ELSA-2014-1148

ELSA-2014-1148 - squid security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2014-09-03

Description


[7:3.1.10-22]
- Resolves: #1134936 - CVE-2013-4115 buffer overflow when processing overly long DNS names

[7:3.1.10-21]
- Resolves: #1134936 - CVE-2014-3609 assertion failure in header processing


Related CVEs


CVE-2014-3609
CVE-2013-4115

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 5 (i386) squid-2.6.STABLE21-7.el5_10.src.rpmd8a798642a420ac4957afa14c0d9c9f04293aa9b07b44064075ebbb2c9f3eb18-ol5_i386_latest
squid-2.6.STABLE21-7.el5_10.src.rpmd8a798642a420ac4957afa14c0d9c9f04293aa9b07b44064075ebbb2c9f3eb18-ol5_u10_i386_patch
squid-2.6.STABLE21-7.el5_10.i386.rpmd00ab85157f6858e51e042da4be35d6300693b06f44670de1a8dc8b89221289d-ol5_i386_latest
squid-2.6.STABLE21-7.el5_10.i386.rpmd00ab85157f6858e51e042da4be35d6300693b06f44670de1a8dc8b89221289d-ol5_u10_i386_patch
Oracle Linux 5 (ia64) squid-2.6.STABLE21-7.el5_10.src.rpmd8a798642a420ac4957afa14c0d9c9f04293aa9b07b44064075ebbb2c9f3eb18-ol5_ia64_latest
squid-2.6.STABLE21-7.el5_10.src.rpmd8a798642a420ac4957afa14c0d9c9f04293aa9b07b44064075ebbb2c9f3eb18-ol5_u10_ia64_patch
squid-2.6.STABLE21-7.el5_10.ia64.rpmcef869744b377a02784c47a08094a0092af44575990beef8020f20356ded2d71-ol5_ia64_latest
squid-2.6.STABLE21-7.el5_10.ia64.rpmcef869744b377a02784c47a08094a0092af44575990beef8020f20356ded2d71-ol5_u10_ia64_patch
Oracle Linux 5 (x86_64) squid-2.6.STABLE21-7.el5_10.src.rpmd8a798642a420ac4957afa14c0d9c9f04293aa9b07b44064075ebbb2c9f3eb18-ol5_u10_x86_64_patch
squid-2.6.STABLE21-7.el5_10.src.rpmd8a798642a420ac4957afa14c0d9c9f04293aa9b07b44064075ebbb2c9f3eb18-ol5_x86_64_latest
squid-2.6.STABLE21-7.el5_10.x86_64.rpm519e8db369fd0e18b8a1965c0903202a7077d3a6973754f83ef421ab6ea45eb8-ol5_u10_x86_64_patch
squid-2.6.STABLE21-7.el5_10.x86_64.rpm519e8db369fd0e18b8a1965c0903202a7077d3a6973754f83ef421ab6ea45eb8-ol5_x86_64_latest
Oracle Linux 6 (i386) squid-3.1.10-22.el6_5.src.rpm85818d1c274c08510a46f762b0d359ff27245926442d2f6afd1c80b849b38f63ELSA-2023-6884ol6_i386_latest_archive
squid-3.1.10-22.el6_5.src.rpm85818d1c274c08510a46f762b0d359ff27245926442d2f6afd1c80b849b38f63ELSA-2023-6884ol6_u5_i386_patch
squid-3.1.10-22.el6_5.i686.rpm361c725ddcc38230dde0bb033cf5f8dc5d018ece8706f3e266106a46b3a52d7dELSA-2023-6884ol6_i386_latest_archive
squid-3.1.10-22.el6_5.i686.rpm361c725ddcc38230dde0bb033cf5f8dc5d018ece8706f3e266106a46b3a52d7dELSA-2023-6884ol6_u5_i386_patch
Oracle Linux 6 (x86_64) squid-3.1.10-22.el6_5.src.rpm85818d1c274c08510a46f762b0d359ff27245926442d2f6afd1c80b849b38f63ELSA-2023-6884ol6_u5_x86_64_patch
squid-3.1.10-22.el6_5.src.rpm85818d1c274c08510a46f762b0d359ff27245926442d2f6afd1c80b849b38f63ELSA-2023-6884ol6_x86_64_latest_archive
squid-3.1.10-22.el6_5.x86_64.rpmcb0f8701ae32d91c42f0e6f004359d9f2bdd9705d5b3b7617ba75aed517a305dELSA-2023-6884ol6_u5_x86_64_patch
squid-3.1.10-22.el6_5.x86_64.rpmcb0f8701ae32d91c42f0e6f004359d9f2bdd9705d5b3b7617ba75aed517a305dELSA-2023-6884ol6_x86_64_latest_archive



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete