[ALAS-2023-1754] Amazon Linux AMI 2014.03 - ALAS-2023-1754: important priority package update for squid
Severity
Important
Affected Packages
6
CVEs
1
Package updates are available for Amazon Linux AMI that fix the following vulnerabilities:
CVE-2020-14058:
An issue was discovered in Squid before 4.12 and 5.x before 5.0.3. Due to use of a potentially dangerous function, Squid and the default certificate validation helper are vulnerable to a Denial of Service when opening a TLS connection to an attacker-controlled server for HTTPS. This occurs because unrecognized error values are mapped to NULL, but later code expects that each error value is mapped to a valid error string.
Package | Affected Version |
---|---|
pkg:rpm/amazonlinux/squid?arch=x86_64&distro=amazonlinux-1 | < 3.5.20-17.45.amzn1 |
pkg:rpm/amazonlinux/squid?arch=i686&distro=amazonlinux-1 | < 3.5.20-17.45.amzn1 |
pkg:rpm/amazonlinux/squid-migration-script?arch=x86_64&distro=amazonlinux-1 | < 3.5.20-17.45.amzn1 |
pkg:rpm/amazonlinux/squid-migration-script?arch=i686&distro=amazonlinux-1 | < 3.5.20-17.45.amzn1 |
pkg:rpm/amazonlinux/squid-debuginfo?arch=x86_64&distro=amazonlinux-1 | < 3.5.20-17.45.amzn1 |
pkg:rpm/amazonlinux/squid-debuginfo?arch=i686&distro=amazonlinux-1 | < 3.5.20-17.45.amzn1 |
- ID
- ALAS-2023-1754
- Severity
- important
- URL
- https://alas.aws.amazon.com/ALAS-2023-1754.html
- Published
-
2023-05-25T17:41:00
(16 months ago) - Modified
-
2023-06-06T18:36:00
(15 months ago) - Rights
- Amazon Linux Security Team
- Other Advisories
Source | # ID | Name | URL |
---|---|---|---|
CVE | CVE-2020-14058 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14058 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/amazonlinux/squid?arch=x86_64&distro=amazonlinux-1 | amazonlinux | squid | < 3.5.20-17.45.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/squid?arch=i686&distro=amazonlinux-1 | amazonlinux | squid | < 3.5.20-17.45.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/squid-migration-script?arch=x86_64&distro=amazonlinux-1 | amazonlinux | squid-migration-script | < 3.5.20-17.45.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/squid-migration-script?arch=i686&distro=amazonlinux-1 | amazonlinux | squid-migration-script | < 3.5.20-17.45.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/squid-debuginfo?arch=x86_64&distro=amazonlinux-1 | amazonlinux | squid-debuginfo | < 3.5.20-17.45.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/squid-debuginfo?arch=i686&distro=amazonlinux-1 | amazonlinux | squid-debuginfo | < 3.5.20-17.45.amzn1 | amazonlinux-1 | i686 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |