[RHSA-2017:0183] squid34 security update
Severity
Moderate
Affected Packages
4
CVEs
1
The squid34 packages provide version 3.4 of Squid, a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
- It was found that squid did not properly remove connection specific headers when answering conditional requests using a cached request. A remote attacker could send a specially crafted request to an HTTP server via the squid proxy and steal private data from other connections. (CVE-2016-10002)
Package | Affected Version |
---|---|
pkg:rpm/redhat/squid34?arch=x86_64&distro=redhat-6.8 | < 3.4.14-9.el6_8.4 |
pkg:rpm/redhat/squid34?arch=s390x&distro=redhat-6.8 | < 3.4.14-9.el6_8.4 |
pkg:rpm/redhat/squid34?arch=ppc64&distro=redhat-6.8 | < 3.4.14-9.el6_8.4 |
pkg:rpm/redhat/squid34?arch=i686&distro=redhat-6.8 | < 3.4.14-9.el6_8.4 |
- ID
- RHSA-2017:0183
- Severity
- moderate
- URL
- https://access.redhat.com/errata/RHSA-2017:0183
- Published
-
2017-01-24T00:00:00
(7 years ago) - Modified
-
2017-01-24T00:00:00
(7 years ago) - Rights
- Copyright 2017 Red Hat, Inc.
- Other Advisories
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 1405941 | https://bugzilla.redhat.com/1405941 | |
RHSA | RHSA-2017:0183 | https://access.redhat.com/errata/RHSA-2017:0183 | |
CVE | CVE-2016-10002 | https://access.redhat.com/security/cve/CVE-2016-10002 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/squid34?arch=x86_64&distro=redhat-6.8 | redhat | squid34 | < 3.4.14-9.el6_8.4 | redhat-6.8 | x86_64 | |
Affected | pkg:rpm/redhat/squid34?arch=s390x&distro=redhat-6.8 | redhat | squid34 | < 3.4.14-9.el6_8.4 | redhat-6.8 | s390x | |
Affected | pkg:rpm/redhat/squid34?arch=ppc64&distro=redhat-6.8 | redhat | squid34 | < 3.4.14-9.el6_8.4 | redhat-6.8 | ppc64 | |
Affected | pkg:rpm/redhat/squid34?arch=i686&distro=redhat-6.8 | redhat | squid34 | < 3.4.14-9.el6_8.4 | redhat-6.8 | i686 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |