[ALAS2-2023-1907] Amazon Linux 2 2017.12 - ALAS2-2023-1907: important priority package update for squid
Severity
Important
Affected Packages
12
CVEs
2
Package updates are available for Amazon Linux 2 that fix the following vulnerabilities:
CVE-2022-41318:
A flaw was found in Squid. An incorrect integer overflow protection in the Squid SSPI and SMB authentication helpers is vulnerable to a buffer overflow attack, resulting in information disclosure or a denial of service.
CVE-2021-46784:
In Squid 3.x through 3.5.28, 4.x through 4.17, and 5.x before 5.6, due to improper buffer management, a Denial of Service can occur when processing long Gopher server responses.
- ID
- ALAS2-2023-1907
- Severity
- important
- URL
- https://alas.aws.amazon.com/AL2/ALAS-2023-1907.html
- Published
-
2023-01-18T00:16:00
(20 months ago) - Modified
-
2023-01-20T23:30:00
(20 months ago) - Rights
- Amazon Linux Security Team
- Other Advisories
-
- ALAS-2023-1677
- ALPINE:CVE-2022-41318
- ALSA-2022:5526
- ALSA-2022:5527
- ALSA-2022:6775
- ALSA-2022:6839
- DSA-5171-1
- DSA-5258-1
- ELSA-2022-5526
- ELSA-2022-5527
- ELSA-2022-5542
- ELSA-2022-6775
- ELSA-2022-6815
- ELSA-2022-6839
- ELSA-2023-16656
- FEDORA-2022-0fa51087e7
- FEDORA-2022-102c59d287
- FEDORA-2022-23e6ee1fb9
- FEDORA-2022-c8cad41c95
- FEDORA-2022-d22a045d7a
- RHSA-2022:5526
- RHSA-2022:5527
- RHSA-2022:5542
- RHSA-2022:6775
- RHSA-2022:6815
- RHSA-2022:6839
- RLSA-2022:5526
- RLSA-2022:6775
- SUSE-SU-2022:2359-1
- SUSE-SU-2022:2367-1
- SUSE-SU-2022:2392-1
- SUSE-SU-2022:2553-1
- SUSE-SU-2022:3531-1
- SUSE-SU-2022:3532-1
- SUSE-SU-2022:3533-1
- SUSE-SU-2022:3596-1
- USN-5491-1
- USN-5641-1
- USN-6857-1
Source | # ID | Name | URL |
---|---|---|---|
CVE | CVE-2021-46784 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46784 | |
CVE | CVE-2022-41318 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41318 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/amazonlinux/squid?arch=x86_64&distro=amazonlinux-2 | amazonlinux | squid | < 3.5.20-17.amzn2.7.1 | amazonlinux-2 | x86_64 | |
Affected | pkg:rpm/amazonlinux/squid?arch=i686&distro=amazonlinux-2 | amazonlinux | squid | < 3.5.20-17.amzn2.7.1 | amazonlinux-2 | i686 | |
Affected | pkg:rpm/amazonlinux/squid?arch=aarch64&distro=amazonlinux-2 | amazonlinux | squid | < 3.5.20-17.amzn2.7.1 | amazonlinux-2 | aarch64 | |
Affected | pkg:rpm/amazonlinux/squid-sysvinit?arch=x86_64&distro=amazonlinux-2 | amazonlinux | squid-sysvinit | < 3.5.20-17.amzn2.7.1 | amazonlinux-2 | x86_64 | |
Affected | pkg:rpm/amazonlinux/squid-sysvinit?arch=i686&distro=amazonlinux-2 | amazonlinux | squid-sysvinit | < 3.5.20-17.amzn2.7.1 | amazonlinux-2 | i686 | |
Affected | pkg:rpm/amazonlinux/squid-sysvinit?arch=aarch64&distro=amazonlinux-2 | amazonlinux | squid-sysvinit | < 3.5.20-17.amzn2.7.1 | amazonlinux-2 | aarch64 | |
Affected | pkg:rpm/amazonlinux/squid-migration-script?arch=x86_64&distro=amazonlinux-2 | amazonlinux | squid-migration-script | < 3.5.20-17.amzn2.7.1 | amazonlinux-2 | x86_64 | |
Affected | pkg:rpm/amazonlinux/squid-migration-script?arch=i686&distro=amazonlinux-2 | amazonlinux | squid-migration-script | < 3.5.20-17.amzn2.7.1 | amazonlinux-2 | i686 | |
Affected | pkg:rpm/amazonlinux/squid-migration-script?arch=aarch64&distro=amazonlinux-2 | amazonlinux | squid-migration-script | < 3.5.20-17.amzn2.7.1 | amazonlinux-2 | aarch64 | |
Affected | pkg:rpm/amazonlinux/squid-debuginfo?arch=x86_64&distro=amazonlinux-2 | amazonlinux | squid-debuginfo | < 3.5.20-17.amzn2.7.1 | amazonlinux-2 | x86_64 | |
Affected | pkg:rpm/amazonlinux/squid-debuginfo?arch=i686&distro=amazonlinux-2 | amazonlinux | squid-debuginfo | < 3.5.20-17.amzn2.7.1 | amazonlinux-2 | i686 | |
Affected | pkg:rpm/amazonlinux/squid-debuginfo?arch=aarch64&distro=amazonlinux-2 | amazonlinux | squid-debuginfo | < 3.5.20-17.amzn2.7.1 | amazonlinux-2 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |