{"id":"USN-6728-3","summary":"squid vulnerability","details":"USN-6728-1 fixed vulnerabilities in Squid. The fix for CVE-2023-5824 caused\nSquid to crash in certain environments on Ubuntu 20.04 LTS and was disabled\nin USN-6728-2. The problematic fix for CVE-2023-5824 has now been corrected\nand reinstated in this update.\n\nWe apologize for the inconvenience.\n\nOriginal advisory details:\n\n Joshua Rogers discovered that Squid incorrectly handled collapsed\n forwarding. A remote attacker could possibly use this issue to cause Squid\n to crash, resulting in a denial of service. This issue only affected Ubuntu\n 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-49288)\n \n Joshua Rogers discovered that Squid incorrectly handled certain structural\n elements. A remote attacker could possibly use this issue to cause Squid to\n crash, resulting in a denial of service. (CVE-2023-5824)\n \n Joshua Rogers discovered that Squid incorrectly handled Cache Manager error\n responses. A remote trusted client can possibly use this issue to cause\n Squid to crash, resulting in a denial of service. (CVE-2024-23638)\n \n Joshua Rogers discovered that Squid incorrectly handled the HTTP Chunked\n decoder. A remote attacker could possibly use this issue to cause Squid to\n stop responding, resulting in a denial of service. (CVE-2024-25111)\n \n Joshua Rogers discovered that Squid incorrectly handled HTTP header\n parsing. A remote trusted client can possibly use this issue to cause\n Squid to crash, resulting in a denial of service. (CVE-2024-25617)\n","modified":"2026-02-10T04:43:40Z","published":"2024-04-23T11:20:04Z","related":["UBUNTU-CVE-2023-49288","UBUNTU-CVE-2023-5824"],"upstream":["CVE-2023-49288","CVE-2023-5824","UBUNTU-CVE-2023-49288","UBUNTU-CVE-2023-5824"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6728-3"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-5824"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-49288"},{"type":"REPORT","url":"https://launchpad.net/bugs/2060880"}],"affected":[{"package":{"name":"squid","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/squid@4.10-1ubuntu1.12?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.10-1ubuntu1.12"}]}],"versions":["4.8-1ubuntu2","4.8-1ubuntu3","4.9-2ubuntu1","4.9-2ubuntu2","4.9-2ubuntu3","4.9-2ubuntu4","4.10-1ubuntu1","4.10-1ubuntu1.1","4.10-1ubuntu1.2","4.10-1ubuntu1.3","4.10-1ubuntu1.4","4.10-1ubuntu1.5","4.10-1ubuntu1.6","4.10-1ubuntu1.7","4.10-1ubuntu1.8","4.10-1ubuntu1.9","4.10-1ubuntu1.10","4.10-1ubuntu1.11"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"4.10-1ubuntu1.12","binary_name":"squid"},{"binary_version":"4.10-1ubuntu1.12","binary_name":"squid-cgi"},{"binary_version":"4.10-1ubuntu1.12","binary_name":"squid-common"},{"binary_version":"4.10-1ubuntu1.12","binary_name":"squid-purge"},{"binary_version":"4.10-1ubuntu1.12","binary_name":"squidclient"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6728-3.json","cves_map":{"cves":[{"id":"CVE-2023-5824","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2023-49288","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:20.04:LTS"}}}],"schema_version":"1.7.3"}