Oracle Linux Security Advisory ELSA-2024-1787

https://linux.oracle.com/errata/ELSA-2024-1787.html

The following updated rpms for Oracle Linux 7 have been uploaded to the Unbreakable Linux Network:

aarch64:
squid-3.5.20-17.0.1.el7_9.10.aarch64.rpm
squid-migration-script-3.5.20-17.0.1.el7_9.10.aarch64.rpm
squid-sysvinit-3.5.20-17.0.1.el7_9.10.aarch64.rpm


SRPMS:
https://oss.oracle.com:443/ol7/SRPMS-updates//squid-3.5.20-17.0.1.el7_9.10.src.rpm

Related CVEs:

CVE-2023-46724
CVE-2023-46728
CVE-2023-49285
CVE-2023-49286
CVE-2023-50269
CVE-2024-25617




Description of changes:

[7:3.5.20-17.0.1]
- Mutiple CVE fixes for squid [Orabug: 33146289]
- Resolves: CVE-2021-28651 squid: Bug 5104: Memory leak in RFC 2169 response parsing (#778)
- Resolves: CVE-2021-28652 squid: Bug 5106: Broken cache manager URL parsing (#788)
- Resolves: CVE-2021-31806,31807,31808 squid: Handle more Range requests (#790)
- Resolves: CVE-2021-33620 squid: Handle more partial responses (#791)

[7:3.5.20-17.10]
- Resolves: RHEL-16779 - squid: NULL pointer dereference in the gopher protocol
  code -- Remove support for Gopher protocol (CVE-2023-46728)
- Resolves: RHEL-18176 - squid: Buffer over-read in the HTTP Message processing
  feature (CVE-2023-49285)
- Resolves: RHEL-18171 - squid: Incorrect Check of Function Return Value In
  Helper Process management (CVE-2023-49286)
- Resolves: RHEL-16758 - squid: Denial of Service in SSL Certificate validation
  (CVE-2023-46724)
- Resolves: RHEL-19557 - squid: denial of service in HTTP request parsing
  (CVE-2023-50269)
- Resolves: RHEL-26082 - squid: denial of service in HTTP header parser
  (CVE-2024-25617)

_______________________________________________
El-errata mailing list
El-errata@oss.oracle.com
https://oss.oracle.com/mailman/listinfo/el-errata

Oracle7: ELSA-2024-1787: squid security Important (aarch64) Security Advisory Updates

The following updated rpms for Oracle Linux 7 have been uploaded to the Unbreakable Linux Network:

Summary

[7:3.5.20-17.0.1] - Mutiple CVE fixes for squid [Orabug: 33146289] - Resolves: CVE-2021-28651 squid: Bug 5104: Memory leak in RFC 2169 response parsing (#778) - Resolves: CVE-2021-28652 squid: Bug 5106: Broken cache manager URL parsing (#788) - Resolves: CVE-2021-31806,31807,31808 squid: Handle more Range requests (#790) - Resolves: CVE-2021-33620 squid: Handle more partial responses (#791) [7:3.5.20-17.10] - Resolves: RHEL-16779 - squid: NULL pointer dereference in the gopher protocol code -- Remove support for Gopher protocol (CVE-2023-46728) - Resolves: RHEL-18176 - squid: Buffer over-read in the HTTP Message processing feature (CVE-2023-49285) - Resolves: RHEL-18171 - squid: Incorrect Check of Function Return Value In Helper Process management (CVE-2023-49286) - Resolves: RHEL-16758 - squid: Denial of Service in SSL Certificate validation (CVE-2023-46724) - Resolves: RHEL-19557 - squid: denial of service in HTTP request parsing (CVE-2023-50269) - Resolves: RHEL-26082 - squid: denial of service in HTTP header parser (CVE-2024-25617)

SRPMs

https://oss.oracle.com:443/ol7/SRPMS-updates//squid-3.5.20-17.0.1.el7_9.10.src.rpm

x86_64

aarch64

squid-3.5.20-17.0.1.el7_9.10.aarch64.rpm squid-migration-script-3.5.20-17.0.1.el7_9.10.aarch64.rpm squid-sysvinit-3.5.20-17.0.1.el7_9.10.aarch64.rpm

i386

Severity
Related CVEs: CVE-2023-46724 CVE-2023-46728 CVE-2023-49285 CVE-2023-49286 CVE-2023-50269 CVE-2024-25617

Related News