[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

[SECURITY] Fedora 11 Update: squidGuard-1.4-8.fc11

Fedora Update Notification
2009-10-27 05:01:35

Name        : squidGuard
Product     : Fedora 11
Version     : 1.4
Release     : 8.fc11
URL         : http://www.squidguard.org/
Summary     : Filter, redirector and access controller plugin for squid
Description :
squidGuard can be used to
- limit the web access for some users to a list of accepted/well known
  web servers and/or URLs only.
- block access to some listed or blacklisted web servers and/or URLs
  for some users.
- block access to URLs matching a list of regular expressions or words
  for some users.
- enforce the use of domainnames/prohibit the use of IP address in
- redirect blocked URLs to an "intelligent" CGI based info page.
- redirect unregistered user to a registration form.
- redirect popular downloads like Netscape, MSIE etc. to local copies.
- redirect banners to an empty GIF.
- have different access rules based on time of day, day of the week,
  date etc.
- have different rules for different user groups.
- and much more..

Neither squidGuard nor Squid can be used to
- filter/censor/edit text inside documents
- filter/censor/edit embeded scripting languages like JavaScript or
  VBscript inside HTML

Update Information:

Fixes language file issue, but more importantly. . .    ---------------
squidGuard upstream has released patches fixing (quoting  from upstream
advisories):    a, This patch fixes one buffer overflow problem in sgLog.c when
overlong URLs  are requested. SquidGuard will then go into emergency mode were
no blocking  occurs. This is not required in this situation.    URL:
http://www.squidguard.org/Downloads/Patches/1.4/Readme.Patch-20091015  ----
b, This patch fixes two bypass problems with URLs which length is close to the
limit defined by MAX_BUF (default: 4096) in squidGuard and MAX_URL (default:
4096 in squid 2.x and 8192 in squid 3.x) in squid. For this kind of URLs the
proxy request exceeds MAX_BUF causing squidGuard to complain about not being
able to parse the squid request.    URL:
http://www.squidguard.org/Downloads/Patches/1.4/Readme.Patch-20091019  ----
References:  -----------  http://secunia.com/advisories/37107/
security-vulnerabilities-11997445/    Upstream patches - squidGuard 1.4:
Upstream advisories:  --------------------

* Mon Oct 26 2009 Jon Ciesla <limb jcomserv net> - 1.4-8
- Applying upstream patches for CVE-2009-3700, BZ 530862.
* Thu Sep 24 2009 Jon Ciesla <limb jcomserv net> - 1.4-7
- Make squidGuard.cgi config(noreplace)
- Relocated logs, updated logrotate file.
- Updated blacklist URL.
* Wed Sep  9 2009 Jon Ciesla <limb jcomserv net> - 1.4-6
- Include babel files, BZ 522038.
* Sun Jul 26 2009 Fedora Release Engineering <rel-eng lists fedoraproject org> - 1.4-5
- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild

  [ 1 ] Bug #530862 - CVE-2009-3700 squidGuard: buffer overflow in sgLog.c and two URL filter bypass issues

This update can be installed with the "yum" update program.  Use 
su -c 'yum update squidGuard' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at

[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]