Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2024:0046 - Security Advisory
Issued:
2024-01-03
Updated:
2024-01-03

RHSA-2024:0046 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: squid:4 security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for the squid:4 module is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.

Security Fix(es):

  • squid: Denial of Service in SSL Certificate validation (CVE-2023-46724)
  • squid: NULL pointer dereference in the gopher protocol code (CVE-2023-46728)
  • squid: Buffer over-read in the HTTP Message processing feature (CVE-2023-49285)
  • squid: Incorrect Check of Function Return Value In Helper Process management (CVE-2023-49286)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing this update, the squid service will be restarted automatically.

Affected Products

  • Red Hat Enterprise Linux for x86_64 8 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 8 s390x
  • Red Hat Enterprise Linux for Power, little endian 8 ppc64le
  • Red Hat Enterprise Linux for ARM 64 8 aarch64

Fixes

  • BZ - 2247567 - CVE-2023-46724 squid: Denial of Service in SSL Certificate validation
  • BZ - 2248521 - CVE-2023-46728 squid: NULL pointer dereference in the gopher protocol code
  • BZ - 2252923 - CVE-2023-49286 squid: Incorrect Check of Function Return Value In Helper Process management
  • BZ - 2252926 - CVE-2023-49285 squid: Buffer over-read in the HTTP Message processing feature

CVEs

  • CVE-2023-46724
  • CVE-2023-46728
  • CVE-2023-49285
  • CVE-2023-49286

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 8

SRPM
libecap-1.0.1-2.module+el8.9.0+19703+a1da7223.src.rpm SHA-256: 68456b844f86281a4db4053345c0704bea4293018ca2cd394f979ba8cd263cb4
squid-4.15-7.module+el8.9.0+20975+25f17541.5.src.rpm SHA-256: 0dde641af87c3b7d18c774f10525b7c1f0e99cbd0ac89a37ffe2c40e730daea2
x86_64
libecap-1.0.1-2.module+el8.9.0+19703+a1da7223.x86_64.rpm SHA-256: 40d43cf013f21f97631fb8470285164a523071f7882f748663494c0f1625b427
libecap-debuginfo-1.0.1-2.module+el8.9.0+19703+a1da7223.x86_64.rpm SHA-256: 6e683c898b1c714b9485a0acb012d0e5b71ddb75514cf6a37ee472ad6c373bd9
libecap-debugsource-1.0.1-2.module+el8.9.0+19703+a1da7223.x86_64.rpm SHA-256: f9d480af68e77827a9e84e1cdc2b9d48fefda63dceec87b54114568520ba6ca7
libecap-devel-1.0.1-2.module+el8.9.0+19703+a1da7223.x86_64.rpm SHA-256: 11b5623fb94967adf20000120212bb87d5e0485c1a4d17ccaeea54bf45abeaca
squid-4.15-7.module+el8.9.0+20975+25f17541.5.x86_64.rpm SHA-256: 5ee31506d1efae84def7e7328481f8ce1bfa384dec66f780726ff7187be797cf
squid-debuginfo-4.15-7.module+el8.9.0+20975+25f17541.5.x86_64.rpm SHA-256: f2514d458c325d82145c1911a23c7ed2b0658c0208618d7d94451f8cd04c2f03
squid-debugsource-4.15-7.module+el8.9.0+20975+25f17541.5.x86_64.rpm SHA-256: 11910e873c74e3115dc93e61931334535e165a379701ecf863c1ea8877f05600

Red Hat Enterprise Linux for IBM z Systems 8

SRPM
libecap-1.0.1-2.module+el8.9.0+19703+a1da7223.src.rpm SHA-256: 68456b844f86281a4db4053345c0704bea4293018ca2cd394f979ba8cd263cb4
squid-4.15-7.module+el8.9.0+20975+25f17541.5.src.rpm SHA-256: 0dde641af87c3b7d18c774f10525b7c1f0e99cbd0ac89a37ffe2c40e730daea2
s390x
libecap-1.0.1-2.module+el8.9.0+19703+a1da7223.s390x.rpm SHA-256: 7b177d330230a2a8637f1f46c83e52796fc981f307861cd5ac4e4ff46759a6a3
libecap-debuginfo-1.0.1-2.module+el8.9.0+19703+a1da7223.s390x.rpm SHA-256: cdaadf99ef98a02d12f5047e680e5f40c71f7a2df68e2808343242f0a37bf76d
libecap-debugsource-1.0.1-2.module+el8.9.0+19703+a1da7223.s390x.rpm SHA-256: 24efacc784d597f773c9856ed0ed99d78f9c0b9ece1b84de60cef147298e9c01
libecap-devel-1.0.1-2.module+el8.9.0+19703+a1da7223.s390x.rpm SHA-256: e7d1d34aaeb21d0dbcb11af624315ecd47b7d7b644edd52ea09f0f0614bb6f54
squid-4.15-7.module+el8.9.0+20975+25f17541.5.s390x.rpm SHA-256: 14c9d924736c58456a6d6e421a4351014ace3b157594f88d66bc09953eda282c
squid-debuginfo-4.15-7.module+el8.9.0+20975+25f17541.5.s390x.rpm SHA-256: 4dcdf8f3b75b9e268f9d64279b928047659910388381347b46de330aac2fc6c5
squid-debugsource-4.15-7.module+el8.9.0+20975+25f17541.5.s390x.rpm SHA-256: aa8da33a2b77f2dcb52bedaf1dc5b2e9ef8f481b3651b438d885e33551d31ac3

Red Hat Enterprise Linux for Power, little endian 8

SRPM
libecap-1.0.1-2.module+el8.9.0+19703+a1da7223.src.rpm SHA-256: 68456b844f86281a4db4053345c0704bea4293018ca2cd394f979ba8cd263cb4
squid-4.15-7.module+el8.9.0+20975+25f17541.5.src.rpm SHA-256: 0dde641af87c3b7d18c774f10525b7c1f0e99cbd0ac89a37ffe2c40e730daea2
ppc64le
libecap-1.0.1-2.module+el8.9.0+19703+a1da7223.ppc64le.rpm SHA-256: 779f161dd569dae1700e0acfd9169bd55763db01ad3112207fbcd49716bfd58f
libecap-debuginfo-1.0.1-2.module+el8.9.0+19703+a1da7223.ppc64le.rpm SHA-256: 6720c36ff829fc1b8004458fb08001f1fd8b3a40bdd57e418543a3b890421129
libecap-debugsource-1.0.1-2.module+el8.9.0+19703+a1da7223.ppc64le.rpm SHA-256: 8120cedcc13b839d73ed203a89ebbfe1803579e0549be7ae5adab0976f1fe0de
libecap-devel-1.0.1-2.module+el8.9.0+19703+a1da7223.ppc64le.rpm SHA-256: fe6d7e62eb8f5eb30ccd717c5c46cc9c1f6388b158515d25149d259bf30e7737
squid-4.15-7.module+el8.9.0+20975+25f17541.5.ppc64le.rpm SHA-256: 40ada9df8cf388e492e782f8ea45bae57f88d1c2ea4bd99a6d32eeb5d9eb6179
squid-debuginfo-4.15-7.module+el8.9.0+20975+25f17541.5.ppc64le.rpm SHA-256: 8b08bdc695eb26442355ed1be07a275ab5f9caab0277c8b0b87cd0529d41b2ad
squid-debugsource-4.15-7.module+el8.9.0+20975+25f17541.5.ppc64le.rpm SHA-256: e6bc4516a5f5b18f2565b9a83c9ac8c9133d22fdd5ada646565252058adff7a1

Red Hat Enterprise Linux for ARM 64 8

SRPM
libecap-1.0.1-2.module+el8.9.0+19703+a1da7223.src.rpm SHA-256: 68456b844f86281a4db4053345c0704bea4293018ca2cd394f979ba8cd263cb4
squid-4.15-7.module+el8.9.0+20975+25f17541.5.src.rpm SHA-256: 0dde641af87c3b7d18c774f10525b7c1f0e99cbd0ac89a37ffe2c40e730daea2
aarch64
libecap-1.0.1-2.module+el8.9.0+19703+a1da7223.aarch64.rpm SHA-256: 32b30079509b8d16ed9e85fb0ed15c0e2a8efae115f9fd5622219b65d2363db8
libecap-debuginfo-1.0.1-2.module+el8.9.0+19703+a1da7223.aarch64.rpm SHA-256: 72b65db7b4a0220a8185e142c1fc8e2c56480b05028a924138ea24d1ce90b3dd
libecap-debugsource-1.0.1-2.module+el8.9.0+19703+a1da7223.aarch64.rpm SHA-256: d408408456d44c98da25fb4dc3dbd7de545b3ffa6de8527bd7598a366a7012a3
libecap-devel-1.0.1-2.module+el8.9.0+19703+a1da7223.aarch64.rpm SHA-256: 0b78af9f6df4a8580f41145718d3f5b0d52bf566bdc6fed26b2ed8c8140f42bc
squid-4.15-7.module+el8.9.0+20975+25f17541.5.aarch64.rpm SHA-256: 6fdf87568058b5088c0a2d9b5cecee79ee67a344a1b3dd77ce2eedc06764e5f4
squid-debuginfo-4.15-7.module+el8.9.0+20975+25f17541.5.aarch64.rpm SHA-256: e17f538539ab9412009d60e1e248b187e69b731614726074aa626d1f64296642
squid-debugsource-4.15-7.module+el8.9.0+20975+25f17541.5.aarch64.rpm SHA-256: fde878cf3d6029200f53d07c81f721359b5f7a9c1c268a2260d9383f3c6e6141

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility