{"id":"USN-6728-1","summary":"squid vulnerabilities","details":"Joshua Rogers discovered that Squid incorrectly handled collapsed\nforwarding. A remote attacker could possibly use this issue to cause Squid\nto crash, resulting in a denial of service. This issue only affected Ubuntu\n20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-49288)\n\nJoshua Rogers discovered that Squid incorrectly handled certain structural\nelements. A remote attacker could possibly use this issue to cause Squid to\ncrash, resulting in a denial of service. (CVE-2023-5824)\n\nJoshua Rogers discovered that Squid incorrectly handled Cache Manager error\nresponses. A remote trusted client can possibly use this issue to cause\nSquid to crash, resulting in a denial of service. (CVE-2024-23638)\n\nJoshua Rogers discovered that Squid incorrectly handled the HTTP Chunked\ndecoder. A remote attacker could possibly use this issue to cause Squid to\nstop responding, resulting in a denial of service. (CVE-2024-25111)\n\nJoshua Rogers discovered that Squid incorrectly handled HTTP header\nparsing. A remote trusted client can possibly use this issue to cause\nSquid to crash, resulting in a denial of service. (CVE-2024-25617)\n","modified":"2026-02-10T04:43:40Z","published":"2024-04-10T16:38:15Z","related":["UBUNTU-CVE-2023-49288","UBUNTU-CVE-2023-5824","UBUNTU-CVE-2024-23638","UBUNTU-CVE-2024-25111","UBUNTU-CVE-2024-25617"],"upstream":["CVE-2023-49288","CVE-2023-5824","CVE-2024-23638","CVE-2024-25111","CVE-2024-25617","UBUNTU-CVE-2023-49288","UBUNTU-CVE-2023-5824","UBUNTU-CVE-2024-23638","UBUNTU-CVE-2024-25111","UBUNTU-CVE-2024-25617"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6728-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-5824"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-49288"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-23638"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-25111"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-25617"}],"affected":[{"package":{"name":"squid","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/squid@4.10-1ubuntu1.10?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.10-1ubuntu1.10"}]}],"versions":["4.8-1ubuntu2","4.8-1ubuntu3","4.9-2ubuntu1","4.9-2ubuntu2","4.9-2ubuntu3","4.9-2ubuntu4","4.10-1ubuntu1","4.10-1ubuntu1.1","4.10-1ubuntu1.2","4.10-1ubuntu1.3","4.10-1ubuntu1.4","4.10-1ubuntu1.5","4.10-1ubuntu1.6","4.10-1ubuntu1.7","4.10-1ubuntu1.8","4.10-1ubuntu1.9"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"squid","binary_version":"4.10-1ubuntu1.10"},{"binary_name":"squid-cgi","binary_version":"4.10-1ubuntu1.10"},{"binary_name":"squid-common","binary_version":"4.10-1ubuntu1.10"},{"binary_name":"squid-purge","binary_version":"4.10-1ubuntu1.10"},{"binary_name":"squidclient","binary_version":"4.10-1ubuntu1.10"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6728-1.json","cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-23638"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-25111"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-25617"}],"ecosystem":"Ubuntu:20.04:LTS"}}},{"package":{"name":"squid","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/squid@5.7-0ubuntu0.22.04.4?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.7-0ubuntu0.22.04.4"}]}],"versions":["4.13-10ubuntu5","5.2-1ubuntu1","5.2-1ubuntu3","5.2-1ubuntu4","5.2-1ubuntu4.1","5.2-1ubuntu4.2","5.2-1ubuntu4.3","5.7-0ubuntu0.22.04.1","5.7-0ubuntu0.22.04.2","5.7-0ubuntu0.22.04.3"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"squid","binary_version":"5.7-0ubuntu0.22.04.4"},{"binary_name":"squid-cgi","binary_version":"5.7-0ubuntu0.22.04.4"},{"binary_name":"squid-common","binary_version":"5.7-0ubuntu0.22.04.4"},{"binary_name":"squid-openssl","binary_version":"5.7-0ubuntu0.22.04.4"},{"binary_name":"squid-purge","binary_version":"5.7-0ubuntu0.22.04.4"},{"binary_name":"squidclient","binary_version":"5.7-0ubuntu0.22.04.4"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6728-1.json","cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-5824"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-49288"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-23638"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-25111"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-25617"}],"ecosystem":"Ubuntu:22.04:LTS"}}}],"schema_version":"1.7.3"}