First published: Wed Jan 03 2024(Updated: )
Important: squid:4 security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/libecap | <1.0.1-2.module+el8.9.0+19703+a1da7223 | 1.0.1-2.module+el8.9.0+19703+a1da7223 |
redhat/squid | <4.15-7.module+el8.9.0+20975+25f17541.5 | 4.15-7.module+el8.9.0+20975+25f17541.5 |
redhat/libecap | <1.0.1-2.module+el8.9.0+19703+a1da7223 | 1.0.1-2.module+el8.9.0+19703+a1da7223 |
redhat/libecap-debuginfo | <1.0.1-2.module+el8.9.0+19703+a1da7223 | 1.0.1-2.module+el8.9.0+19703+a1da7223 |
redhat/libecap-debugsource | <1.0.1-2.module+el8.9.0+19703+a1da7223 | 1.0.1-2.module+el8.9.0+19703+a1da7223 |
redhat/libecap-devel | <1.0.1-2.module+el8.9.0+19703+a1da7223 | 1.0.1-2.module+el8.9.0+19703+a1da7223 |
redhat/squid | <4.15-7.module+el8.9.0+20975+25f17541.5 | 4.15-7.module+el8.9.0+20975+25f17541.5 |
redhat/squid-debuginfo | <4.15-7.module+el8.9.0+20975+25f17541.5 | 4.15-7.module+el8.9.0+20975+25f17541.5 |
redhat/squid-debugsource | <4.15-7.module+el8.9.0+20975+25f17541.5 | 4.15-7.module+el8.9.0+20975+25f17541.5 |
redhat/libecap-debuginfo | <1.0.1-2.module+el8.9.0+19703+a1da7223 | 1.0.1-2.module+el8.9.0+19703+a1da7223 |
redhat/libecap-debugsource | <1.0.1-2.module+el8.9.0+19703+a1da7223 | 1.0.1-2.module+el8.9.0+19703+a1da7223 |
redhat/libecap-devel | <1.0.1-2.module+el8.9.0+19703+a1da7223 | 1.0.1-2.module+el8.9.0+19703+a1da7223 |
redhat/squid-debuginfo | <4.15-7.module+el8.9.0+20975+25f17541.5 | 4.15-7.module+el8.9.0+20975+25f17541.5 |
redhat/squid-debugsource | <4.15-7.module+el8.9.0+20975+25f17541.5 | 4.15-7.module+el8.9.0+20975+25f17541.5 |
redhat/libecap | <1.0.1-2.module+el8.9.0+19703+a1da7223 | 1.0.1-2.module+el8.9.0+19703+a1da7223 |
redhat/libecap-debuginfo | <1.0.1-2.module+el8.9.0+19703+a1da7223 | 1.0.1-2.module+el8.9.0+19703+a1da7223 |
redhat/libecap-debugsource | <1.0.1-2.module+el8.9.0+19703+a1da7223 | 1.0.1-2.module+el8.9.0+19703+a1da7223 |
redhat/libecap-devel | <1.0.1-2.module+el8.9.0+19703+a1da7223 | 1.0.1-2.module+el8.9.0+19703+a1da7223 |
redhat/squid | <4.15-7.module+el8.9.0+20975+25f17541.5 | 4.15-7.module+el8.9.0+20975+25f17541.5 |
redhat/squid-debuginfo | <4.15-7.module+el8.9.0+20975+25f17541.5 | 4.15-7.module+el8.9.0+20975+25f17541.5 |
redhat/squid-debugsource | <4.15-7.module+el8.9.0+20975+25f17541.5 | 4.15-7.module+el8.9.0+20975+25f17541.5 |
redhat/libecap | <1.0.1-2.module+el8.9.0+19703+a1da7223.aa | 1.0.1-2.module+el8.9.0+19703+a1da7223.aa |
redhat/libecap-debuginfo | <1.0.1-2.module+el8.9.0+19703+a1da7223.aa | 1.0.1-2.module+el8.9.0+19703+a1da7223.aa |
redhat/libecap-debugsource | <1.0.1-2.module+el8.9.0+19703+a1da7223.aa | 1.0.1-2.module+el8.9.0+19703+a1da7223.aa |
redhat/libecap-devel | <1.0.1-2.module+el8.9.0+19703+a1da7223.aa | 1.0.1-2.module+el8.9.0+19703+a1da7223.aa |
redhat/squid | <4.15-7.module+el8.9.0+20975+25f17541.5.aa | 4.15-7.module+el8.9.0+20975+25f17541.5.aa |
redhat/squid-debuginfo | <4.15-7.module+el8.9.0+20975+25f17541.5.aa | 4.15-7.module+el8.9.0+20975+25f17541.5.aa |
redhat/squid-debugsource | <4.15-7.module+el8.9.0+20975+25f17541.5.aa | 4.15-7.module+el8.9.0+20975+25f17541.5.aa |
Red Hat Enterprise Linux 8 | ||
Red Hat Enterprise Linux for ARM 64 | ||
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | ||
Red Hat Enterprise Linux Server for IBM z Systems |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2024:0046 addresses a Denial of Service vulnerability in SSL certificate validation and other issues in Squid.
To fix the vulnerabilities in RHSA-2024:0046, update your Squid and libecap packages to the recommended versions 4.15-7.module+el8.9.0+20975+25f17541.5 or later and 1.0.1-2.module+el8.9.0+19703+a1da7223 or later.
The severity level of RHSA-2024:0046 is categorized as important.
Affected systems include Red Hat Enterprise Linux for x86_64, ARM 64, Power, and IBM z Systems.
Yes, the Squid package version 4.15-7.module+el8.9.0+20975+25f17541.5 and libecap version 1.0.1-2.module+el8.9.0+19703+a1da7223 are critical and should be updated.