Search 211766 CVE descriptions
and 97459 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:SuSE Local Security Checks
Title:SUSE: Security Advisory (SUSE-SU-2021:1838-1)
Summary:The remote host is missing an update for the 'squid' package(s) announced via the SUSE-SU-2021:1838-1 advisory.
The remote host is missing an update for the 'squid' package(s) announced via the SUSE-SU-2021:1838-1 advisory.

Vulnerability Insight:
This update for squid fixes the following issues:

update to 4.15:

CVE-2021-28652: Broken cache manager URL parsing (bsc#1185918)

CVE-2021-28651: Memory leak in RFC 2169 response parsing (bsc#1185921)

CVE-2021-28662: Limit HeaderLookupTable_t::lookup() to BadHdr and
specific IDs (bsc#1185919)

CVE-2021-31806: Handle more Range requests (bsc#1185916)

CVE-2020-25097: HTTP Request Smuggling vulnerability (bsc#1183436)

Handle more partial responses (bsc#1185923)

fix previous change to reinstante permissions macros, because the wrong
path has been used (bsc#1171569).

use libexecdir instead of libdir to conform to recent changes in Factory

Reinstate permissions macros for pinger binary, because the permissions
package is also responsible for setting up the cap_net_raw capability,
currently a fresh squid install doesn't get a capability bit at all

Change pinger and basic_pam_auth helper to use standard permissions.
pinger uses cap_net_raw=ep instead (bsc#1171569)

Affected Software/OS:
'squid' package(s) on SUSE Linux Enterprise Server 12-SP5

Please install the updated package(s).

CVSS Score:

CVSS Vector:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2020-25097
Common Vulnerability Exposure (CVE) ID: CVE-2021-28651
Common Vulnerability Exposure (CVE) ID: CVE-2021-28652
Common Vulnerability Exposure (CVE) ID: CVE-2021-28662
Common Vulnerability Exposure (CVE) ID: CVE-2021-31806
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2021 E-Soft Inc. All rights reserved.