ALT-BU-2023-7568-1
Branch p10 update bulletin.
Closed vulnerabilities
BDU:2023-07699
Уязвимость прокси-сервера Squid, связанная с ошибками при проверке сертификата SSL/TLS, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-07920
Уязвимость обработчика аутентификации HTTP Digest Authentication прокси-сервера Squid, позволяющая нарушителю вызвать отказ в обслуживании или оказать иное воздействие
BDU:2023-08061
Уязвимость прокси-сервера Squid, связана с неправильным обращением с исключительными условиями и неконтролируемым потреблением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-08062
Уязвимость прокси-сервера Squid, связана с неправильным преобразованием между числовыми типами и неконтролируемым потреблением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-08063
Уязвимость декодера chunked прокси-сервера Squid, позволяющая нарушителю взаимодействовать с сервером напрямую
Modified: 2025-02-13
CVE-2023-46724
Squid is a caching proxy for the Web. Due to an Improper Validation of Specified Index bug, Squid versions 3.3.0.1 through 5.9 and 6.0 prior to 6.4 compiled using `--with-openssl` are vulnerable to a Denial of Service attack against SSL Certificate validation. This problem allows a remote server to perform Denial of Service against Squid Proxy by initiating a TLS Handshake with a specially crafted SSL Certificate in a server certificate chain. This attack is limited to HTTPS and SSL-Bump. This bug is fixed in Squid version 6.4. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives. Those who you use a prepackaged version of Squid should refer to the package vendor for availability information on updated packages.
- http://www.squid-cache.org/Versions/v5/SQUID-2023_4.patch
- http://www.squid-cache.org/Versions/v5/SQUID-2023_4.patch
- http://www.squid-cache.org/Versions/v6/SQUID-2023_4.patch
- http://www.squid-cache.org/Versions/v6/SQUID-2023_4.patch
- https://github.com/squid-cache/squid/commit/b70f864940225dfe69f9f653f948e787f99c3810
- https://github.com/squid-cache/squid/commit/b70f864940225dfe69f9f653f948e787f99c3810
- https://github.com/squid-cache/squid/security/advisories/GHSA-73m6-jm96-c6r3
- https://github.com/squid-cache/squid/security/advisories/GHSA-73m6-jm96-c6r3
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/
- https://security.netapp.com/advisory/ntap-20231208-0001/
- https://security.netapp.com/advisory/ntap-20231208-0001/
Modified: 2024-12-18
CVE-2023-46846
SQUID is vulnerable to HTTP request smuggling, caused by chunked decoder lenience, allows a remote attacker to perform Request/Response smuggling past firewall and frontend security systems.
- RHSA-2023:6266
- RHSA-2023:6267
- RHSA-2023:6268
- RHSA-2023:6748
- RHSA-2023:6801
- RHSA-2023:6803
- RHSA-2023:6804
- RHSA-2023:6810
- RHSA-2023:7213
- RHSA-2024:11049
- https://access.redhat.com/security/cve/CVE-2023-46846
- https://github.com/squid-cache/squid/security/advisories/GHSA-j83v-w3p4-5cqh
- RHBZ#2245910
- RHBZ#2245910
- https://github.com/squid-cache/squid/security/advisories/GHSA-j83v-w3p4-5cqh
- https://lists.debian.org/debian-lts-announce/2024/01/msg00003.html
- https://lists.debian.org/debian-lts-announce/2024/01/msg00008.html
- https://security.netapp.com/advisory/ntap-20231130-0002/
- https://access.redhat.com/security/cve/CVE-2023-46846
- RHSA-2023:7213
- RHSA-2023:6810
- RHSA-2023:6804
- RHSA-2023:6803
- RHSA-2023:6801
- RHSA-2023:6748
- RHSA-2023:6268
- RHSA-2023:6267
- RHSA-2023:6266
Modified: 2024-11-21
CVE-2023-46847
Squid is vulnerable to a Denial of Service, where a remote attacker can perform buffer overflow attack by writing up to 2 MB of arbitrary data to heap memory when Squid is configured to accept HTTP Digest Authentication.
- RHSA-2023:6266
- RHSA-2023:6267
- RHSA-2023:6268
- RHSA-2023:6748
- RHSA-2023:6801
- RHSA-2023:6803
- RHSA-2023:6804
- RHSA-2023:6805
- RHSA-2023:6810
- RHSA-2023:6882
- RHSA-2023:6884
- RHSA-2023:7213
- RHSA-2023:7576
- RHSA-2023:7578
- https://access.redhat.com/security/cve/CVE-2023-46847
- RHBZ#2245916
- https://github.com/squid-cache/squid/security/advisories/GHSA-phqj-m8gv-cq4g
- https://lists.debian.org/debian-lts-announce/2024/01/msg00003.html
- https://security.netapp.com/advisory/ntap-20231130-0002/
- RHSA-2023:6266
- https://github.com/squid-cache/squid/security/advisories/GHSA-phqj-m8gv-cq4g
- RHBZ#2245916
- https://access.redhat.com/security/cve/CVE-2023-46847
- RHSA-2023:7578
- RHSA-2023:7576
- RHSA-2023:7213
- RHSA-2023:6884
- RHSA-2023:6882
- RHSA-2023:6810
- RHSA-2023:6805
- RHSA-2023:6804
- RHSA-2023:6803
- RHSA-2023:6801
- RHSA-2023:6748
- RHSA-2023:6268
- RHSA-2023:6267
Modified: 2024-11-21
CVE-2023-46848
Squid is vulnerable to Denial of Service, where a remote attacker can perform DoS by sending ftp:// URLs in HTTP Request messages or constructing ftp:// URLs from FTP Native input.
- RHSA-2023:6266
- RHSA-2023:6266
- RHSA-2023:6268
- RHSA-2023:6268
- RHSA-2023:6748
- RHSA-2023:6748
- https://access.redhat.com/security/cve/CVE-2023-46848
- https://access.redhat.com/security/cve/CVE-2023-46848
- RHBZ#2245919
- RHBZ#2245919
- https://github.com/squid-cache/squid/security/advisories/GHSA-2g3c-pg7q-g59w
- https://github.com/squid-cache/squid/security/advisories/GHSA-2g3c-pg7q-g59w
- https://security.netapp.com/advisory/ntap-20231214-0005/
Modified: 2024-11-21
CVE-2023-5824
A flaw was found in Squid. The limits applied for validation of HTTP response headers are applied before caching. However, Squid may grow a cached HTTP response header beyond the configured maximum size, causing a stall or crash of the worker process when a large header is retrieved from the disk cache, resulting in a denial of service.
- RHSA-2023:7465
- RHSA-2023:7465
- RHSA-2023:7668
- RHSA-2023:7668
- RHSA-2024:0072
- RHSA-2024:0072
- RHSA-2024:0397
- RHSA-2024:0397
- RHSA-2024:0771
- RHSA-2024:0771
- RHSA-2024:0772
- RHSA-2024:0772
- RHSA-2024:0773
- RHSA-2024:0773
- RHSA-2024:1153
- RHSA-2024:1153
- https://access.redhat.com/security/cve/CVE-2023-5824
- https://access.redhat.com/security/cve/CVE-2023-5824
- RHBZ#2245914
- RHBZ#2245914
- https://github.com/squid-cache/squid/security/advisories/GHSA-543m-w2m2-g255
- https://github.com/squid-cache/squid/security/advisories/GHSA-543m-w2m2-g255
- https://security.netapp.com/advisory/ntap-20231130-0003/
Closed bugs
Несовпадающие версии при использовании команд atop -V и rpm -q atop
Package mysql-connector-odbc updated to version 8.0.35-alt2 for branch p10 in task 334977.
Closed vulnerabilities
BDU:2022-01443
Уязвимость реализации механизма аутентификации Cyrus SASL, связанная с непринятием мер по защите структуры SQL-запроса, позволяющая нарушителю выполнить произвольный SQL-запрос
BDU:2022-04284
Уязвимость режима AES OCB библиотеки OpenSSL, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2024-11-21
CVE-2022-2097
AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn't written. In the special case of "in place" encryption, sixteen bytes of the plaintext would be revealed. Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected. Fixed in OpenSSL 3.0.5 (Affected 3.0.0-3.0.4). Fixed in OpenSSL 1.1.1q (Affected 1.1.1-1.1.1p).
- https://cert-portal.siemens.com/productcert/pdf/ssa-332410.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-332410.pdf
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=919925673d6c9cfed3c1085497f5dfbbed5fc431
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=919925673d6c9cfed3c1085497f5dfbbed5fc431
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a98f339ddd7e8f487d6e0088d4a9a42324885a93
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a98f339ddd7e8f487d6e0088d4a9a42324885a93
- [debian-lts-announce] 20230220 [SECURITY] [DLA 3325-1] openssl security update
- [debian-lts-announce] 20230220 [SECURITY] [DLA 3325-1] openssl security update
- FEDORA-2022-89a17be281
- FEDORA-2022-89a17be281
- FEDORA-2022-3fdc2d3047
- FEDORA-2022-3fdc2d3047
- FEDORA-2022-41890e9e44
- FEDORA-2022-41890e9e44
- GLSA-202210-02
- GLSA-202210-02
- https://security.netapp.com/advisory/ntap-20220715-0011/
- https://security.netapp.com/advisory/ntap-20220715-0011/
- https://security.netapp.com/advisory/ntap-20230420-0008/
- https://security.netapp.com/advisory/ntap-20230420-0008/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- DSA-5343
- DSA-5343
- https://www.openssl.org/news/secadv/20220705.txt
- https://www.openssl.org/news/secadv/20220705.txt
Modified: 2024-11-21
CVE-2022-24407
In Cyrus SASL 2.1.17 through 2.1.27 before 2.1.28, plugins/sql.c does not escape the password for a SQL INSERT or UPDATE statement.
- [oss-security] 20220223 Fwd: Cyrus-SASL 2.1.28 released [fixes CVE-2022-24407 & CVE-2019-19906]
- [oss-security] 20220223 Fwd: Cyrus-SASL 2.1.28 released [fixes CVE-2022-24407 & CVE-2019-19906]
- https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst
- https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst
- [debian-lts-announce] 20220306 [SECURITY] [DLA 2931-1] cyrus-sasl2 security update
- [debian-lts-announce] 20220306 [SECURITY] [DLA 2931-1] cyrus-sasl2 security update
- FEDORA-2022-e33e824d37
- FEDORA-2022-e33e824d37
- FEDORA-2022-8cc64f73d0
- FEDORA-2022-8cc64f73d0
- FEDORA-2022-f9642fab70
- FEDORA-2022-f9642fab70
- https://security.netapp.com/advisory/ntap-20221007-0003/
- https://security.netapp.com/advisory/ntap-20221007-0003/
- https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28
- https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28
- DSA-5087
- DSA-5087
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html