Vulnerability Database
Blog
FAQ
Docs
arrow_forward
search
SUSE-SU-2024:1911-1
See a problem?
Please try reporting it
to the source
first.
Source
https://www.suse.com/support/update/announcement/2024/suse-su-20241911-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2024:1911-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/SUSE-SU-2024:1911-1
Upstream
CVE-2024-33427
Related
CVE-2024-33427
Published
2024-06-03T15:30:09Z
Modified
2025-05-08T17:33:31.770406Z
Summary
Security update for squid
Details
This update for squid fixes the following issues:
CVE-2024-33427: Fixed possible buffer overread that could have led to a denial-of-service (bsc#1225417).
References
https://www.suse.com/support/update/announcement/2024/suse-su-20241911-1/
https://bugzilla.suse.com/1225417
https://www.suse.com/security/cve/CVE-2024-33427
Affected packages
SUSE:Linux Enterprise Server 12 SP5
/
squid
Package
Name
squid
Purl
pkg:rpm/suse/squid&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
4.17-4.47.1
Ecosystem specific
{ "binaries": [ { "squid": "4.17-4.47.1" } ] }
SUSE:Linux Enterprise Server for SAP Applications 12 SP5
/
squid
Package
Name
squid
Purl
pkg:rpm/suse/squid&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
4.17-4.47.1
Ecosystem specific
{ "binaries": [ { "squid": "4.17-4.47.1" } ] }
SUSE-SU-2024:1911-1 - OSV