[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DSA 3139-1] squid security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3139-1                   security@debian.org
http://www.debian.org/security/                        Sebastien Delafond
January 25, 2015                       http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : squid
CVE ID         : CVE-2014-3609
Debian Bug     : 776194

Matthew Daley discovered that squid, a web proxy cache, does not
properly perform input validation when parsing requests. A remote
attacker could use this flaw to mount a denial of service attack, by
sending specially crafted Range requests.

For the stable distribution (wheezy), this problem has been fixed in
version 2.7.STABLE9-4.1+deb7u1.

We recommend that you upgrade your squid packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQEcBAEBCAAGBQJUxRveAAoJEBC+iYPz1Z1kw1QIALUg7hslEvXpHrTTdSTD1CQF
wVvi9gDL0jb+bDnM+4kjxvztF+AUudonNYy45P0LezKEEOLJ4kVVSy1yg/mjCgra
K8TQcIeGt3go2vV/zQ3dqCB+l2uLCuKeBU9QMw70BSdcfKq9s2IoqH/DE3rjj53D
x6xdk68I6/bvFG3yfuUUO3HPZt4Co6KVF/UPqmtZNBA8qKDCzbWZHJIwxXHteoFK
CXPCQjCVRz50G9jhZvpiiGXjd/xASC2cxs+9+j7towv4B53JcL7n02cruS3g6QAM
E7XkLhUMgXfIbvX3L657H60h6wCKWRqS4y9aWbbtYVRZU/zefnBTySKLWXBZ8J0=
=fC2O
-----END PGP SIGNATURE-----


Reply to: