USN-6728-3

Source
https://ubuntu.com/security/notices/USN-6728-3
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6728-3.json
JSON Data
https://api.test.osv.dev/v1/vulns/USN-6728-3
Related
Published
2024-04-23T11:20:04.870374Z
Modified
2024-04-23T11:20:04.870374Z
Summary
squid vulnerability
Details

USN-6728-1 fixed vulnerabilities in Squid. The fix for CVE-2023-5824 caused Squid to crash in certain environments on Ubuntu 20.04 LTS and was disabled in USN-6728-2. The problematic fix for CVE-2023-5824 has now been corrected and reinstated in this update.

We apologize for the inconvenience.

Original advisory details:

Joshua Rogers discovered that Squid incorrectly handled collapsed forwarding. A remote attacker could possibly use this issue to cause Squid to crash, resulting in a denial of service. This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-49288)

Joshua Rogers discovered that Squid incorrectly handled certain structural elements. A remote attacker could possibly use this issue to cause Squid to crash, resulting in a denial of service. (CVE-2023-5824)

Joshua Rogers discovered that Squid incorrectly handled Cache Manager error responses. A remote trusted client can possibly use this issue to cause Squid to crash, resulting in a denial of service. (CVE-2024-23638)

Joshua Rogers discovered that Squid incorrectly handled the HTTP Chunked decoder. A remote attacker could possibly use this issue to cause Squid to stop responding, resulting in a denial of service. (CVE-2024-25111)

Joshua Rogers discovered that Squid incorrectly handled HTTP header parsing. A remote trusted client can possibly use this issue to cause Squid to crash, resulting in a denial of service. (CVE-2024-25617)

References

Affected packages

Ubuntu:20.04:LTS / squid

Package

Name
squid
Purl
pkg:deb/ubuntu/squid?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.10-1ubuntu1.12

Affected versions

4.*

4.8-1ubuntu2
4.8-1ubuntu3
4.9-2ubuntu1
4.9-2ubuntu2
4.9-2ubuntu3
4.9-2ubuntu4
4.10-1ubuntu1
4.10-1ubuntu1.1
4.10-1ubuntu1.2
4.10-1ubuntu1.3
4.10-1ubuntu1.4
4.10-1ubuntu1.5
4.10-1ubuntu1.6
4.10-1ubuntu1.7
4.10-1ubuntu1.8
4.10-1ubuntu1.9
4.10-1ubuntu1.10
4.10-1ubuntu1.11

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "4.10-1ubuntu1.12",
            "binary_name": "squid"
        },
        {
            "binary_version": "4.10-1ubuntu1.12",
            "binary_name": "squid-cgi"
        },
        {
            "binary_version": "4.10-1ubuntu1.12",
            "binary_name": "squid-cgi-dbgsym"
        },
        {
            "binary_version": "4.10-1ubuntu1.12",
            "binary_name": "squid-common"
        },
        {
            "binary_version": "4.10-1ubuntu1.12",
            "binary_name": "squid-dbgsym"
        },
        {
            "binary_version": "4.10-1ubuntu1.12",
            "binary_name": "squid-purge"
        },
        {
            "binary_version": "4.10-1ubuntu1.12",
            "binary_name": "squid-purge-dbgsym"
        },
        {
            "binary_version": "4.10-1ubuntu1.12",
            "binary_name": "squidclient"
        },
        {
            "binary_version": "4.10-1ubuntu1.12",
            "binary_name": "squidclient-dbgsym"
        }
    ]
}