[prev in list] [next in list] [prev in thread] [next in thread] 

List:       suse-security-announce
Subject:    [security-announce] openSUSE-SU-2011:1018-1: important: VUL-0: CVE-2011-3205: squid: buffer overflow
From:       opensuse-security () opensuse ! org
Date:       2011-09-07 15:08:13
Message-ID: 20110907150813.B1FEA32192 () maintenance ! suse ! de
[Download RAW message or body]

   openSUSE Security Update: VUL-0: CVE-2011-3205: squid: buffer overflow in Gopher reply parser
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2011:1018-1
Rating:             important
References:         #715171 
Cross-References:   CVE-2011-3205
Affected Products:
                    openSUSE 11.4
                    openSUSE 11.3
______________________________________________________________________________

   An update that fixes one vulnerability is now available.

Description:

   This update of squid3 fixes a buffer overflow vulnerability
   in the Gopher reply parser code (CVE-2011-3205).


Patch Instructions:

   To install this openSUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - openSUSE 11.4:

      zypper in -t patch squid3-5094

   - openSUSE 11.3:

      zypper in -t patch squid3-5094

   To bring your system up-to-date, use "zypper patch".


Package List:

   - openSUSE 11.4 (i586 x86_64):

      squid3-3.1.11-4.7.1

   - openSUSE 11.3 (i586 x86_64):

      squid3-3.0.STABLE25-2.3.1


References:

   http://support.novell.com/security/cve/CVE-2011-3205.html
   https://bugzilla.novell.com/715171

-- 
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic