[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 1596-1] squid3 security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : squid3
Version        : 3.4.8-6+deb8u6
CVE ID         : CVE-2018-19132
Debian Bug     : 912294


It was discovered that there can be a denial of service (DoS)
vulnerability in squid3 due to a memory leak in SNMP query rejection
code when SNMP is enabled. In environments where per-process memory
restrictions are not enforced strictly, a remote attacker to consume
all memory available to the Squid process, causing it to crash.

For Debian 8 "Jessie", this problem has been fixed in version
3.4.8-6+deb8u6.

We recommend that you upgrade your squid3 packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEE7xPqJqaY/zX9fJAuhj1N8u2cKO8FAlv790EACgkQhj1N8u2c
KO8TXQ//dkZ36jejuyYoavc/F+IpQbhPwpwaqspfH/bGbajHqGQX9GCH3kucm9OE
c646tpp0kilzUD0W6AbyuDbRLB7w5HIraYX8MzjH/8DZn1IRzaYs8KL06G6bcXSH
GrsvuTGL3lRDR/mHriDJG8Dsx1o0UShDTnUrSgay7J+RTEaUFaEenwzVx4ih7rBr
JUvXJ3H+hQmpknOaJ37ONpyELBohpBrReI7Fsu4lwMrSlXvY0QP0EuMcO4NbaRvC
mhT3WFzItOd35LpOFwoXrk8VfDb5nGh556uP2m4rICndb5InNlPL98VFKwt7xlQE
/FxP5mdFIR5l5qbTSFw9aNRlovwLAxzJSJo4Ynh5J/cNKCj6oBRGpUGQgDqxNCAh
M03ROyF2Zz5pLo+BGGBIfJOBgtS3LRItB/1CONepeCMamHpGUcPbUaBKxGysJoLU
ZO/rld0Aq1hPRDzEaV0uMAASdRxnJKmrPWPyRsXJkrWO3twD4ZltB4Zudtdzycek
8Nr9bqvkCLWHxHQtXwmJQKHud4Y3wVQoUO6SUHp6H8dLxsNgBjQK/i2bv6qSTxYL
OyW7v+Xp6d50mPA2a/31UjgQZiU1awk/65dxEelTU6r2uxIUzsb07flWFh92F/MK
U1yS6gg7O6Scoa7tfpPTItiGGoobg9dI/G9vj4jEsD+cPd5kMDs=
=oH5j
-----END PGP SIGNATURE-----


Reply to: