Mailinglist Archive: opensuse-updates (72 mails)

< Previous Next >
openSUSE-SU-2010:0460-1 (moderate (10+4+6)): squidGuard: Fixed buffer overflows
  • From: opensuse-security@xxxxxxxxxxxx
  • Date: Mon, 2 Aug 2010 18:08:20 +0200 (CEST)
  • Message-id: <20100802160820.282DABE29@xxxxxxxxxxxxxx>
openSUSE Security Update: squidGuard: Fixed buffer overflows

Announcement ID: openSUSE-SU-2010:0460-1
Rating: moderate (10+4+6)
References: #550930 #625439
Cross-References: CVE-2009-3700 CVE-2009-3826
Affected Products:
openSUSE 11.3
openSUSE 11.2
openSUSE 11.1

An update that fixes two vulnerabilities is now available.


Two buffer overflows in squidGard were fixed:

CVE-2009-3700: Buffer overflow in sgLog.c in squidGuard 1.3
and 1.4 allows remote attackers to cause a denial of
service (application hang or loss of blocking
functionality) via a long URL with many / (slash)
characters, related to "emergency mode."

CVE-2009-3826: Multiple buffer overflows in squidGuard 1.4
allow remote attackers to bypass intended URL blocking via
a long URL, related to (1) the relationship between a
certain buffer size in squidGuard and a certain buffer size
in Squid and (2) a redirect URL that contains information
about the originally requested URL.

Also a logrotate mistake was fixed.

Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 11.3:

zypper in -t patch squidGuard-2852

- openSUSE 11.2:

zypper in -t patch squidGuard-2852

- openSUSE 11.1:

zypper in -t patch squidGuard-2852

To bring your system up-to-date, use "zypper patch".

Package List:

- openSUSE 11.3 (i586 src x86_64):


- openSUSE 11.3 (i586 x86_64):


- openSUSE 11.2 (i586 src x86_64):


- openSUSE 11.2 (i586 x86_64):


- openSUSE 11.1 (i586 ppc src x86_64):



< Previous Next >
This Thread
  • No further messages