[RHSA-2024:1787] squid security update
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
squid: denial of service in HTTP header parser (CVE-2024-25617)
squid: denial of service in HTTP request parsing (CVE-2023-50269)
squid: Buffer over-read in the HTTP Message processing feature (CVE-2023-49285)
squid: Incorrect Check of Function Return Value In Helper Process management (CVE-2023-49286)
squid: NULL pointer dereference in the gopher protocol code (CVE-2023-46728)
squid: Denial of Service in SSL Certificate validation (CVE-2023-46724)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Package | Affected Version |
---|---|
pkg:rpm/redhat/squid?arch=x86_64&distro=redhat-7.9 | < 3.5.20-17.el7_9.10 |
pkg:rpm/redhat/squid?arch=s390x&distro=redhat-7.9 | < 3.5.20-17.el7_9.10 |
pkg:rpm/redhat/squid?arch=ppc64le&distro=redhat-7.9 | < 3.5.20-17.el7_9.10 |
pkg:rpm/redhat/squid?arch=ppc64&distro=redhat-7.9 | < 3.5.20-17.el7_9.10 |
pkg:rpm/redhat/squid-sysvinit?arch=x86_64&distro=redhat-7.9 | < 3.5.20-17.el7_9.10 |
pkg:rpm/redhat/squid-sysvinit?arch=s390x&distro=redhat-7.9 | < 3.5.20-17.el7_9.10 |
pkg:rpm/redhat/squid-sysvinit?arch=ppc64le&distro=redhat-7.9 | < 3.5.20-17.el7_9.10 |
pkg:rpm/redhat/squid-sysvinit?arch=ppc64&distro=redhat-7.9 | < 3.5.20-17.el7_9.10 |
pkg:rpm/redhat/squid-migration-script?arch=x86_64&distro=redhat-7.9 | < 3.5.20-17.el7_9.10 |
pkg:rpm/redhat/squid-migration-script?arch=s390x&distro=redhat-7.9 | < 3.5.20-17.el7_9.10 |
pkg:rpm/redhat/squid-migration-script?arch=ppc64le&distro=redhat-7.9 | < 3.5.20-17.el7_9.10 |
pkg:rpm/redhat/squid-migration-script?arch=ppc64&distro=redhat-7.9 | < 3.5.20-17.el7_9.10 |
- ID
- RHSA-2024:1787
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2024:1787
- Published
-
2024-04-11T00:00:00
(5 months ago) - Modified
-
2024-04-11T00:00:00
(5 months ago) - Rights
- Copyright 2024 Red Hat, Inc.
- Other Advisories
-
- ALAS-2023-1885
- ALAS-2023-1886
- ALAS-2024-1901
- ALAS-2024-1916
- ALAS2-2023-2354
- ALAS2-2024-2381
- ALAS2-2024-2382
- ALAS2-2024-2445
- ALAS2-2024-2500
- ALPINE:CVE-2023-46724
- ALPINE:CVE-2023-49285
- ALPINE:CVE-2023-49286
- ALPINE:CVE-2023-50269
- ALSA-2024:0046
- ALSA-2024:0071
- ALSA-2024:1375
- ALSA-2024:1376
- DSA-5637-1
- ELSA-2024-0046
- ELSA-2024-0071
- ELSA-2024-1375
- ELSA-2024-1376
- ELSA-2024-1787
- FEDORA-2023-6317eaa767
- FEDORA-2023-ab77331a34
- RHSA-2024:0046
- RHSA-2024:0071
- RHSA-2024:1375
- RHSA-2024:1376
- SUSE-SU-2023:4380-1
- SUSE-SU-2023:4381-1
- SUSE-SU-2023:4384-1
- SUSE-SU-2023:4544-1
- SUSE-SU-2023:4545-1
- SUSE-SU-2023:4589-1
- SUSE-SU-2023:4698-1
- SUSE-SU-2023:4724-1
- SUSE-SU-2023:4825-1
- SUSE-SU-2024:0296-1
- SUSE-SU-2024:0298-1
- SUSE-SU-2024:0455-1
- SUSE-SU-2024:1113-1
- SUSE-SU-2024:1114-1
- SUSE-SU-2024:1115-1
- USN-6500-1
- USN-6500-2
- USN-6594-1
