Lucene search

K
oraclelinuxOracleLinuxELSA-2024-1787
HistoryApr 11, 2024 - 12:00 a.m.

squid security update

2024-04-1100:00:00
linux.oracle.com
12
squid
security update
cve fixes
improvements
rhel-16779
rhel-18176
rhel-18171
rhel-16758
rhel-19557
rhel-26082

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

AI Score

7.3

Confidence

Low

EPSS

0.019

Percentile

88.9%

[7:3.5.20-17.0.1]

  • Mutiple CVE fixes for squid [Orabug: 33146289]
  • Resolves: CVE-2021-28651 squid: Bug 5104: Memory leak in RFC 2169 response parsing (#778)
  • Resolves: CVE-2021-28652 squid: Bug 5106: Broken cache manager URL parsing (#788)
  • Resolves: CVE-2021-31806,31807,31808 squid: Handle more Range requests (#790)
  • Resolves: CVE-2021-33620 squid: Handle more partial responses (#791)
    [7:3.5.20-17.10]
  • Resolves: RHEL-16779 - squid: NULL pointer dereference in the gopher protocol
    code – Remove support for Gopher protocol (CVE-2023-46728)
  • Resolves: RHEL-18176 - squid: Buffer over-read in the HTTP Message processing
    feature (CVE-2023-49285)
  • Resolves: RHEL-18171 - squid: Incorrect Check of Function Return Value In
    Helper Process management (CVE-2023-49286)
  • Resolves: RHEL-16758 - squid: Denial of Service in SSL Certificate validation
    (CVE-2023-46724)
  • Resolves: RHEL-19557 - squid: denial of service in HTTP request parsing
    (CVE-2023-50269)
  • Resolves: RHEL-26082 - squid: denial of service in HTTP header parser
    (CVE-2024-25617)

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

AI Score

7.3

Confidence

Low

EPSS

0.019

Percentile

88.9%