it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Salvatore Bonaccorso <carnil AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 4122-1] squid3 security update
- Date: Thu, 22 Feb 2018 23:45:07 +0000
- List-archive: https://lists.debian.org/msgid-search/E1ep0Xz-0005ri-K9 AT seger.debian.org
- List-id: <debian-security-announce.lists.debian.org>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-return-path: <carnil AT seger.debian.org>
- Priority: urgent
- Resent-date: Thu, 22 Feb 2018 23:45:25 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <6FpCUNp3gtL.A.EzH.VY1jaB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4122-1 security AT debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
February 23, 2018 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : squid3
CVE ID : CVE-2018-1000024 CVE-2018-1000027
Debian Bug : 888719 888720
Several vulnerabilities have been discovered in Squid3, a fully featured
web proxy cache. The Common Vulnerabilities and Exposures project
identifies the following issues:
CVE-2018-1000024
Louis Dion-Marcil discovered that Squid does not properly handle
processing of certain ESI responses. A remote server delivering
certain ESI response syntax can take advantage of this flaw to cause
a denial of service for all clients accessing the Squid service.
This problem is limited to the Squid custom ESI parser.
http://www.squid-cache.org/Advisories/SQUID-2018_1.txt
CVE-2018-1000027
Louis Dion-Marcil discovered that Squid is prone to a denial of
service vulnerability when processing ESI responses or downloading
intermediate CA certificates. A remote attacker can take advantage
of this flaw to cause a denial of service for all clients accessing
the Squid service.
http://www.squid-cache.org/Advisories/SQUID-2018_2.txt
For the oldstable distribution (jessie), these problems have been fixed
in version 3.4.8-6+deb8u5.
For the stable distribution (stretch), these problems have been fixed in
version 3.5.23-5+deb9u1.
We recommend that you upgrade your squid3 packages.
For the detailed security status of squid3 please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/squid3
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----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=mMK9
-----END PGP SIGNATURE-----
- [IT-SecNots] [SECURITY] [DSA 4122-1] squid3 security update, Salvatore Bonaccorso, 23.02.2018
Archiv bereitgestellt durch MHonArc 2.6.19.