First published: Mon Dec 11 2023(Updated: )
USN-6500-1 fixed several vulnerabilities in Squid. This update provides the corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. Original advisory details: Joshua Rogers discovered that Squid incorrectly handled the Gopher protocol. A remote attacker could possibly use this issue to cause Squid to crash, resulting in a denial of service. Gopher support has been disabled in this update. (CVE-2023-46728) Joshua Rogers discovered that Squid incorrectly handled HTTP Digest Authentication. A remote attacker could possibly use this issue to cause Squid to crash, resulting in a denial of service. (CVE-2023-46847)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/squid | <3.5.27-1ubuntu1.14+esm1 | 3.5.27-1ubuntu1.14+esm1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/squid3 | <3.5.27-1ubuntu1.14+esm1 | 3.5.27-1ubuntu1.14+esm1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/squid | <3.5.12-1ubuntu7.16+esm2 | 3.5.12-1ubuntu7.16+esm2 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/squid3 | <3.5.12-1ubuntu7.16+esm2 | 3.5.12-1ubuntu7.16+esm2 |
Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-6500-2 addresses vulnerabilities related to improper handling of the Gopher protocol in Squid.
USN-6500-2 affects Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.
You can mitigate the vulnerabilities by updating Squid to the versions specified in USN-6500-2: 3.5.27-1ubuntu1.14+esm1 for 18.04 and 3.5.12-1ubuntu7.16+esm2 for 16.04.
Yes, the packages affected include Squid and Squid3 for the specified Ubuntu versions.
The vulnerabilities addressed in USN-6500-2 are considered significant due to their potential for exploitation by remote attackers using the Gopher protocol.