{"id":"USN-6728-2","summary":"squid regression","details":"USN-6728-1 fixed vulnerabilities in Squid. The fix for CVE-2023-5824 caused\nSquid to crash in certain environments on Ubuntu 20.04 LTS. The problematic\nfix has been reverted pending further investigation.\n\nWe apologize for the inconvenience.\n\nOriginal advisory details:\n\n Joshua Rogers discovered that Squid incorrectly handled collapsed\n forwarding. A remote attacker could possibly use this issue to cause Squid\n to crash, resulting in a denial of service. This issue only affected Ubuntu\n 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-49288)\n \n Joshua Rogers discovered that Squid incorrectly handled certain structural\n elements. A remote attacker could possibly use this issue to cause Squid to\n crash, resulting in a denial of service. (CVE-2023-5824)\n \n Joshua Rogers discovered that Squid incorrectly handled Cache Manager error\n responses. A remote trusted client can possibly use this issue to cause\n Squid to crash, resulting in a denial of service. (CVE-2024-23638)\n \n Joshua Rogers discovered that Squid incorrectly handled the HTTP Chunked\n decoder. A remote attacker could possibly use this issue to cause Squid to\n stop responding, resulting in a denial of service. (CVE-2024-25111)\n \n Joshua Rogers discovered that Squid incorrectly handled HTTP header\n parsing. A remote trusted client can possibly use this issue to cause\n Squid to crash, resulting in a denial of service. (CVE-2024-25617)\n","modified":"2026-02-10T04:43:40Z","published":"2024-04-11T11:13:39Z","related":["UBUNTU-CVE-2023-49288","UBUNTU-CVE-2023-5824"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6728-2"},{"type":"REPORT","url":"https://launchpad.net/bugs/2060880"}],"affected":[{"package":{"name":"squid","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/squid@4.10-1ubuntu1.11?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.10-1ubuntu1.11"}]}],"versions":["4.8-1ubuntu2","4.8-1ubuntu3","4.9-2ubuntu1","4.9-2ubuntu2","4.9-2ubuntu3","4.9-2ubuntu4","4.10-1ubuntu1","4.10-1ubuntu1.1","4.10-1ubuntu1.2","4.10-1ubuntu1.3","4.10-1ubuntu1.4","4.10-1ubuntu1.5","4.10-1ubuntu1.6","4.10-1ubuntu1.7","4.10-1ubuntu1.8","4.10-1ubuntu1.9","4.10-1ubuntu1.10"],"ecosystem_specific":{"binaries":[{"binary_version":"4.10-1ubuntu1.11","binary_name":"squid"},{"binary_version":"4.10-1ubuntu1.11","binary_name":"squid-cgi"},{"binary_version":"4.10-1ubuntu1.11","binary_name":"squid-common"},{"binary_version":"4.10-1ubuntu1.11","binary_name":"squid-purge"},{"binary_version":"4.10-1ubuntu1.11","binary_name":"squidclient"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6728-2.json"}}],"schema_version":"1.7.3"}