vulnerability
Rocky Linux: CVE-2023-46728: squid-4 (RLSA-2024-0046)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:L/Au:N/C:N/I:N/A:C) | Nov 6, 2023 | Mar 5, 2024 | Mar 31, 2026 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
Nov 6, 2023
Added
Mar 5, 2024
Modified
Mar 31, 2026
Description
Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a NULL pointer dereference bug Squid is vulnerable to a Denial of Service attack against Squid's Gopher gateway. The gopher protocol is always available and enabled in Squid prior to Squid 6.0.1. Responses triggering this bug are possible to be received from any gopher server, even those without malicious intent. Gopher support has been removed in Squid version 6.0.1. Users are advised to upgrade. Users unable to upgrade should reject all gopher URL requests.
Solutions
rocky-upgrade-libecaprocky-upgrade-libecap-debuginforocky-upgrade-libecap-debugsourcerocky-upgrade-libecap-develrocky-upgrade-squidrocky-upgrade-squid-debuginforocky-upgrade-squid-debugsource
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.