[ALAS2-2024-2609] Amazon Linux 2 2017.12 - ALAS2-2024-2609: medium priority package update for squid
Severity
Medium
Affected Packages
12
CVEs
1
Package updates are available for Amazon Linux 2 that fix the following vulnerabilities:
CVE-2024-37894:
Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to an Out-of-bounds Write error when assigning ESI variables, Squid is susceptible to a Memory Corruption error. This error can lead to a Denial of Service attack.
- ID
- ALAS2-2024-2609
- Severity
- medium
- URL
- https://alas.aws.amazon.com/AL2/ALAS-2024-2609.html
- Published
-
2024-08-01T03:01:00
(6 weeks ago) - Modified
-
2024-08-01T03:01:00
(6 weeks ago) - Rights
- Amazon Linux Security Team
- Other Advisories
Source | # ID | Name | URL |
---|---|---|---|
CVE | CVE-2024-37894 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37894 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/amazonlinux/squid?arch=x86_64&distro=amazonlinux-2 | amazonlinux | squid | < 3.5.20-17.amzn2.7.21 | amazonlinux-2 | x86_64 | |
Affected | pkg:rpm/amazonlinux/squid?arch=i686&distro=amazonlinux-2 | amazonlinux | squid | < 3.5.20-17.amzn2.7.21 | amazonlinux-2 | i686 | |
Affected | pkg:rpm/amazonlinux/squid?arch=aarch64&distro=amazonlinux-2 | amazonlinux | squid | < 3.5.20-17.amzn2.7.21 | amazonlinux-2 | aarch64 | |
Affected | pkg:rpm/amazonlinux/squid-sysvinit?arch=x86_64&distro=amazonlinux-2 | amazonlinux | squid-sysvinit | < 3.5.20-17.amzn2.7.21 | amazonlinux-2 | x86_64 | |
Affected | pkg:rpm/amazonlinux/squid-sysvinit?arch=i686&distro=amazonlinux-2 | amazonlinux | squid-sysvinit | < 3.5.20-17.amzn2.7.21 | amazonlinux-2 | i686 | |
Affected | pkg:rpm/amazonlinux/squid-sysvinit?arch=aarch64&distro=amazonlinux-2 | amazonlinux | squid-sysvinit | < 3.5.20-17.amzn2.7.21 | amazonlinux-2 | aarch64 | |
Affected | pkg:rpm/amazonlinux/squid-migration-script?arch=x86_64&distro=amazonlinux-2 | amazonlinux | squid-migration-script | < 3.5.20-17.amzn2.7.21 | amazonlinux-2 | x86_64 | |
Affected | pkg:rpm/amazonlinux/squid-migration-script?arch=i686&distro=amazonlinux-2 | amazonlinux | squid-migration-script | < 3.5.20-17.amzn2.7.21 | amazonlinux-2 | i686 | |
Affected | pkg:rpm/amazonlinux/squid-migration-script?arch=aarch64&distro=amazonlinux-2 | amazonlinux | squid-migration-script | < 3.5.20-17.amzn2.7.21 | amazonlinux-2 | aarch64 | |
Affected | pkg:rpm/amazonlinux/squid-debuginfo?arch=x86_64&distro=amazonlinux-2 | amazonlinux | squid-debuginfo | < 3.5.20-17.amzn2.7.21 | amazonlinux-2 | x86_64 | |
Affected | pkg:rpm/amazonlinux/squid-debuginfo?arch=i686&distro=amazonlinux-2 | amazonlinux | squid-debuginfo | < 3.5.20-17.amzn2.7.21 | amazonlinux-2 | i686 | |
Affected | pkg:rpm/amazonlinux/squid-debuginfo?arch=aarch64&distro=amazonlinux-2 | amazonlinux | squid-debuginfo | < 3.5.20-17.amzn2.7.21 | amazonlinux-2 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |