|Category:||Red Hat Local Security Checks|
|Title:||RedHat Update for squid RHSA-2015:2378-01|
|Summary:||The remote host is missing an update for the 'squid'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'squid'
package(s) announced via the referenced advisory.
Squid is a high-performance proxy caching
server for web clients, supporting FTP, Gopher, and HTTP data objects.
It was found that Squid configured with client-first SSL-bump did not
correctly validate X.509 server certificate host name fields. A
man-in-the-middle attacker could use this flaw to spoof a Squid server
using a specially crafted X.509 certificate. (CVE-2015-3455)
This update fixes the following bugs:
* Previously, the squid process did not handle file descriptors correctly
when receiving Simple Network Management Protocol (SNMP) requests. As a
consequence, the process gradually accumulated open file descriptors. This
bug has been fixed and squid now handles SNMP requests correctly, closing
file descriptors when necessary. (BZ#1198778)
* Under high system load, the squid process sometimes terminated
unexpectedly with a segmentation fault during reboot. This update provides
better memory handling during reboot, thus fixing this bug. (BZ#1225640)
Users of squid are advised to upgrade to these updated packages, which fix
these bugs. After installing this update, the squid service will be
squid on Red Hat Enterprise Linux Server (v. 7)
Please Install the Updated Packages.
Common Vulnerability Exposure (CVE) ID: CVE-2015-3455|
BugTraq ID: 74438
RedHat Security Advisories: RHSA-2015:2378
SuSE Security Announcement: openSUSE-SU-2015:1546 (Google Search)
SuSE Security Announcement: openSUSE-SU-2016:2081 (Google Search)
|Copyright||Copyright (C) 2015 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.