[ubuntu/jammy-updates] squid 5.7-0ubuntu0.22.04.2 (Accepted)
Ubuntu Archive Robot
ubuntu-archive-robot at lists.canonical.com
Tue Nov 21 16:00:10 UTC 2023
squid (5.7-0ubuntu0.22.04.2) jammy-security; urgency=medium
* SECURITY UPDATE: DoS against certificate validation
- debian/patches/CVE-2023-46724.patch: fix validation of certificates
with CN=* in src/anyp/Uri.cc.
- CVE-2023-46724
* SECURITY UPDATE: DoS via Gopher gateway
- debian/patches/CVE-2023-46728.patch: disable gopher support in
src/FwdState.cc, src/HttpRequest.cc, src/IoStats.h, src/Makefile.am,
src/adaptation/ecap/Host.cc, src/adaptation/ecap/MessageRep.cc,
src/anyp/ProtocolType.h, src/anyp/Uri.cc, src/anyp/UriScheme.cc,
src/client_side_request.cc, src/error/forward.h, src/http/Message.h,
src/mgr/IoAction.cc, src/mgr/IoAction.h, src/stat.cc,
src/tests/Stub.am.
- CVE-2023-46728
* SECURITY UPDATE: HTTP request smuggling, caused by chunked decoder
lenience
- debian/patches/CVE-2023-46846.patch: improve HTTP chunked encoding
compliance in src/http/one/Parser.cc, src/http/one/Parser.h,
src/http/one/TeChunkedParser.cc, src/parser/Tokenizer.cc,
src/parser/Tokenizer.h.
- CVE-2023-46846
* SECURITY UPDATE: DoS via HTTP Digest Authentication
- debian/patches/CVE-2023-46847.patch: fix stack buffer overflow when
parsing Digest Authorization in src/auth/digest/Config.cc.
- CVE-2023-46847
* SECURITY UPDATE: DoS via ftp:// URLs
- debian/patches/CVE-2023-46848.patch: fix userinfo percent-encoding in
src/acl/external/eDirectory_userip/ext_edirectory_userip_acl.cc,
src/anyp/Uri.cc.
- CVE-2023-46848
Date: 2023-11-13 15:56:09.364606+00:00
Changed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
Signed-By: Ubuntu Archive Robot <ubuntu-archive-robot at lists.canonical.com>
https://launchpad.net/ubuntu/+source/squid/5.7-0ubuntu0.22.04.2
-------------- next part --------------
Sorry, changesfile not available.
More information about the jammy-changes
mailing list