Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in libecap
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in libecap
ID: FEDORA-2016-7b40eb9e29
Distribution: Fedora
Plattformen: Fedora 22
Datum: Sa, 7. Mai 2016, 09:28
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5400
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3455
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2572
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2571
Applikationen: libecap

Originalnachricht

Name        : libecap
Product : Fedora 22
Version : 1.0.0
Release : 1.fc22
URL : http://www.e-cap.org/
Summary : Squid interface for embedded adaptation modules
Description :
eCAP is a software interface that allows a network application, such as an
HTTP proxy or an ICAP server, to outsource content analysis and adaptation to
a loadable module. For each applicable protocol message being processed, an
eCAP-enabled host application supplies the message details to the adaptation
module and gets back an adapted message, a "not interested" response,
or a
"block this message now!" instruction. These exchanges often include
message
bodies.

The adaptation module can also exchange meta-information with the host
application to supply additional details such as configuration options, a
reason behind the decision to ignore a message, or a detected virus name.

If you are familiar with the ICAP protocol (RFC 3507), then you may think of
eCAP as an "embedded ICAP", where network interactions with an ICAP
server are
replaced with function calls to an adaptation module.

-------------------------------------------------------------------------------
-
Update Information:

Security fix for CVE-2016-2571, CVE-2016-2572 ---- squid-3.4.13-3.fc22 -
Resolves: #1231992 ---- Security fix for #1240741, #1240744 Updated to
version 3.4.13, which fixes CVE-2015-3455
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1240741 - CVE-2015-5400 squid: information disclosure due to
incorrect handling of peer responses in tunnel.cc (SQUID-2015:2)
https://bugzilla.redhat.com/show_bug.cgi?id=1240741
[ 2 ] Bug #1218118 - CVE-2015-3455 squid: incorrect X509 server certificate
validation (SQUID-2015:1)
https://bugzilla.redhat.com/show_bug.cgi?id=1218118
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update libecap' at the command line.
For more information, refer to "Managing Software with yum",
available at https://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung