Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-50269 (GCVE-0-2023-50269)
Vulnerability from cvelistv5 – Published: 2023-12-14 17:09 – Updated: 2025-05-21 14:31- CWE-674 - Uncontrolled Recursion
| Vendor | Product | Version | |
|---|---|---|---|
| squid-cache | squid |
Affected:
>= 2.6, <= 2.7.STABLE9
Affected: >= 3.1, <= 5.9 Affected: >= 6.0.1, < 6.6 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T22:16:46.315Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://github.com/squid-cache/squid/security/advisories/GHSA-wgq4-4cfg-c4x3",
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/squid-cache/squid/security/advisories/GHSA-wgq4-4cfg-c4x3"
},
{
"name": "http://www.squid-cache.org/Versions/v5/SQUID-2023_10.patch",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.squid-cache.org/Versions/v5/SQUID-2023_10.patch"
},
{
"name": "http://www.squid-cache.org/Versions/v6/SQUID-2023_10.patch",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.squid-cache.org/Versions/v6/SQUID-2023_10.patch"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00003.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20240119-0005/"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-50269",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2023-12-19T14:21:27.775746Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-05-21T14:31:00.896Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "squid",
"vendor": "squid-cache",
"versions": [
{
"status": "affected",
"version": "\u003e= 2.6, \u003c= 2.7.STABLE9"
},
{
"status": "affected",
"version": "\u003e= 3.1, \u003c= 5.9"
},
{
"status": "affected",
"version": "\u003e= 6.0.1, \u003c 6.6"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Squid is a caching proxy for the Web. Due to an Uncontrolled Recursion bug in versions 2.6 through 2.7.STABLE9, versions 3.1 through 5.9, and versions 6.0.1 through 6.5, Squid may be vulnerable to a Denial of Service attack against HTTP Request parsing. This problem allows a remote client to perform Denial of Service attack by sending a large X-Forwarded-For header when the follow_x_forwarded_for feature is configured. This bug is fixed by Squid version 6.6. In addition, patches addressing this problem for the stable releases can be found in Squid\u0027s patch archives."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-674",
"description": "CWE-674: Uncontrolled Recursion",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-01-19T16:06:57.654Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/squid-cache/squid/security/advisories/GHSA-wgq4-4cfg-c4x3",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/squid-cache/squid/security/advisories/GHSA-wgq4-4cfg-c4x3"
},
{
"name": "http://www.squid-cache.org/Versions/v5/SQUID-2023_10.patch",
"tags": [
"x_refsource_MISC"
],
"url": "http://www.squid-cache.org/Versions/v5/SQUID-2023_10.patch"
},
{
"name": "http://www.squid-cache.org/Versions/v6/SQUID-2023_10.patch",
"tags": [
"x_refsource_MISC"
],
"url": "http://www.squid-cache.org/Versions/v6/SQUID-2023_10.patch"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00003.html"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240119-0005/"
}
],
"source": {
"advisory": "GHSA-wgq4-4cfg-c4x3",
"discovery": "UNKNOWN"
},
"title": "SQUID-2023:10 Denial of Service in HTTP Request parsing"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2023-50269",
"datePublished": "2023-12-14T17:09:25.168Z",
"dateReserved": "2023-12-05T20:42:59.381Z",
"dateUpdated": "2025-05-21T14:31:00.896Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2023-50269",
"date": "2026-05-19",
"epss": "0.01147",
"percentile": "0.78683"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"3.1\", \"versionEndIncluding\": \"5.9\", \"matchCriteriaId\": \"1137E216-6CAB-4EFD-9678-AF3BD48B1FA5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"6.0.1\", \"versionEndIncluding\": \"6.5\", \"matchCriteriaId\": \"C0CBB040-FF79-4CD5-B749-A50ADAD82571\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:squid-cache:squid:2.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3AE100C3-0245-4305-B514-77D0572C2947\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:squid-cache:squid:2.7:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"A4E50120-7298-4BC5-AC36-708EFCCFA1F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:squid-cache:squid:2.7:stable1:*:*:*:*:*:*\", \"matchCriteriaId\": \"01930746-6E15-445F-BD30-C4E83FA9AE25\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:squid-cache:squid:2.7:stable2:*:*:*:*:*:*\", \"matchCriteriaId\": \"EFBB466C-C679-4B4B-87C2-E7853E5B3F04\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:squid-cache:squid:2.7:stable3:*:*:*:*:*:*\", \"matchCriteriaId\": \"A03692DD-779F-4E3C-861C-29943870A816\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:squid-cache:squid:2.7:stable4:*:*:*:*:*:*\", \"matchCriteriaId\": \"79FF6B3C-A3CE-4AA2-80F9-44D05A6B2F08\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:squid-cache:squid:2.7:stable5:*:*:*:*:*:*\", \"matchCriteriaId\": \"3CF6E367-D33B-4B60-8C40-4618C47D53E8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:squid-cache:squid:2.7:stable6:*:*:*:*:*:*\", \"matchCriteriaId\": \"0FA1F4FE-629C-4489-A13C-017A824C840F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:squid-cache:squid:2.7:stable7:*:*:*:*:*:*\", \"matchCriteriaId\": \"2479C5BF-94E1-4153-9FA3-333BC00F01D6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:squid-cache:squid:2.7:stable8:*:*:*:*:*:*\", \"matchCriteriaId\": \"8ABFCCCC-7584-466E-97CC-6EBD3934A70E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:squid-cache:squid:2.7:stable9:*:*:*:*:*:*\", \"matchCriteriaId\": \"F17E49BF-FB11-4EE6-B6AC-30914F381B2F\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Squid is a caching proxy for the Web. Due to an Uncontrolled Recursion bug in versions 2.6 through 2.7.STABLE9, versions 3.1 through 5.9, and versions 6.0.1 through 6.5, Squid may be vulnerable to a Denial of Service attack against HTTP Request parsing. This problem allows a remote client to perform Denial of Service attack by sending a large X-Forwarded-For header when the follow_x_forwarded_for feature is configured. This bug is fixed by Squid version 6.6. In addition, patches addressing this problem for the stable releases can be found in Squid\u0027s patch archives.\"}, {\"lang\": \"es\", \"value\": \"Squid es un proxy de almacenamiento en cach\\u00e9 para la Web. Debido a un error de recursi\\u00f3n no controlada en las versiones 2.6 a 2.7.STABLE9, versiones 3.1 a 5.9 y versiones 6.0.1 a 6.5, Squid puede ser vulnerable a un ataque de denegaci\\u00f3n de servicio contra el an\\u00e1lisis de solicitudes HTTP. Este problema permite que un cliente remoto realice un ataque de denegaci\\u00f3n de servicio enviando un encabezado X-Forwarded-For grande cuando la funci\\u00f3n follow_x_forwarded_for est\\u00e1 configurada. Este error se solucion\\u00f3 con la versi\\u00f3n 6.6 de Squid. Adem\\u00e1s, los parches que solucionan este problema para las versiones estables se pueden encontrar en los archivos de parches de Squid.\"}]",
"id": "CVE-2023-50269",
"lastModified": "2024-11-21T08:36:47.383",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H\", \"baseScore\": 8.6, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 4.0}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}]}",
"published": "2023-12-14T18:15:45.070",
"references": "[{\"url\": \"http://www.squid-cache.org/Versions/v5/SQUID-2023_10.patch\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://www.squid-cache.org/Versions/v6/SQUID-2023_10.patch\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"https://github.com/squid-cache/squid/security/advisories/GHSA-wgq4-4cfg-c4x3\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2024/01/msg00003.html\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20240119-0005/\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"http://www.squid-cache.org/Versions/v5/SQUID-2023_10.patch\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://www.squid-cache.org/Versions/v6/SQUID-2023_10.patch\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"https://github.com/squid-cache/squid/security/advisories/GHSA-wgq4-4cfg-c4x3\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2024/01/msg00003.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20240119-0005/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"security-advisories@github.com\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-674\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2023-50269\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2023-12-14T18:15:45.070\",\"lastModified\":\"2024-11-21T08:36:47.383\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Squid is a caching proxy for the Web. Due to an Uncontrolled Recursion bug in versions 2.6 through 2.7.STABLE9, versions 3.1 through 5.9, and versions 6.0.1 through 6.5, Squid may be vulnerable to a Denial of Service attack against HTTP Request parsing. This problem allows a remote client to perform Denial of Service attack by sending a large X-Forwarded-For header when the follow_x_forwarded_for feature is configured. This bug is fixed by Squid version 6.6. In addition, patches addressing this problem for the stable releases can be found in Squid\u0027s patch archives.\"},{\"lang\":\"es\",\"value\":\"Squid es un proxy de almacenamiento en cach\u00e9 para la Web. Debido a un error de recursi\u00f3n no controlada en las versiones 2.6 a 2.7.STABLE9, versiones 3.1 a 5.9 y versiones 6.0.1 a 6.5, Squid puede ser vulnerable a un ataque de denegaci\u00f3n de servicio contra el an\u00e1lisis de solicitudes HTTP. Este problema permite que un cliente remoto realice un ataque de denegaci\u00f3n de servicio enviando un encabezado X-Forwarded-For grande cuando la funci\u00f3n follow_x_forwarded_for est\u00e1 configurada. Este error se solucion\u00f3 con la versi\u00f3n 6.6 de Squid. Adem\u00e1s, los parches que solucionan este problema para las versiones estables se pueden encontrar en los archivos de parches de Squid.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H\",\"baseScore\":8.6,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":4.0},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-674\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.1\",\"versionEndIncluding\":\"5.9\",\"matchCriteriaId\":\"1137E216-6CAB-4EFD-9678-AF3BD48B1FA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.0.1\",\"versionEndIncluding\":\"6.5\",\"matchCriteriaId\":\"C0CBB040-FF79-4CD5-B749-A50ADAD82571\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AE100C3-0245-4305-B514-77D0572C2947\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:2.7:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4E50120-7298-4BC5-AC36-708EFCCFA1F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:2.7:stable1:*:*:*:*:*:*\",\"matchCriteriaId\":\"01930746-6E15-445F-BD30-C4E83FA9AE25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:2.7:stable2:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFBB466C-C679-4B4B-87C2-E7853E5B3F04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:2.7:stable3:*:*:*:*:*:*\",\"matchCriteriaId\":\"A03692DD-779F-4E3C-861C-29943870A816\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:2.7:stable4:*:*:*:*:*:*\",\"matchCriteriaId\":\"79FF6B3C-A3CE-4AA2-80F9-44D05A6B2F08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:2.7:stable5:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CF6E367-D33B-4B60-8C40-4618C47D53E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:2.7:stable6:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FA1F4FE-629C-4489-A13C-017A824C840F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:2.7:stable7:*:*:*:*:*:*\",\"matchCriteriaId\":\"2479C5BF-94E1-4153-9FA3-333BC00F01D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:2.7:stable8:*:*:*:*:*:*\",\"matchCriteriaId\":\"8ABFCCCC-7584-466E-97CC-6EBD3934A70E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:2.7:stable9:*:*:*:*:*:*\",\"matchCriteriaId\":\"F17E49BF-FB11-4EE6-B6AC-30914F381B2F\"}]}]}],\"references\":[{\"url\":\"http://www.squid-cache.org/Versions/v5/SQUID-2023_10.patch\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.squid-cache.org/Versions/v6/SQUID-2023_10.patch\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://github.com/squid-cache/squid/security/advisories/GHSA-wgq4-4cfg-c4x3\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2024/01/msg00003.html\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20240119-0005/\",\"source\":\"security-advisories@github.com\"},{\"url\":\"http://www.squid-cache.org/Versions/v5/SQUID-2023_10.patch\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.squid-cache.org/Versions/v6/SQUID-2023_10.patch\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://github.com/squid-cache/squid/security/advisories/GHSA-wgq4-4cfg-c4x3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2024/01/msg00003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20240119-0005/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://github.com/squid-cache/squid/security/advisories/GHSA-wgq4-4cfg-c4x3\", \"name\": \"https://github.com/squid-cache/squid/security/advisories/GHSA-wgq4-4cfg-c4x3\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://www.squid-cache.org/Versions/v5/SQUID-2023_10.patch\", \"name\": \"http://www.squid-cache.org/Versions/v5/SQUID-2023_10.patch\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"http://www.squid-cache.org/Versions/v6/SQUID-2023_10.patch\", \"name\": \"http://www.squid-cache.org/Versions/v6/SQUID-2023_10.patch\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2024/01/msg00003.html\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20240119-0005/\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T22:16:46.315Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-50269\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2023-12-19T14:21:27.775746Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-05-21T14:30:57.192Z\"}}], \"cna\": {\"title\": \"SQUID-2023:10 Denial of Service in HTTP Request parsing\", \"source\": {\"advisory\": \"GHSA-wgq4-4cfg-c4x3\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 8.6, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"squid-cache\", \"product\": \"squid\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003e= 2.6, \u003c= 2.7.STABLE9\"}, {\"status\": \"affected\", \"version\": \"\u003e= 3.1, \u003c= 5.9\"}, {\"status\": \"affected\", \"version\": \"\u003e= 6.0.1, \u003c 6.6\"}]}], \"references\": [{\"url\": \"https://github.com/squid-cache/squid/security/advisories/GHSA-wgq4-4cfg-c4x3\", \"name\": \"https://github.com/squid-cache/squid/security/advisories/GHSA-wgq4-4cfg-c4x3\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://www.squid-cache.org/Versions/v5/SQUID-2023_10.patch\", \"name\": \"http://www.squid-cache.org/Versions/v5/SQUID-2023_10.patch\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"http://www.squid-cache.org/Versions/v6/SQUID-2023_10.patch\", \"name\": \"http://www.squid-cache.org/Versions/v6/SQUID-2023_10.patch\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2024/01/msg00003.html\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20240119-0005/\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Squid is a caching proxy for the Web. Due to an Uncontrolled Recursion bug in versions 2.6 through 2.7.STABLE9, versions 3.1 through 5.9, and versions 6.0.1 through 6.5, Squid may be vulnerable to a Denial of Service attack against HTTP Request parsing. This problem allows a remote client to perform Denial of Service attack by sending a large X-Forwarded-For header when the follow_x_forwarded_for feature is configured. This bug is fixed by Squid version 6.6. In addition, patches addressing this problem for the stable releases can be found in Squid\u0027s patch archives.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-674\", \"description\": \"CWE-674: Uncontrolled Recursion\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2024-01-19T16:06:57.654Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-50269\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-21T14:31:00.896Z\", \"dateReserved\": \"2023-12-05T20:42:59.381Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2023-12-14T17:09:25.168Z\", \"assignerShortName\": \"GitHub_M\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CERTFR-2023-AVI-1030
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans Squid. Elle permet à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Squid versions 2.6.x \u00e0 6.5.x ant\u00e9rieures \u00e0 6.6",
"product": {
"name": "Squid",
"vendor": {
"name": "Squid",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-50269",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50269"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-1030",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-12-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans \u003cspan\nclass=\"textit\"\u003eSquid\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer un\nd\u00e9ni de service \u00e0 distance.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans Squid",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Squid GHSA-wgq4-4cfg-c4x3 du 14 d\u00e9cembre 2023",
"url": "https://github.com/squid-cache/squid/security/advisories/GHSA-wgq4-4cfg-c4x3"
}
]
}
CERTFR-2023-AVI-1030
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans Squid. Elle permet à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Squid versions 2.6.x \u00e0 6.5.x ant\u00e9rieures \u00e0 6.6",
"product": {
"name": "Squid",
"vendor": {
"name": "Squid",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-50269",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50269"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-1030",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-12-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans \u003cspan\nclass=\"textit\"\u003eSquid\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer un\nd\u00e9ni de service \u00e0 distance.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans Squid",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Squid GHSA-wgq4-4cfg-c4x3 du 14 d\u00e9cembre 2023",
"url": "https://github.com/squid-cache/squid/security/advisories/GHSA-wgq4-4cfg-c4x3"
}
]
}
alsa-2024:1375
Vulnerability from osv_almalinux
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
- squid: denial of service in HTTP header parser (CVE-2024-25617)
- squid: Denial of Service in HTTP Chunked Decoding (CVE-2024-25111)
- squid: denial of service in HTTP request parsing (CVE-2023-50269)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libecap"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.0.1-2.module_el8.6.0+2741+01592ae8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libecap"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.0.1-2.module_el8.6.0+3048+383bc947"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libecap-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.0.1-2.module_el8.6.0+2741+01592ae8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libecap-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.0.1-2.module_el8.6.0+3048+383bc947"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "squid"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "7:4.15-7.module_el8.9.0+3749+dbf371ed.10"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.\n\nSecurity Fix(es):\n\n* squid: denial of service in HTTP header parser (CVE-2024-25617)\n* squid: Denial of Service in HTTP Chunked Decoding (CVE-2024-25111)\n* squid: denial of service in HTTP request parsing (CVE-2023-50269)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"id": "ALSA-2024:1375",
"modified": "2024-04-12T18:59:09Z",
"published": "2024-03-19T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2024:1375"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-50269"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-25111"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-25617"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2254663"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2264309"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2268366"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2024-1375.html"
}
],
"related": [
"CVE-2024-25617",
"CVE-2024-25111",
"CVE-2023-50269"
],
"summary": "Important: squid:4 security update"
}
alsa-2024:1376
Vulnerability from osv_almalinux
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
- squid: denial of service in HTTP header parser (CVE-2024-25617)
- squid: Denial of Service in HTTP Chunked Decoding (CVE-2024-25111)
- squid: denial of service in HTTP request parsing (CVE-2023-50269)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
| URL | Type | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "squid"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "7:5.5-6.el9_3.8"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.\n\nSecurity Fix(es):\n\n* squid: denial of service in HTTP header parser (CVE-2024-25617)\n* squid: Denial of Service in HTTP Chunked Decoding (CVE-2024-25111)\n* squid: denial of service in HTTP request parsing (CVE-2023-50269)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"id": "ALSA-2024:1376",
"modified": "2024-04-12T18:57:26Z",
"published": "2024-03-19T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2024:1376"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-50269"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-25111"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-25617"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2254663"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2264309"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2268366"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/9/ALSA-2024-1376.html"
}
],
"related": [
"CVE-2024-25617",
"CVE-2024-25111",
"CVE-2023-50269"
],
"summary": "Important: squid security update"
}
BDU:2023-08827
Vulnerability from fstec - Published: 12.10.2023{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb, \u0410\u041e \u00ab\u041d\u0422\u0426 \u0418\u0422 \u0420\u041e\u0421\u0410\u00bb, Squid Software Foundation, \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\"",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "1.7 (Astra Linux Special Edition), - (\u0410\u043b\u044c\u0442 8 \u0421\u041f), 4.7 (Astra Linux Special Edition), 7.9 (\u0420\u041e\u0421\u0410 \u041a\u043e\u0431\u0430\u043b\u044c\u0442), 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (Astra Linux Common Edition), 12.4 (\u0420\u041e\u0421\u0410 \u0425\u0420\u041e\u041c), - (\u0410\u041b\u042c\u0422 \u0421\u041f 10), \u043e\u0442 2.6 \u0434\u043e 2.7.STABLE9 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Squid), \u043e\u0442 3.1 \u0434\u043e 5.9 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Squid), \u043e\u0442 6.0.1 \u0434\u043e 6.5.0 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Squid), \u0434\u043e 2.10 (\u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttp://www.squid-cache.org/Versions/v5/SQUID-2023_10.patch \nhttp://www.squid-cache.org/Versions/v6/SQUID-2023_10.patch\n\n\u041a\u043e\u043c\u043f\u0435\u043d\u0441\u0438\u0440\u0443\u044e\u0449\u0438\u0435 \u043c\u0435\u0440\u044b:\n- \u0443\u0434\u0430\u043b\u0438\u0442\u044c \u0441\u0442\u0440\u043e\u043a\u0443 follow_x_forwarded_for \u0438\u0437 \u0444\u0430\u0439\u043b\u0430 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438 squid.conf.\n\n\u0414\u043b\u044f \u041e\u0421 \u0410\u043b\u044c\u0442 8 \u0421\u041f (\u0440\u0435\u043b\u0438\u0437 10): \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0438\u0437 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e\u0433\u043e \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430\n\n\u0414\u043b\u044f \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx (\u0432\u0435\u0440\u0441\u0438\u044f 2.10):\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f squid \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 6.6-1osnova1\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 squid \u0434\u043e 5.7-2+deb12u1+astra1 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se17-bulletin-2024-0830SE17\n\n\u0414\u043b\u044f \u041e\u0421 \u0410\u043b\u044c\u0442 8 \u0421\u041f: \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0438\u0437 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e\u0433\u043e \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430\n\n\u0414\u043b\u044f Astra Linux Special Edition 4.7 \u0434\u043b\u044f \u0430\u0440\u0445\u0438\u0442\u0435\u043a\u0442\u0443\u0440\u044b ARM:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 squid \u0434\u043e 5.7-2+deb12u1+astra1 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se47-bulletin-2024-1031SE47\n\n\u0414\u043b\u044f \u041e\u0421 \u0420\u041e\u0421\u0410 \"\u041a\u041e\u0411\u0410\u041b\u042c\u0422\": https://abf.rosa.ru/advisories/ROSA-SA-2024-2479\n\n\u0414\u043b\u044f \u041e\u0421 \u0420\u041e\u0421\u0410 \"\u041a\u041e\u0411\u0410\u041b\u042c\u0422\": https://abf.rosa.ru/advisories/ROSA-SA-2024-2479\n\n\u0414\u043b\u044f \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0420\u041e\u0421\u0410 \u0425\u0420\u041e\u041c: https://abf.rosa.ru/advisories/ROSA-SA-2025-2595\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 squid3 \u0434\u043e 3.5.23-5+deb9u11+astra1 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se16-bulletin-20251225SE16",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "12.10.2023",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "20.01.2026",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "19.12.2023",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2023-08827",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2023-50269",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u0410\u043b\u044c\u0442 8 \u0421\u041f (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164305), \u0420\u041e\u0421\u0410 \u041a\u043e\u0431\u0430\u043b\u044c\u0442 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21161999), Astra Linux Common Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164433), \u0420\u041e\u0421\u0410 \u0425\u0420\u041e\u041c (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21161607), \u0410\u041b\u042c\u0422 \u0421\u041f 10, Squid, \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.7 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb \u0410\u043b\u044c\u0442 8 \u0421\u041f - (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164305), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 4.7 ARM (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u0410\u041e \u00ab\u041d\u0422\u0426 \u0418\u0422 \u0420\u041e\u0421\u0410\u00bb \u0420\u041e\u0421\u0410 \u041a\u043e\u0431\u0430\u043b\u044c\u0442 7.9 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21161999), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Common Edition 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164433), \u0410\u041e \u00ab\u041d\u0422\u0426 \u0418\u0422 \u0420\u041e\u0421\u0410\u00bb \u0420\u041e\u0421\u0410 \u0425\u0420\u041e\u041c 12.4 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21161607), \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb \u0410\u041b\u042c\u0422 \u0421\u041f 10 - , \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\" \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx \u0434\u043e 2.10 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 follow_x_forwarded_for() \u043f\u0440\u043e\u043a\u0441\u0438-\u0441\u0435\u0440\u0432\u0435\u0440\u0430 Squid, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0438\u0440\u0443\u0435\u043c\u0430\u044f \u0440\u0435\u043a\u0443\u0440\u0441\u0438\u044f (CWE-674)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 follow_x_forwarded_for() \u043f\u0440\u043e\u043a\u0441\u0438-\u0441\u0435\u0440\u0432\u0435\u0440\u0430 Squid \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0438\u0440\u0443\u0435\u043c\u043e\u0439 \u0440\u0435\u043a\u0443\u0440\u0441\u0438\u0435\u0439 \u043f\u0440\u0438 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0435 \u0437\u0430\u0433\u043e\u043b\u043e\u0432\u043a\u043e\u0432 X-Forwarded-For HTTP-\u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://vuldb.com/ru/?id.248093\nhttp://www.squid-cache.org/Versions/v5/SQUID-2023_10.patch \nhttp://www.squid-cache.org/Versions/v6/SQUID-2023_10.patch \nhttps://github.com/squid-cache/squid/security/advisories/GHSA-wgq4-4cfg-c4x3\nhttps://altsp.su/obnovleniya-bezopasnosti/\nhttps://\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430.\u043d\u043f\u043f\u043a\u0442.\u0440\u0444/bin/view/\u041e\u0421\u043d\u043e\u0432\u0430/\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f/2.10/\nhttps://wiki.astralinux.ru/astra-linux-se17-bulletin-2024-0830SE17\nhttps://altsp.su/obnovleniya-bezopasnosti/\nhttps://wiki.astralinux.ru/astra-linux-se47-bulletin-2024-1031SE47\nhttps://abf.rosa.ru/advisories/ROSA-SA-2024-2479\nhttps://abf.rosa.ru/advisories/ROSA-SA-2024-2479\nhttps://abf.rosa.ru/advisories/ROSA-SA-2025-2595\nhttps://wiki.astralinux.ru/astra-linux-se16-bulletin-20251225SE16",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-674",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,8)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 8,6)"
}
FKIE_CVE-2023-50269
Vulnerability from fkie_nvd - Published: 2023-12-14 18:15 - Updated: 2024-11-21 08:367.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
| URL | Tags | ||
|---|---|---|---|
| security-advisories@github.com | http://www.squid-cache.org/Versions/v5/SQUID-2023_10.patch | Broken Link | |
| security-advisories@github.com | http://www.squid-cache.org/Versions/v6/SQUID-2023_10.patch | Broken Link | |
| security-advisories@github.com | https://github.com/squid-cache/squid/security/advisories/GHSA-wgq4-4cfg-c4x3 | Third Party Advisory | |
| security-advisories@github.com | https://lists.debian.org/debian-lts-announce/2024/01/msg00003.html | ||
| security-advisories@github.com | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/ | ||
| security-advisories@github.com | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/ | ||
| security-advisories@github.com | https://security.netapp.com/advisory/ntap-20240119-0005/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.squid-cache.org/Versions/v5/SQUID-2023_10.patch | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.squid-cache.org/Versions/v6/SQUID-2023_10.patch | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/squid-cache/squid/security/advisories/GHSA-wgq4-4cfg-c4x3 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2024/01/msg00003.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20240119-0005/ |
| Vendor | Product | Version | |
|---|---|---|---|
| squid-cache | squid | * | |
| squid-cache | squid | * | |
| squid-cache | squid | 2.6 | |
| squid-cache | squid | 2.7 | |
| squid-cache | squid | 2.7 | |
| squid-cache | squid | 2.7 | |
| squid-cache | squid | 2.7 | |
| squid-cache | squid | 2.7 | |
| squid-cache | squid | 2.7 | |
| squid-cache | squid | 2.7 | |
| squid-cache | squid | 2.7 | |
| squid-cache | squid | 2.7 | |
| squid-cache | squid | 2.7 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1137E216-6CAB-4EFD-9678-AF3BD48B1FA5",
"versionEndIncluding": "5.9",
"versionStartIncluding": "3.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C0CBB040-FF79-4CD5-B749-A50ADAD82571",
"versionEndIncluding": "6.5",
"versionStartIncluding": "6.0.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squid-cache:squid:2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "3AE100C3-0245-4305-B514-77D0572C2947",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squid-cache:squid:2.7:-:*:*:*:*:*:*",
"matchCriteriaId": "A4E50120-7298-4BC5-AC36-708EFCCFA1F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squid-cache:squid:2.7:stable1:*:*:*:*:*:*",
"matchCriteriaId": "01930746-6E15-445F-BD30-C4E83FA9AE25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squid-cache:squid:2.7:stable2:*:*:*:*:*:*",
"matchCriteriaId": "EFBB466C-C679-4B4B-87C2-E7853E5B3F04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squid-cache:squid:2.7:stable3:*:*:*:*:*:*",
"matchCriteriaId": "A03692DD-779F-4E3C-861C-29943870A816",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squid-cache:squid:2.7:stable4:*:*:*:*:*:*",
"matchCriteriaId": "79FF6B3C-A3CE-4AA2-80F9-44D05A6B2F08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squid-cache:squid:2.7:stable5:*:*:*:*:*:*",
"matchCriteriaId": "3CF6E367-D33B-4B60-8C40-4618C47D53E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squid-cache:squid:2.7:stable6:*:*:*:*:*:*",
"matchCriteriaId": "0FA1F4FE-629C-4489-A13C-017A824C840F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squid-cache:squid:2.7:stable7:*:*:*:*:*:*",
"matchCriteriaId": "2479C5BF-94E1-4153-9FA3-333BC00F01D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squid-cache:squid:2.7:stable8:*:*:*:*:*:*",
"matchCriteriaId": "8ABFCCCC-7584-466E-97CC-6EBD3934A70E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squid-cache:squid:2.7:stable9:*:*:*:*:*:*",
"matchCriteriaId": "F17E49BF-FB11-4EE6-B6AC-30914F381B2F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Squid is a caching proxy for the Web. Due to an Uncontrolled Recursion bug in versions 2.6 through 2.7.STABLE9, versions 3.1 through 5.9, and versions 6.0.1 through 6.5, Squid may be vulnerable to a Denial of Service attack against HTTP Request parsing. This problem allows a remote client to perform Denial of Service attack by sending a large X-Forwarded-For header when the follow_x_forwarded_for feature is configured. This bug is fixed by Squid version 6.6. In addition, patches addressing this problem for the stable releases can be found in Squid\u0027s patch archives."
},
{
"lang": "es",
"value": "Squid es un proxy de almacenamiento en cach\u00e9 para la Web. Debido a un error de recursi\u00f3n no controlada en las versiones 2.6 a 2.7.STABLE9, versiones 3.1 a 5.9 y versiones 6.0.1 a 6.5, Squid puede ser vulnerable a un ataque de denegaci\u00f3n de servicio contra el an\u00e1lisis de solicitudes HTTP. Este problema permite que un cliente remoto realice un ataque de denegaci\u00f3n de servicio enviando un encabezado X-Forwarded-For grande cuando la funci\u00f3n follow_x_forwarded_for est\u00e1 configurada. Este error se solucion\u00f3 con la versi\u00f3n 6.6 de Squid. Adem\u00e1s, los parches que solucionan este problema para las versiones estables se pueden encontrar en los archivos de parches de Squid."
}
],
"id": "CVE-2023-50269",
"lastModified": "2024-11-21T08:36:47.383",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-12-14T18:15:45.070",
"references": [
{
"source": "security-advisories@github.com",
"tags": [
"Broken Link"
],
"url": "http://www.squid-cache.org/Versions/v5/SQUID-2023_10.patch"
},
{
"source": "security-advisories@github.com",
"tags": [
"Broken Link"
],
"url": "http://www.squid-cache.org/Versions/v6/SQUID-2023_10.patch"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/squid-cache/squid/security/advisories/GHSA-wgq4-4cfg-c4x3"
},
{
"source": "security-advisories@github.com",
"url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00003.html"
},
{
"source": "security-advisories@github.com",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/"
},
{
"source": "security-advisories@github.com",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/"
},
{
"source": "security-advisories@github.com",
"url": "https://security.netapp.com/advisory/ntap-20240119-0005/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://www.squid-cache.org/Versions/v5/SQUID-2023_10.patch"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://www.squid-cache.org/Versions/v6/SQUID-2023_10.patch"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/squid-cache/squid/security/advisories/GHSA-wgq4-4cfg-c4x3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00003.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.netapp.com/advisory/ntap-20240119-0005/"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-674"
}
],
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
}
GSD-2023-50269
Vulnerability from gsd - Updated: 2023-12-13 01:20{
"GSD": {
"alias": "CVE-2023-50269",
"id": "GSD-2023-50269"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2023-50269"
],
"details": "Squid is a caching proxy for the Web. Due to an Uncontrolled Recursion bug in versions 2.6 through 2.7.STABLE9, versions 3.1 through 5.9, and versions 6.0.1 through 6.5, Squid may be vulnerable to a Denial of Service attack against HTTP Request parsing. This problem allows a remote client to perform Denial of Service attack by sending a large X-Forwarded-For header when the follow_x_forwarded_for feature is configured. This bug is fixed by Squid version 6.6. In addition, patches addressing this problem for the stable releases can be found in Squid\u0027s patch archives.",
"id": "GSD-2023-50269",
"modified": "2023-12-13T01:20:31.381789Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2023-50269",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "squid",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "\u003e= 2.6, \u003c= 2.7.STABLE9"
},
{
"version_affected": "=",
"version_value": "\u003e= 3.1, \u003c= 5.9"
},
{
"version_affected": "=",
"version_value": "\u003e= 6.0.1, \u003c 6.6"
}
]
}
}
]
},
"vendor_name": "squid-cache"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Squid is a caching proxy for the Web. Due to an Uncontrolled Recursion bug in versions 2.6 through 2.7.STABLE9, versions 3.1 through 5.9, and versions 6.0.1 through 6.5, Squid may be vulnerable to a Denial of Service attack against HTTP Request parsing. This problem allows a remote client to perform Denial of Service attack by sending a large X-Forwarded-For header when the follow_x_forwarded_for feature is configured. This bug is fixed by Squid version 6.6. In addition, patches addressing this problem for the stable releases can be found in Squid\u0027s patch archives."
}
]
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"cweId": "CWE-674",
"lang": "eng",
"value": "CWE-674: Uncontrolled Recursion"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/squid-cache/squid/security/advisories/GHSA-wgq4-4cfg-c4x3",
"refsource": "MISC",
"url": "https://github.com/squid-cache/squid/security/advisories/GHSA-wgq4-4cfg-c4x3"
},
{
"name": "http://www.squid-cache.org/Versions/v5/SQUID-2023_10.patch",
"refsource": "MISC",
"url": "http://www.squid-cache.org/Versions/v5/SQUID-2023_10.patch"
},
{
"name": "http://www.squid-cache.org/Versions/v6/SQUID-2023_10.patch",
"refsource": "MISC",
"url": "http://www.squid-cache.org/Versions/v6/SQUID-2023_10.patch"
},
{
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/",
"refsource": "MISC",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/"
},
{
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/",
"refsource": "MISC",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/"
},
{
"name": "https://lists.debian.org/debian-lts-announce/2024/01/msg00003.html",
"refsource": "MISC",
"url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00003.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20240119-0005/",
"refsource": "MISC",
"url": "https://security.netapp.com/advisory/ntap-20240119-0005/"
}
]
},
"source": {
"advisory": "GHSA-wgq4-4cfg-c4x3",
"discovery": "UNKNOWN"
}
},
"nvd.nist.gov": {
"cve": {
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1137E216-6CAB-4EFD-9678-AF3BD48B1FA5",
"versionEndIncluding": "5.9",
"versionStartIncluding": "3.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C0CBB040-FF79-4CD5-B749-A50ADAD82571",
"versionEndIncluding": "6.5",
"versionStartIncluding": "6.0.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squid-cache:squid:2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "3AE100C3-0245-4305-B514-77D0572C2947",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squid-cache:squid:2.7:-:*:*:*:*:*:*",
"matchCriteriaId": "A4E50120-7298-4BC5-AC36-708EFCCFA1F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squid-cache:squid:2.7:stable1:*:*:*:*:*:*",
"matchCriteriaId": "01930746-6E15-445F-BD30-C4E83FA9AE25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squid-cache:squid:2.7:stable2:*:*:*:*:*:*",
"matchCriteriaId": "EFBB466C-C679-4B4B-87C2-E7853E5B3F04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squid-cache:squid:2.7:stable3:*:*:*:*:*:*",
"matchCriteriaId": "A03692DD-779F-4E3C-861C-29943870A816",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squid-cache:squid:2.7:stable4:*:*:*:*:*:*",
"matchCriteriaId": "79FF6B3C-A3CE-4AA2-80F9-44D05A6B2F08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squid-cache:squid:2.7:stable5:*:*:*:*:*:*",
"matchCriteriaId": "3CF6E367-D33B-4B60-8C40-4618C47D53E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squid-cache:squid:2.7:stable6:*:*:*:*:*:*",
"matchCriteriaId": "0FA1F4FE-629C-4489-A13C-017A824C840F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squid-cache:squid:2.7:stable7:*:*:*:*:*:*",
"matchCriteriaId": "2479C5BF-94E1-4153-9FA3-333BC00F01D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squid-cache:squid:2.7:stable8:*:*:*:*:*:*",
"matchCriteriaId": "8ABFCCCC-7584-466E-97CC-6EBD3934A70E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squid-cache:squid:2.7:stable9:*:*:*:*:*:*",
"matchCriteriaId": "F17E49BF-FB11-4EE6-B6AC-30914F381B2F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Squid is a caching proxy for the Web. Due to an Uncontrolled Recursion bug in versions 2.6 through 2.7.STABLE9, versions 3.1 through 5.9, and versions 6.0.1 through 6.5, Squid may be vulnerable to a Denial of Service attack against HTTP Request parsing. This problem allows a remote client to perform Denial of Service attack by sending a large X-Forwarded-For header when the follow_x_forwarded_for feature is configured. This bug is fixed by Squid version 6.6. In addition, patches addressing this problem for the stable releases can be found in Squid\u0027s patch archives."
},
{
"lang": "es",
"value": "Squid es un proxy de almacenamiento en cach\u00e9 para la Web. Debido a un error de recursi\u00f3n no controlada en las versiones 2.6 a 2.7.STABLE9, versiones 3.1 a 5.9 y versiones 6.0.1 a 6.5, Squid puede ser vulnerable a un ataque de denegaci\u00f3n de servicio contra el an\u00e1lisis de solicitudes HTTP. Este problema permite que un cliente remoto realice un ataque de denegaci\u00f3n de servicio enviando un encabezado X-Forwarded-For grande cuando la funci\u00f3n follow_x_forwarded_for est\u00e1 configurada. Este error se solucion\u00f3 con la versi\u00f3n 6.6 de Squid. Adem\u00e1s, los parches que solucionan este problema para las versiones estables se pueden encontrar en los archivos de parches de Squid."
}
],
"id": "CVE-2023-50269",
"lastModified": "2024-01-19T16:15:10.063",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0,
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2023-12-14T18:15:45.070",
"references": [
{
"source": "security-advisories@github.com",
"tags": [
"Broken Link"
],
"url": "http://www.squid-cache.org/Versions/v5/SQUID-2023_10.patch"
},
{
"source": "security-advisories@github.com",
"tags": [
"Broken Link"
],
"url": "http://www.squid-cache.org/Versions/v6/SQUID-2023_10.patch"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/squid-cache/squid/security/advisories/GHSA-wgq4-4cfg-c4x3"
},
{
"source": "security-advisories@github.com",
"url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00003.html"
},
{
"source": "security-advisories@github.com",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/"
},
{
"source": "security-advisories@github.com",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/"
},
{
"source": "security-advisories@github.com",
"url": "https://security.netapp.com/advisory/ntap-20240119-0005/"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-674"
}
],
"source": "security-advisories@github.com",
"type": "Primary"
}
]
}
}
}
}
OPENSUSE-SU-2024:13631-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:squid-6.6-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:squid-6.6-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:squid-6.6-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:squid-6.6-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:squid-6.6-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:squid-6.6-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:squid-6.6-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:squid-6.6-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:squid-6.6-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:squid-6.6-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:squid-6.6-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:squid-6.6-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:squid-6.6-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:squid-6.6-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:squid-6.6-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:squid-6.6-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:squid-6.6-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:squid-6.6-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:squid-6.6-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:squid-6.6-2.1.x86_64 | — |
Vendor Fix
|
| URL | Category |
|---|---|
| https://www.suse.com/support/security/rating/ | external |
| https://ftp.suse.com/pub/projects/security/csaf/o… | self |
| https://www.suse.com/security/cve/CVE-2023-49285/ | self |
| https://www.suse.com/security/cve/CVE-2023-49286/ | self |
| https://www.suse.com/security/cve/CVE-2023-49288/ | self |
| https://www.suse.com/security/cve/CVE-2023-50269/ | self |
| https://www.suse.com/security/cve/CVE-2024-23638/ | self |
| https://www.suse.com/security/cve/CVE-2023-49285 | external |
| https://bugzilla.suse.com/1217813 | external |
| https://www.suse.com/security/cve/CVE-2023-49286 | external |
| https://bugzilla.suse.com/1217815 | external |
| https://www.suse.com/security/cve/CVE-2023-49288 | external |
| https://bugzilla.suse.com/1217825 | external |
| https://www.suse.com/security/cve/CVE-2023-50269 | external |
| https://bugzilla.suse.com/1217654 | external |
| https://www.suse.com/security/cve/CVE-2024-23638 | external |
| https://bugzilla.suse.com/1219131 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "squid-6.6-2.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the squid-6.6-2.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-13631",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13631-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-49285 page",
"url": "https://www.suse.com/security/cve/CVE-2023-49285/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-49286 page",
"url": "https://www.suse.com/security/cve/CVE-2023-49286/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-49288 page",
"url": "https://www.suse.com/security/cve/CVE-2023-49288/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-50269 page",
"url": "https://www.suse.com/security/cve/CVE-2023-50269/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-23638 page",
"url": "https://www.suse.com/security/cve/CVE-2024-23638/"
}
],
"title": "squid-6.6-2.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:13631-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "squid-6.6-2.1.aarch64",
"product": {
"name": "squid-6.6-2.1.aarch64",
"product_id": "squid-6.6-2.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "squid-6.6-2.1.ppc64le",
"product": {
"name": "squid-6.6-2.1.ppc64le",
"product_id": "squid-6.6-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "squid-6.6-2.1.s390x",
"product": {
"name": "squid-6.6-2.1.s390x",
"product_id": "squid-6.6-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "squid-6.6-2.1.x86_64",
"product": {
"name": "squid-6.6-2.1.x86_64",
"product_id": "squid-6.6-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "squid-6.6-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:squid-6.6-2.1.aarch64"
},
"product_reference": "squid-6.6-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "squid-6.6-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:squid-6.6-2.1.ppc64le"
},
"product_reference": "squid-6.6-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "squid-6.6-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:squid-6.6-2.1.s390x"
},
"product_reference": "squid-6.6-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "squid-6.6-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:squid-6.6-2.1.x86_64"
},
"product_reference": "squid-6.6-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-49285",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-49285"
}
],
"notes": [
{
"category": "general",
"text": "Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a Buffer Overread bug Squid is vulnerable to a Denial of Service attack against Squid HTTP Message processing. This bug is fixed by Squid version 6.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:squid-6.6-2.1.aarch64",
"openSUSE Tumbleweed:squid-6.6-2.1.ppc64le",
"openSUSE Tumbleweed:squid-6.6-2.1.s390x",
"openSUSE Tumbleweed:squid-6.6-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-49285",
"url": "https://www.suse.com/security/cve/CVE-2023-49285"
},
{
"category": "external",
"summary": "SUSE Bug 1217813 for CVE-2023-49285",
"url": "https://bugzilla.suse.com/1217813"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:squid-6.6-2.1.aarch64",
"openSUSE Tumbleweed:squid-6.6-2.1.ppc64le",
"openSUSE Tumbleweed:squid-6.6-2.1.s390x",
"openSUSE Tumbleweed:squid-6.6-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:squid-6.6-2.1.aarch64",
"openSUSE Tumbleweed:squid-6.6-2.1.ppc64le",
"openSUSE Tumbleweed:squid-6.6-2.1.s390x",
"openSUSE Tumbleweed:squid-6.6-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-49285"
},
{
"cve": "CVE-2023-49286",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-49286"
}
],
"notes": [
{
"category": "general",
"text": "Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to an Incorrect Check of Function Return Value bug Squid is vulnerable to a Denial of Service attack against its Helper process management. This bug is fixed by Squid version 6.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:squid-6.6-2.1.aarch64",
"openSUSE Tumbleweed:squid-6.6-2.1.ppc64le",
"openSUSE Tumbleweed:squid-6.6-2.1.s390x",
"openSUSE Tumbleweed:squid-6.6-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-49286",
"url": "https://www.suse.com/security/cve/CVE-2023-49286"
},
{
"category": "external",
"summary": "SUSE Bug 1217815 for CVE-2023-49286",
"url": "https://bugzilla.suse.com/1217815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:squid-6.6-2.1.aarch64",
"openSUSE Tumbleweed:squid-6.6-2.1.ppc64le",
"openSUSE Tumbleweed:squid-6.6-2.1.s390x",
"openSUSE Tumbleweed:squid-6.6-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:squid-6.6-2.1.aarch64",
"openSUSE Tumbleweed:squid-6.6-2.1.ppc64le",
"openSUSE Tumbleweed:squid-6.6-2.1.s390x",
"openSUSE Tumbleweed:squid-6.6-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-49286"
},
{
"cve": "CVE-2023-49288",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-49288"
}
],
"notes": [
{
"category": "general",
"text": "Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Affected versions of squid are subject to a a Use-After-Free bug which can lead to a Denial of Service attack via collapsed forwarding. All versions of Squid from 3.5 up to and including 5.9 configured with \"collapsed_forwarding on\" are vulnerable. Configurations with \"collapsed_forwarding off\" or without a \"collapsed_forwarding\" directive are not vulnerable. This bug is fixed by Squid version 6.0.1. Users are advised to upgrade. Users unable to upgrade should remove all collapsed_forwarding lines from their squid.conf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:squid-6.6-2.1.aarch64",
"openSUSE Tumbleweed:squid-6.6-2.1.ppc64le",
"openSUSE Tumbleweed:squid-6.6-2.1.s390x",
"openSUSE Tumbleweed:squid-6.6-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-49288",
"url": "https://www.suse.com/security/cve/CVE-2023-49288"
},
{
"category": "external",
"summary": "SUSE Bug 1217825 for CVE-2023-49288",
"url": "https://bugzilla.suse.com/1217825"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:squid-6.6-2.1.aarch64",
"openSUSE Tumbleweed:squid-6.6-2.1.ppc64le",
"openSUSE Tumbleweed:squid-6.6-2.1.s390x",
"openSUSE Tumbleweed:squid-6.6-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:squid-6.6-2.1.aarch64",
"openSUSE Tumbleweed:squid-6.6-2.1.ppc64le",
"openSUSE Tumbleweed:squid-6.6-2.1.s390x",
"openSUSE Tumbleweed:squid-6.6-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-49288"
},
{
"cve": "CVE-2023-50269",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-50269"
}
],
"notes": [
{
"category": "general",
"text": "Squid is a caching proxy for the Web. Due to an Uncontrolled Recursion bug in versions 2.6 through 2.7.STABLE9, versions 3.1 through 5.9, and versions 6.0.1 through 6.5, Squid may be vulnerable to a Denial of Service attack against HTTP Request parsing. This problem allows a remote client to perform Denial of Service attack by sending a large X-Forwarded-For header when the follow_x_forwarded_for feature is configured. This bug is fixed by Squid version 6.6. In addition, patches addressing this problem for the stable releases can be found in Squid\u0027s patch archives.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:squid-6.6-2.1.aarch64",
"openSUSE Tumbleweed:squid-6.6-2.1.ppc64le",
"openSUSE Tumbleweed:squid-6.6-2.1.s390x",
"openSUSE Tumbleweed:squid-6.6-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-50269",
"url": "https://www.suse.com/security/cve/CVE-2023-50269"
},
{
"category": "external",
"summary": "SUSE Bug 1217654 for CVE-2023-50269",
"url": "https://bugzilla.suse.com/1217654"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:squid-6.6-2.1.aarch64",
"openSUSE Tumbleweed:squid-6.6-2.1.ppc64le",
"openSUSE Tumbleweed:squid-6.6-2.1.s390x",
"openSUSE Tumbleweed:squid-6.6-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:squid-6.6-2.1.aarch64",
"openSUSE Tumbleweed:squid-6.6-2.1.ppc64le",
"openSUSE Tumbleweed:squid-6.6-2.1.s390x",
"openSUSE Tumbleweed:squid-6.6-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-50269"
},
{
"cve": "CVE-2024-23638",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-23638"
}
],
"notes": [
{
"category": "general",
"text": "Squid is a caching proxy for the Web. Due to an expired pointer reference bug, Squid prior to version 6.6 is vulnerable to a Denial of Service attack against Cache Manager error responses. This problem allows a trusted client to perform Denial of Service when generating error pages for Client Manager reports. Squid older than 5.0.5 have not been tested and should be assumed to be vulnerable. All Squid-5.x up to and including 5.9 are vulnerable. All Squid-6.x up to and including 6.5 are vulnerable. This bug is fixed by Squid version 6.6. In addition, patches addressing this problem for the stable releases can be found in Squid\u0027s patch archives. As a workaround, prevent access to Cache Manager using Squid\u0027s main access control: `http_access deny manager`.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:squid-6.6-2.1.aarch64",
"openSUSE Tumbleweed:squid-6.6-2.1.ppc64le",
"openSUSE Tumbleweed:squid-6.6-2.1.s390x",
"openSUSE Tumbleweed:squid-6.6-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-23638",
"url": "https://www.suse.com/security/cve/CVE-2024-23638"
},
{
"category": "external",
"summary": "SUSE Bug 1219131 for CVE-2024-23638",
"url": "https://bugzilla.suse.com/1219131"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:squid-6.6-2.1.aarch64",
"openSUSE Tumbleweed:squid-6.6-2.1.ppc64le",
"openSUSE Tumbleweed:squid-6.6-2.1.s390x",
"openSUSE Tumbleweed:squid-6.6-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:squid-6.6-2.1.aarch64",
"openSUSE Tumbleweed:squid-6.6-2.1.ppc64le",
"openSUSE Tumbleweed:squid-6.6-2.1.s390x",
"openSUSE Tumbleweed:squid-6.6-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-23638"
}
]
}
RHSA-2024:0397
Vulnerability from csaf_redhat - Published: 2024-01-24 12:28 - Updated: 2026-03-18 02:30A flaw was found in Squid. The limits applied for validation of HTTP response headers are applied before caching. However, Squid may grow a cached HTTP response header beyond the configured maximum size, causing a stall or crash of the worker process when a large header is retrieved from the disk cache, resulting in a denial of service.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.src::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.src::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
A flaw was found in Squid. Due to an improper validation of the specified index bug, Squid compiled using `--with-openssl` is vulnerable to a denial of service attack against SSL Certificate validation. This flaw allows a remote server to perform a denial of service against the Squid Proxy by initiating a TLS Handshake with a specially crafted SSL Certificate in a server certificate chain. This attack is limited to HTTPS and SSL-Bump.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.src::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.src::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a NULL pointer dereference bug Squid is vulnerable to a Denial of Service attack against Squid's Gopher gateway. The gopher protocol is always available and enabled in Squid. This issue may lead to a remote denial of service via gopher URL requests.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.src::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.src::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
A buffer over-read flaw was found in Squid's HTTP Message processing feature. This issue may allow attackers to perform remote denial of service.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.src::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.src::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
A flaw was found in Squid due to an incorrect check of the return value in the helper process management. This issue may allow attackers to perform remote denial of service.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.src::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.src::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
A flaw was found in Squid, which is susceptible to a Denial of Service (DoS) due to an Uncontrolled Recursion bug, specifically targeting HTTP Request parsing. Exploiting this issue involves a remote client initiating a DoS attack by sending an oversized X-Forwarded-For header when the follow_x_forwarded_for feature is configured. This issue poses a threat to the stability and availability of the Squid service.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.src::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.src::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
A heap-based buffer overflow flaw was found in the Squid caching proxy. When processing the Uniform Resource Name (URNs), specific conditions can lead to remote code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.src::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.src::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4 | — |
Vendor Fix
fix
Workaround
|
| URL | Category |
|---|---|
| https://access.redhat.com/errata/RHSA-2024:0397 | self |
| https://access.redhat.com/security/updates/classi… | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2245914 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2247567 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2248521 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2252923 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2252926 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2254663 | external |
| https://security.access.redhat.com/data/csaf/v2/a… | self |
| https://access.redhat.com/security/cve/CVE-2023-5824 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2245914 | external |
| https://www.cve.org/CVERecord?id=CVE-2023-5824 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2023-5824 | external |
| https://github.com/squid-cache/squid/security/adv… | external |
| https://access.redhat.com/security/cve/CVE-2023-46724 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2247567 | external |
| https://www.cve.org/CVERecord?id=CVE-2023-46724 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2023-46724 | external |
| http://www.squid-cache.org/Versions/v5/SQUID-2023… | external |
| http://www.squid-cache.org/Versions/v6/SQUID-2023… | external |
| https://github.com/squid-cache/squid/commit/b70f8… | external |
| https://github.com/squid-cache/squid/security/adv… | external |
| https://access.redhat.com/security/cve/CVE-2023-46728 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2248521 | external |
| https://www.cve.org/CVERecord?id=CVE-2023-46728 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2023-46728 | external |
| https://github.com/squid-cache/squid/security/adv… | external |
| https://megamansec.github.io/Squid-Security-Audit… | external |
| https://access.redhat.com/security/cve/CVE-2023-49285 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2252926 | external |
| https://www.cve.org/CVERecord?id=CVE-2023-49285 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2023-49285 | external |
| https://access.redhat.com/security/cve/CVE-2023-49286 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2252923 | external |
| https://www.cve.org/CVERecord?id=CVE-2023-49286 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2023-49286 | external |
| https://access.redhat.com/security/cve/CVE-2023-50269 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2254663 | external |
| https://www.cve.org/CVERecord?id=CVE-2023-50269 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2023-50269 | external |
| http://www.squid-cache.org/Versions/v5/SQUID-2023… | external |
| http://www.squid-cache.org/Versions/v6/SQUID-2023… | external |
| https://github.com/squid-cache/squid/security/adv… | external |
| https://access.redhat.com/security/cve/CVE-2025-54574 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2386026 | external |
| https://www.cve.org/CVERecord?id=CVE-2025-54574 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2025-54574 | external |
| https://github.com/squid-cache/squid/commit/a27bf… | external |
| https://github.com/squid-cache/squid/releases/tag… | external |
| https://github.com/squid-cache/squid/security/adv… | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the squid:4 module is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Squid is a high-performance proxy caching server for web clients, supporting FTP, and HTTP data objects.\n\nSecurity Fix(es):\n\n* squid: DoS against HTTP and HTTPS (CVE-2023-5824)\n\n* squid: Denial of Service in SSL Certificate validation (CVE-2023-46724)\n\n* squid: NULL pointer dereference in the gopher protocol code (CVE-2023-46728)\n\n* squid: Buffer over-read in the HTTP Message processing feature (CVE-2023-49285)\n\n* squid: Incorrect Check of Function Return Value In Helper Process management (CVE-2023-49286)\n\n* squid: denial of service in HTTP request parsing (CVE-2023-50269)\n\nBug Fix(es):\n\n* squid crashes in assertion when a parent peer exists (JIRA:RHEL-18256)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:0397",
"url": "https://access.redhat.com/errata/RHSA-2024:0397"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2245914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2245914"
},
{
"category": "external",
"summary": "2247567",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2247567"
},
{
"category": "external",
"summary": "2248521",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248521"
},
{
"category": "external",
"summary": "2252923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2252923"
},
{
"category": "external",
"summary": "2252926",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2252926"
},
{
"category": "external",
"summary": "2254663",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254663"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0397.json"
}
],
"title": "Red Hat Security Advisory: squid:4 security update",
"tracking": {
"current_release_date": "2026-03-18T02:30:08+00:00",
"generator": {
"date": "2026-03-18T02:30:08+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2024:0397",
"initial_release_date": "2024-01-24T12:28:13+00:00",
"revision_history": [
{
"date": "2024-01-24T12:28:13+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-01-24T12:28:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-18T02:30:08+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.src::squid:4",
"product": {
"name": "libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.src (squid:4)",
"product_id": "libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.src::squid:4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libecap@1.0.1-2.module%2Bel8.1.0%2B4044%2B36416a77?arch=src\u0026rpmmod=squid:4:8080020231222130009:63b34585"
}
}
},
{
"category": "product_version",
"name": "squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.src::squid:4",
"product": {
"name": "squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.src (squid:4)",
"product_id": "squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.src::squid:4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/squid@4.15-6.module%2Bel8.8.0%2B21068%2B0ecbc070.3?arch=src\u0026epoch=7\u0026rpmmod=squid:4:8080020231222130009:63b34585"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"product": {
"name": "libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64 (squid:4)",
"product_id": "libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libecap@1.0.1-2.module%2Bel8.1.0%2B4044%2B36416a77?arch=aarch64\u0026rpmmod=squid:4:8080020231222130009:63b34585"
}
}
},
{
"category": "product_version",
"name": "libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"product": {
"name": "libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64 (squid:4)",
"product_id": "libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libecap-debuginfo@1.0.1-2.module%2Bel8.1.0%2B4044%2B36416a77?arch=aarch64\u0026rpmmod=squid:4:8080020231222130009:63b34585"
}
}
},
{
"category": "product_version",
"name": "libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"product": {
"name": "libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64 (squid:4)",
"product_id": "libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libecap-debugsource@1.0.1-2.module%2Bel8.1.0%2B4044%2B36416a77?arch=aarch64\u0026rpmmod=squid:4:8080020231222130009:63b34585"
}
}
},
{
"category": "product_version",
"name": "libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"product": {
"name": "libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64 (squid:4)",
"product_id": "libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libecap-devel@1.0.1-2.module%2Bel8.1.0%2B4044%2B36416a77?arch=aarch64\u0026rpmmod=squid:4:8080020231222130009:63b34585"
}
}
},
{
"category": "product_version",
"name": "squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"product": {
"name": "squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64 (squid:4)",
"product_id": "squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/squid@4.15-6.module%2Bel8.8.0%2B21068%2B0ecbc070.3?arch=aarch64\u0026epoch=7\u0026rpmmod=squid:4:8080020231222130009:63b34585"
}
}
},
{
"category": "product_version",
"name": "squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"product": {
"name": "squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64 (squid:4)",
"product_id": "squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/squid-debuginfo@4.15-6.module%2Bel8.8.0%2B21068%2B0ecbc070.3?arch=aarch64\u0026epoch=7\u0026rpmmod=squid:4:8080020231222130009:63b34585"
}
}
},
{
"category": "product_version",
"name": "squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"product": {
"name": "squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64 (squid:4)",
"product_id": "squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/squid-debugsource@4.15-6.module%2Bel8.8.0%2B21068%2B0ecbc070.3?arch=aarch64\u0026epoch=7\u0026rpmmod=squid:4:8080020231222130009:63b34585"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"product": {
"name": "libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le (squid:4)",
"product_id": "libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libecap@1.0.1-2.module%2Bel8.1.0%2B4044%2B36416a77?arch=ppc64le\u0026rpmmod=squid:4:8080020231222130009:63b34585"
}
}
},
{
"category": "product_version",
"name": "libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"product": {
"name": "libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le (squid:4)",
"product_id": "libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libecap-debuginfo@1.0.1-2.module%2Bel8.1.0%2B4044%2B36416a77?arch=ppc64le\u0026rpmmod=squid:4:8080020231222130009:63b34585"
}
}
},
{
"category": "product_version",
"name": "libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"product": {
"name": "libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le (squid:4)",
"product_id": "libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libecap-debugsource@1.0.1-2.module%2Bel8.1.0%2B4044%2B36416a77?arch=ppc64le\u0026rpmmod=squid:4:8080020231222130009:63b34585"
}
}
},
{
"category": "product_version",
"name": "libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"product": {
"name": "libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le (squid:4)",
"product_id": "libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libecap-devel@1.0.1-2.module%2Bel8.1.0%2B4044%2B36416a77?arch=ppc64le\u0026rpmmod=squid:4:8080020231222130009:63b34585"
}
}
},
{
"category": "product_version",
"name": "squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"product": {
"name": "squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le (squid:4)",
"product_id": "squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/squid@4.15-6.module%2Bel8.8.0%2B21068%2B0ecbc070.3?arch=ppc64le\u0026epoch=7\u0026rpmmod=squid:4:8080020231222130009:63b34585"
}
}
},
{
"category": "product_version",
"name": "squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"product": {
"name": "squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le (squid:4)",
"product_id": "squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/squid-debuginfo@4.15-6.module%2Bel8.8.0%2B21068%2B0ecbc070.3?arch=ppc64le\u0026epoch=7\u0026rpmmod=squid:4:8080020231222130009:63b34585"
}
}
},
{
"category": "product_version",
"name": "squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"product": {
"name": "squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le (squid:4)",
"product_id": "squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/squid-debugsource@4.15-6.module%2Bel8.8.0%2B21068%2B0ecbc070.3?arch=ppc64le\u0026epoch=7\u0026rpmmod=squid:4:8080020231222130009:63b34585"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"product": {
"name": "libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x (squid:4)",
"product_id": "libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libecap@1.0.1-2.module%2Bel8.1.0%2B4044%2B36416a77?arch=s390x\u0026rpmmod=squid:4:8080020231222130009:63b34585"
}
}
},
{
"category": "product_version",
"name": "libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"product": {
"name": "libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x (squid:4)",
"product_id": "libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libecap-debuginfo@1.0.1-2.module%2Bel8.1.0%2B4044%2B36416a77?arch=s390x\u0026rpmmod=squid:4:8080020231222130009:63b34585"
}
}
},
{
"category": "product_version",
"name": "libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"product": {
"name": "libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x (squid:4)",
"product_id": "libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libecap-debugsource@1.0.1-2.module%2Bel8.1.0%2B4044%2B36416a77?arch=s390x\u0026rpmmod=squid:4:8080020231222130009:63b34585"
}
}
},
{
"category": "product_version",
"name": "libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"product": {
"name": "libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x (squid:4)",
"product_id": "libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libecap-devel@1.0.1-2.module%2Bel8.1.0%2B4044%2B36416a77?arch=s390x\u0026rpmmod=squid:4:8080020231222130009:63b34585"
}
}
},
{
"category": "product_version",
"name": "squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"product": {
"name": "squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x (squid:4)",
"product_id": "squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/squid@4.15-6.module%2Bel8.8.0%2B21068%2B0ecbc070.3?arch=s390x\u0026epoch=7\u0026rpmmod=squid:4:8080020231222130009:63b34585"
}
}
},
{
"category": "product_version",
"name": "squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"product": {
"name": "squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x (squid:4)",
"product_id": "squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/squid-debuginfo@4.15-6.module%2Bel8.8.0%2B21068%2B0ecbc070.3?arch=s390x\u0026epoch=7\u0026rpmmod=squid:4:8080020231222130009:63b34585"
}
}
},
{
"category": "product_version",
"name": "squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"product": {
"name": "squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x (squid:4)",
"product_id": "squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/squid-debugsource@4.15-6.module%2Bel8.8.0%2B21068%2B0ecbc070.3?arch=s390x\u0026epoch=7\u0026rpmmod=squid:4:8080020231222130009:63b34585"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"product": {
"name": "libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64 (squid:4)",
"product_id": "libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libecap@1.0.1-2.module%2Bel8.1.0%2B4044%2B36416a77?arch=x86_64\u0026rpmmod=squid:4:8080020231222130009:63b34585"
}
}
},
{
"category": "product_version",
"name": "libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"product": {
"name": "libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64 (squid:4)",
"product_id": "libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libecap-debuginfo@1.0.1-2.module%2Bel8.1.0%2B4044%2B36416a77?arch=x86_64\u0026rpmmod=squid:4:8080020231222130009:63b34585"
}
}
},
{
"category": "product_version",
"name": "libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"product": {
"name": "libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64 (squid:4)",
"product_id": "libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libecap-debugsource@1.0.1-2.module%2Bel8.1.0%2B4044%2B36416a77?arch=x86_64\u0026rpmmod=squid:4:8080020231222130009:63b34585"
}
}
},
{
"category": "product_version",
"name": "libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"product": {
"name": "libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64 (squid:4)",
"product_id": "libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libecap-devel@1.0.1-2.module%2Bel8.1.0%2B4044%2B36416a77?arch=x86_64\u0026rpmmod=squid:4:8080020231222130009:63b34585"
}
}
},
{
"category": "product_version",
"name": "squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"product": {
"name": "squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64 (squid:4)",
"product_id": "squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/squid@4.15-6.module%2Bel8.8.0%2B21068%2B0ecbc070.3?arch=x86_64\u0026epoch=7\u0026rpmmod=squid:4:8080020231222130009:63b34585"
}
}
},
{
"category": "product_version",
"name": "squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"product": {
"name": "squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64 (squid:4)",
"product_id": "squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/squid-debuginfo@4.15-6.module%2Bel8.8.0%2B21068%2B0ecbc070.3?arch=x86_64\u0026epoch=7\u0026rpmmod=squid:4:8080020231222130009:63b34585"
}
}
},
{
"category": "product_version",
"name": "squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"product": {
"name": "squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64 (squid:4)",
"product_id": "squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/squid-debugsource@4.15-6.module%2Bel8.8.0%2B21068%2B0ecbc070.3?arch=x86_64\u0026epoch=7\u0026rpmmod=squid:4:8080020231222130009:63b34585"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64 (squid:4) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4"
},
"product_reference": "libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le (squid:4) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4"
},
"product_reference": "libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x (squid:4) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4"
},
"product_reference": "libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.src (squid:4) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.src::squid:4"
},
"product_reference": "libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.src::squid:4",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64 (squid:4) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4"
},
"product_reference": "libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64 (squid:4) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4"
},
"product_reference": "libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le (squid:4) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4"
},
"product_reference": "libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x (squid:4) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4"
},
"product_reference": "libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64 (squid:4) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4"
},
"product_reference": "libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64 (squid:4) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4"
},
"product_reference": "libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le (squid:4) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4"
},
"product_reference": "libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x (squid:4) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4"
},
"product_reference": "libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64 (squid:4) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4"
},
"product_reference": "libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64 (squid:4) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4"
},
"product_reference": "libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le (squid:4) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4"
},
"product_reference": "libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x (squid:4) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4"
},
"product_reference": "libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64 (squid:4) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4"
},
"product_reference": "libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64 (squid:4) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4"
},
"product_reference": "squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le (squid:4) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4"
},
"product_reference": "squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x (squid:4) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4"
},
"product_reference": "squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.src (squid:4) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.src::squid:4"
},
"product_reference": "squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.src::squid:4",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64 (squid:4) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4"
},
"product_reference": "squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64 (squid:4) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4"
},
"product_reference": "squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le (squid:4) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4"
},
"product_reference": "squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x (squid:4) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4"
},
"product_reference": "squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64 (squid:4) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4"
},
"product_reference": "squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64 (squid:4) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4"
},
"product_reference": "squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le (squid:4) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4"
},
"product_reference": "squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x (squid:4) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4"
},
"product_reference": "squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64 (squid:4) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4"
},
"product_reference": "squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-5824",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"discovery_date": "2023-10-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2245914"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Squid. The limits applied for validation of HTTP response headers are applied before caching. However, Squid may grow a cached HTTP response header beyond the configured maximum size, causing a stall or crash of the worker process when a large header is retrieved from the disk cache, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "squid: DoS against HTTP and HTTPS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability only affects configurations with the `cache_dir` directive enabled. If this directive is not enabled, the Squid server is not vulnerable and no further mitigation is needed. For more information about the mitigation, see the mitigation section below.\n\nThe `cache_dir` directive is disabled by default in Squid shipped in Red Hat Enterprise Linux 6, 7, 8 and 9. Therefore, these Red Hat Enterprise Linux versions are not vulnerable with the default configuration.\n\nRed Hat is not planning to address this issue in Red Hat Enterprise Linux 6 and 7 due to the changes required and the magnitude of the differences between Squid 3 and 4 code bases, backporting the changes to the Squid 3 code base has not been feasible.\n\nWe recommend that customers using Squid as a caching proxy on Red Hat Enterprise Linux 6 and 7 to upgrade to Red Hat Enterprise Linux 8 and 9 to use Squid version 4 or version 5, respectively. Alternatively, see the mitigation section below for a way to workaround this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.src::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.src::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-5824"
},
{
"category": "external",
"summary": "RHBZ#2245914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2245914"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-5824",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5824"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-5824",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5824"
},
{
"category": "external",
"summary": "https://github.com/squid-cache/squid/security/advisories/GHSA-543m-w2m2-g255",
"url": "https://github.com/squid-cache/squid/security/advisories/GHSA-543m-w2m2-g255"
}
],
"release_date": "2023-10-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-24T12:28:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, the squid service will be restarted automatically.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.src::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.src::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0397"
},
{
"category": "workaround",
"details": "Disabling the disk caching mechanism will mitigate this vulnerability. To achieve this, remove all the \u0027cache_dir\u0027 directives from the Squid configuration, typically in the /etc/squid/squid.conf file.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.src::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.src::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.src::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.src::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "squid: DoS against HTTP and HTTPS"
},
{
"cve": "CVE-2023-46724",
"cwe": {
"id": "CWE-823",
"name": "Use of Out-of-range Pointer Offset"
},
"discovery_date": "2023-11-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2247567"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Squid. Due to an improper validation of the specified index bug, Squid compiled using `--with-openssl` is vulnerable to a denial of service attack against SSL Certificate validation. This flaw allows a remote server to perform a denial of service against the Squid Proxy by initiating a TLS Handshake with a specially crafted SSL Certificate in a server certificate chain. This attack is limited to HTTPS and SSL-Bump.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "squid: Denial of Service in SSL Certificate validation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.src::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.src::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-46724"
},
{
"category": "external",
"summary": "RHBZ#2247567",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2247567"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-46724",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46724"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-46724",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46724"
},
{
"category": "external",
"summary": "http://www.squid-cache.org/Versions/v5/SQUID-2023_4.patch",
"url": "http://www.squid-cache.org/Versions/v5/SQUID-2023_4.patch"
},
{
"category": "external",
"summary": "http://www.squid-cache.org/Versions/v6/SQUID-2023_4.patch",
"url": "http://www.squid-cache.org/Versions/v6/SQUID-2023_4.patch"
},
{
"category": "external",
"summary": "https://github.com/squid-cache/squid/commit/b70f864940225dfe69f9f653f948e787f99c3810",
"url": "https://github.com/squid-cache/squid/commit/b70f864940225dfe69f9f653f948e787f99c3810"
},
{
"category": "external",
"summary": "https://github.com/squid-cache/squid/security/advisories/GHSA-73m6-jm96-c6r3",
"url": "https://github.com/squid-cache/squid/security/advisories/GHSA-73m6-jm96-c6r3"
}
],
"release_date": "2023-11-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-24T12:28:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, the squid service will be restarted automatically.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.src::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.src::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0397"
},
{
"category": "workaround",
"details": "Disable the use of SSL-Bump features:\n- Remove all ssl-bump options from http_port and https_port\n- Remove all ssl_bump directives from squid.conf",
"product_ids": [
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.src::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.src::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.src::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.src::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "squid: Denial of Service in SSL Certificate validation"
},
{
"cve": "CVE-2023-46728",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2023-11-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2248521"
}
],
"notes": [
{
"category": "description",
"text": "Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a NULL pointer dereference bug Squid is vulnerable to a Denial of Service attack against Squid\u0027s Gopher gateway. The gopher protocol is always available and enabled in Squid. This issue may lead to a remote denial of service via gopher URL requests.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "squid: NULL pointer dereference in the gopher protocol code",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.src::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.src::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-46728"
},
{
"category": "external",
"summary": "RHBZ#2248521",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248521"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-46728",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-46728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46728"
},
{
"category": "external",
"summary": "https://github.com/squid-cache/squid/security/advisories/GHSA-cg5h-v6vc-w33f",
"url": "https://github.com/squid-cache/squid/security/advisories/GHSA-cg5h-v6vc-w33f"
},
{
"category": "external",
"summary": "https://megamansec.github.io/Squid-Security-Audit/gopher-nullpointer.html",
"url": "https://megamansec.github.io/Squid-Security-Audit/gopher-nullpointer.html"
}
],
"release_date": "2023-09-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-24T12:28:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, the squid service will be restarted automatically.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.src::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.src::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0397"
},
{
"category": "workaround",
"details": "To mitigate this issue, create an access list configuration to reject all gopher URL requests:\n\nSet ACL directives in your squid.conf file (or equivalent) as follows:\nacl gopher proto gopher\nhttp_access deny gopher\n\nImportant: This sequence must be placed above any lines starting with \"http_access allow\" in your configuration.\nObservation: Some loss of performance may occur with this configuration.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.src::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.src::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.src::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.src::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "squid: NULL pointer dereference in the gopher protocol code"
},
{
"cve": "CVE-2023-49285",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"discovery_date": "2023-12-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2252926"
}
],
"notes": [
{
"category": "description",
"text": "A buffer over-read flaw was found in Squid\u0027s HTTP Message processing feature. This issue may allow attackers to perform remote denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "squid: Buffer over-read in the HTTP Message processing feature",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The only security impact of this vulnerability is a remote denial of service. For this reason, this flaw was rated with an important, and not critical, severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.src::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.src::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-49285"
},
{
"category": "external",
"summary": "RHBZ#2252926",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2252926"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-49285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49285"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-49285",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-49285"
}
],
"release_date": "2023-12-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-24T12:28:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, the squid service will be restarted automatically.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.src::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.src::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0397"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.src::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.src::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.src::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.src::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "squid: Buffer over-read in the HTTP Message processing feature"
},
{
"cve": "CVE-2023-49286",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"discovery_date": "2023-12-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2252923"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Squid due to an incorrect check of the return value in the helper process management. This issue may allow attackers to perform remote denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "squid: Incorrect Check of Function Return Value In Helper Process management",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The only security impact of this vulnerability is a remote denial of service. For this reason, this flaw was rated with an important, and not critical, severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.src::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.src::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-49286"
},
{
"category": "external",
"summary": "RHBZ#2252923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2252923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-49286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49286"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-49286",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-49286"
}
],
"release_date": "2023-12-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-24T12:28:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, the squid service will be restarted automatically.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.src::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.src::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0397"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.src::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.src::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.src::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.src::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "squid: Incorrect Check of Function Return Value In Helper Process management"
},
{
"cve": "CVE-2023-50269",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2023-12-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2254663"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Squid, which is susceptible to a Denial of Service (DoS) due to an Uncontrolled Recursion bug, specifically targeting HTTP Request parsing. Exploiting this issue involves a remote client initiating a DoS attack by sending an oversized X-Forwarded-For header when the follow_x_forwarded_for feature is configured. This issue poses a threat to the stability and availability of the Squid service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "squid: denial of service in HTTP request parsing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Squid configurations lacking the \"follow_x_forwarded_for\" setting are not susceptible to the vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.src::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.src::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-50269"
},
{
"category": "external",
"summary": "RHBZ#2254663",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254663"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-50269",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50269"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-50269",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-50269"
},
{
"category": "external",
"summary": "http://www.squid-cache.org/Versions/v5/SQUID-2023_10.patch",
"url": "http://www.squid-cache.org/Versions/v5/SQUID-2023_10.patch"
},
{
"category": "external",
"summary": "http://www.squid-cache.org/Versions/v6/SQUID-2023_10.patch",
"url": "http://www.squid-cache.org/Versions/v6/SQUID-2023_10.patch"
},
{
"category": "external",
"summary": "https://github.com/squid-cache/squid/security/advisories/GHSA-wgq4-4cfg-c4x3",
"url": "https://github.com/squid-cache/squid/security/advisories/GHSA-wgq4-4cfg-c4x3"
}
],
"release_date": "2023-12-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-24T12:28:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, the squid service will be restarted automatically.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.src::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.src::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0397"
},
{
"category": "workaround",
"details": "Remove all \"follow_x_forwarded_for\" lines from squid.conf.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.src::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.src::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.src::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.src::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "squid: denial of service in HTTP request parsing"
},
{
"cve": "CVE-2025-54574",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2025-08-01T19:01:04.741560+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2386026"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow flaw was found in the Squid caching proxy. When processing the Uniform Resource Name (URNs), specific conditions can lead to remote code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "squid-cache: Squid Buffer Overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is Important because the heap-based buffer overflow occurs during URN processing in Squid\u2019s core request-handling path, which is exposed to untrusted, remote input. Unlike flaws that merely cause a service crash, this defect allows an attacker to manipulate heap memory structures, potentially achieving arbitrary code execution within the Squid process context. Since Squid often runs with elevated privileges and serves as a gateway between internal and external networks, successful exploitation could provide a remote attacker with direct control over the proxy server, enabling them to pivot into internal systems, intercept sensitive traffic, or alter cached content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.src::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.src::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-54574"
},
{
"category": "external",
"summary": "RHBZ#2386026",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2386026"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-54574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54574"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-54574",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54574"
},
{
"category": "external",
"summary": "https://github.com/squid-cache/squid/commit/a27bf4b84da23594150c7a86a23435df0b35b988",
"url": "https://github.com/squid-cache/squid/commit/a27bf4b84da23594150c7a86a23435df0b35b988"
},
{
"category": "external",
"summary": "https://github.com/squid-cache/squid/releases/tag/SQUID_6_4",
"url": "https://github.com/squid-cache/squid/releases/tag/SQUID_6_4"
},
{
"category": "external",
"summary": "https://github.com/squid-cache/squid/security/advisories/GHSA-w4gv-vw3f-29g3",
"url": "https://github.com/squid-cache/squid/security/advisories/GHSA-w4gv-vw3f-29g3"
}
],
"release_date": "2025-08-01T18:02:19.117000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-24T12:28:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, the squid service will be restarted automatically.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.src::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.src::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0397"
},
{
"category": "workaround",
"details": "Users can disable URN access permissions to mitigate this issue.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.src::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.src::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.9,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.src::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debuginfo-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-debugsource-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:libecap-devel-0:1.0.1-2.module+el8.1.0+4044+36416a77.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.src::squid:4",
"AppStream-8.8.0.Z.EUS:squid-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debuginfo-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.aarch64::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.ppc64le::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.s390x::squid:4",
"AppStream-8.8.0.Z.EUS:squid-debugsource-7:4.15-6.module+el8.8.0+21068+0ecbc070.3.x86_64::squid:4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "squid-cache: Squid Buffer Overflow"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.