CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N
AI Score
Confidence
High
EPSS
Percentile
91.1%
An update is available for squid.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
SQUID-2023:3 squid: Denial of Service in HTTP Digest Authentication (CVE-2023-46847)
SQUID-2023:1 squid: Request/Response smuggling in HTTP/1.1 and ICAP (CVE-2023-46846)
SQUID-2023:5 squid: denial of Service in FTP (CVE-2023-46848)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
rocky | 9 | aarch64 | squid | < 5.5-5.el9_2.1 | squid-7:5.5-5.el9_2.1.aarch64.rpm |
rocky | 9 | ppc64le | squid | < 5.5-5.el9_2.1 | squid-7:5.5-5.el9_2.1.ppc64le.rpm |
rocky | 9 | x86_64 | squid | < 5.5-5.el9_2.1 | squid-7:5.5-5.el9_2.1.x86_64.rpm |
rocky | 9 | aarch64 | squid-debuginfo | < 5.5-5.el9_2.1 | squid-debuginfo-7:5.5-5.el9_2.1.aarch64.rpm |
rocky | 9 | ppc64le | squid-debuginfo | < 5.5-5.el9_2.1 | squid-debuginfo-7:5.5-5.el9_2.1.ppc64le.rpm |
rocky | 9 | x86_64 | squid-debuginfo | < 5.5-5.el9_2.1 | squid-debuginfo-7:5.5-5.el9_2.1.x86_64.rpm |
rocky | 9 | aarch64 | squid-debugsource | < 5.5-5.el9_2.1 | squid-debugsource-7:5.5-5.el9_2.1.aarch64.rpm |
rocky | 9 | ppc64le | squid-debugsource | < 5.5-5.el9_2.1 | squid-debugsource-7:5.5-5.el9_2.1.ppc64le.rpm |
rocky | 9 | x86_64 | squid-debugsource | < 5.5-5.el9_2.1 | squid-debugsource-7:5.5-5.el9_2.1.x86_64.rpm |