- USN-6728-1
- USN-6857-1
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 2247567 | https://bugzilla.redhat.com/2247567 | |
Bugzilla | 2248521 | https://bugzilla.redhat.com/2248521 | |
Bugzilla | 2252923 | https://bugzilla.redhat.com/2252923 | |
Bugzilla | 2252926 | https://bugzilla.redhat.com/2252926 | |
Bugzilla | 2254663 | https://bugzilla.redhat.com/2254663 | |
Bugzilla | 2264309 | https://bugzilla.redhat.com/2264309 | |
RHSA | RHSA-2024:1787 | https://access.redhat.com/errata/RHSA-2024:1787 | |
CVE | CVE-2023-46724 | https://access.redhat.com/security/cve/CVE-2023-46724 | |
CVE | CVE-2023-46728 | https://access.redhat.com/security/cve/CVE-2023-46728 | |
CVE | CVE-2023-49285 | https://access.redhat.com/security/cve/CVE-2023-49285 | |
CVE | CVE-2023-49286 | https://access.redhat.com/security/cve/CVE-2023-49286 | |
CVE | CVE-2023-50269 | https://access.redhat.com/security/cve/CVE-2023-50269 | |
CVE | CVE-2024-25617 | https://access.redhat.com/security/cve/CVE-2024-25617 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/squid?arch=x86_64&distro=redhat-7.9 | redhat | squid | < 3.5.20-17.el7_9.10 | redhat-7.9 | x86_64 | |
Affected | pkg:rpm/redhat/squid?arch=s390x&distro=redhat-7.9 | redhat | squid | < 3.5.20-17.el7_9.10 | redhat-7.9 | s390x | |
Affected | pkg:rpm/redhat/squid?arch=ppc64le&distro=redhat-7.9 | redhat | squid | < 3.5.20-17.el7_9.10 | redhat-7.9 | ppc64le | |
Affected | pkg:rpm/redhat/squid?arch=ppc64&distro=redhat-7.9 | redhat | squid | < 3.5.20-17.el7_9.10 | redhat-7.9 | ppc64 | |
Affected | pkg:rpm/redhat/squid-sysvinit?arch=x86_64&distro=redhat-7.9 | redhat | squid-sysvinit | < 3.5.20-17.el7_9.10 | redhat-7.9 | x86_64 | |
Affected | pkg:rpm/redhat/squid-sysvinit?arch=s390x&distro=redhat-7.9 | redhat | squid-sysvinit | < 3.5.20-17.el7_9.10 | redhat-7.9 | s390x | |
Affected | pkg:rpm/redhat/squid-sysvinit?arch=ppc64le&distro=redhat-7.9 | redhat | squid-sysvinit | < 3.5.20-17.el7_9.10 | redhat-7.9 | ppc64le | |
Affected | pkg:rpm/redhat/squid-sysvinit?arch=ppc64&distro=redhat-7.9 | redhat | squid-sysvinit | < 3.5.20-17.el7_9.10 | redhat-7.9 | ppc64 | |
Affected | pkg:rpm/redhat/squid-migration-script?arch=x86_64&distro=redhat-7.9 | redhat | squid-migration-script | < 3.5.20-17.el7_9.10 | redhat-7.9 | x86_64 | |
Affected | pkg:rpm/redhat/squid-migration-script?arch=s390x&distro=redhat-7.9 | redhat | squid-migration-script | < 3.5.20-17.el7_9.10 | redhat-7.9 | s390x | |
Affected | pkg:rpm/redhat/squid-migration-script?arch=ppc64le&distro=redhat-7.9 | redhat | squid-migration-script | < 3.5.20-17.el7_9.10 | redhat-7.9 | ppc64le | |
Affected | pkg:rpm/redhat/squid-migration-script?arch=ppc64&distro=redhat-7.9 | redhat | squid-migration-script | < 3.5.20-17.el7_9.10 | redhat-7.9 | ppc64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |