Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
openSUSE:Leap:15.5:Update
patchinfo.31525
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.31525
<patchinfo incident="31525"> <issue tracker="bnc" id="1217274">VUL-0: squid, squid3: One-Byte Buffer OverRead in HTTP Request Header Parsing</issue> <issue tracker="bnc" id="1216926">VUL-0: CVE-2023-46728: squid: Due to a NULL pointer dereference bug Squid is vulnerable to a Denial of Service attack against Squid's Gopher gateway.</issue> <issue tracker="cve" id="2023-46728"/> <packager>adamm</packager> <rating>important</rating> <category>security</category> <summary>Security update for squid</summary> <description>This update for squid fixes the following issues: - CVE-2023-46728: Remove gopher support (bsc#1216926). - Fixed overread in HTTP request header parsing (bsc#1217274). </description> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor