ELSA-2011-1293

ELSA-2011-1293 - squid security update

Type:SECURITY
Impact:MODERATE
Release Date:2011-09-14

Description



[7:3.1.10-1.el6_1.1]
- Resolves: #735447 - CVE-2011-3205 squid: buffer overflow flaw in Squid's Gopher reply parser


Related CVEs


CVE-2011-3205

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 6 (i386) squid-3.1.10-1.el6_1.1.src.rpm72ebb410117d6463e0c9e2ce01ea874a9d80ae2b22a4f240d33d2680893cd5a0ELSA-2023-6884ol6_i386_latest_archive
squid-3.1.10-1.el6_1.1.src.rpm72ebb410117d6463e0c9e2ce01ea874a9d80ae2b22a4f240d33d2680893cd5a0ELSA-2023-6884ol6_u1_i386_patch
squid-3.1.10-1.el6_1.1.src.rpm72ebb410117d6463e0c9e2ce01ea874a9d80ae2b22a4f240d33d2680893cd5a0ELSA-2023-6884ol6_u2_i386_base
squid-3.1.10-1.el6_1.1.i686.rpmefcc69b7aaa7992a7bc931160c73f5db823cf67526af43dadc9c2cae2e08d689ELSA-2023-6884ol6_i386_latest_archive
squid-3.1.10-1.el6_1.1.i686.rpmefcc69b7aaa7992a7bc931160c73f5db823cf67526af43dadc9c2cae2e08d689ELSA-2023-6884ol6_u1_i386_patch
squid-3.1.10-1.el6_1.1.i686.rpmefcc69b7aaa7992a7bc931160c73f5db823cf67526af43dadc9c2cae2e08d689ELSA-2023-6884ol6_u2_i386_base
Oracle Linux 6 (x86_64) squid-3.1.10-1.el6_1.1.src.rpm72ebb410117d6463e0c9e2ce01ea874a9d80ae2b22a4f240d33d2680893cd5a0ELSA-2023-6884ol6_u1_x86_64_patch
squid-3.1.10-1.el6_1.1.src.rpm72ebb410117d6463e0c9e2ce01ea874a9d80ae2b22a4f240d33d2680893cd5a0ELSA-2023-6884ol6_u2_x86_64_base
squid-3.1.10-1.el6_1.1.src.rpm72ebb410117d6463e0c9e2ce01ea874a9d80ae2b22a4f240d33d2680893cd5a0ELSA-2023-6884ol6_x86_64_latest_archive
squid-3.1.10-1.el6_1.1.x86_64.rpmf7a74b26d70bdcc23b5d1febe1200a8ccd82064bc2c889589416449e9dae1e64ELSA-2023-6884ol6_u1_x86_64_patch
squid-3.1.10-1.el6_1.1.x86_64.rpmf7a74b26d70bdcc23b5d1febe1200a8ccd82064bc2c889589416449e9dae1e64ELSA-2023-6884ol6_u2_x86_64_base
squid-3.1.10-1.el6_1.1.x86_64.rpmf7a74b26d70bdcc23b5d1febe1200a8ccd82064bc2c889589416449e9dae1e64ELSA-2023-6884ol6_x86_64_latest_archive



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete