.rpm
   x86_64
      squid-3.1.10-1.el6_1.1.x86_64.rpm
      squid-debuginfo-3.1.10-1.el6_1.1.x86_64.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2