[FEDORA-2023-6317eaa767] Fedora 38: squid
Severity
High
Affected Packages
1
CVEs
6
- New version 6.6 - Important security fixes - Removed gopher support
Affected
Package | Affected Version |
---|---|
pkg:rpm/fedora/squid?distro=fedora-38 | < 6.6.1.fc38 |
- ID
- FEDORA-2023-6317eaa767
- Severity
- high
- Severity from
- CVE-2023-46724
- URL
- https://bodhi.fedoraproject.org/updates/FEDORA-2023-6317eaa767
- Published
-
2023-12-29T01:05:39
(13 months ago) - Modified
-
2023-12-29T01:05:39
(13 months ago) - Rights
- Copyright 2023 Red Hat, Inc.
- Other Advisories
-
- ALAS-2023-1885
- ALAS-2023-1886
- ALAS-2024-1901
- ALAS-2024-1916
- ALAS2-2023-2354
- ALAS2-2024-2381
- ALAS2-2024-2445
- ALAS2-2024-2500
- ALPINE:CVE-2023-46724
- ALPINE:CVE-2023-49285
- ALPINE:CVE-2023-49286
- ALPINE:CVE-2023-49288
- ALPINE:CVE-2023-50269
- ALSA-2024:0046
- ALSA-2024:0071
- ALSA-2024:1375
- ALSA-2024:1376
- CESA-2024:1787
- DSA-5637-1
- ELSA-2024-0046
- ELSA-2024-0071
- ELSA-2024-1375
- ELSA-2024-1376
- ELSA-2024-1787
- FEDORA-2023-ab77331a34
- RHSA-2024:0046
- RHSA-2024:0071
- RHSA-2024:0072
- RHSA-2024:0397
- RHSA-2024:0771
- RHSA-2024:0772
- RHSA-2024:0773
- RHSA-2024:1085
- RHSA-2024:1153
- RHSA-2024:1375
- RHSA-2024:1376
- RHSA-2024:1787
- SUSE-SU-2023:4380-1
- SUSE-SU-2023:4381-1
- SUSE-SU-2023:4384-1
- SUSE-SU-2023:4544-1
- SUSE-SU-2023:4545-1
- SUSE-SU-2023:4589-1
- SUSE-SU-2023:4698-1
- SUSE-SU-2023:4724-1
- SUSE-SU-2023:4825-1
- SUSE-SU-2024:0296-1
- SUSE-SU-2024:0298-1
- SUSE-SU-2024:0455-1
- USN-6500-1
- USN-6500-2
- USN-6594-1
- USN-6728-1
- USN-6728-3
- USN-6857-1
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 2252924 | Bug #2252924 - CVE-2023-49286 squid: Incorrect Check of Function Return Value In Helper Process management [fedora-all] | https://bugzilla.redhat.com/show_bug.cgi?id=2252924 |
Bugzilla | 2250229 | Bug #2250229 - TRIAGE CVE-2023-46728 squid: NULL pointer dereference in the gopher protocol code [fedora-all] | https://bugzilla.redhat.com/show_bug.cgi?id=2250229 |
Bugzilla | 2253417 | Bug #2253417 - squid-6.6 is available | https://bugzilla.redhat.com/show_bug.cgi?id=2253417 |
Bugzilla | 2254686 | Bug #2254686 - CVE-2023-50269 squid: denial of service in HTTP request parsing [fedora-all] | https://bugzilla.redhat.com/show_bug.cgi?id=2254686 |
Bugzilla | 2252919 | Bug #2252919 - CVE-2023-49288 squid: Use-After-Free in the HTTP Collapsed Forwarding Feature [fedora-all] | https://bugzilla.redhat.com/show_bug.cgi?id=2252919 |
Bugzilla | 2252927 | Bug #2252927 - CVE-2023-49285 squid: Buffer over-read in the HTTP Message processing feature [fedora-all] | https://bugzilla.redhat.com/show_bug.cgi?id=2252927 |
Bugzilla | 2250224 | Bug #2250224 - CVE-2023-46724 squid: Denial of Service in SSL Certificate validation [fedora-all] | https://bugzilla.redhat.com/show_bug.cgi?id=2250224 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/fedora/squid?distro=fedora-38 | fedora | squid | < 6.6.1.fc38 | fedora-38 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |