Updated: 2025-08-20 01:37:27.811517
Description:
Squid before 4.15 and 5.x before 5.0.6 allows remote servers to cause a denial of service (affecting availability to all clients) via an HTTP response. The issue trigger is a header that can be expected to exist in HTTP traffic without any malicious intent by the server.
| Links | NIST | CIRCL | RHEL | Ubuntu |
| Severity | Score | |
|---|---|---|
| CVSS Version 2.x | MEDIUM | 4.0 |
| CVSS Version 3.x | MEDIUM | 6.5 |
| OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
|---|---|---|---|---|---|---|---|---|
| CentOS 6 ELS | squid34 | 3.4.14 | 6.5 | MEDIUM | Ignored | 2021-11-02 14:03:19 | We have reasoned not to port the fix for this vulnerability due to low base score of the CVE | |
| CentOS 6 ELS | squid | 3.1.23 | 6.5 | MEDIUM | Ignored | 2021-11-02 14:03:19 | We have reasoned not to port the fix for this vulnerability due to low base score of the CVE | |
| CentOS 8.4 ELS | squid | 4.11-4 | 6.5 | MEDIUM | Released | CLSA-2022:1646060698 | 2022-02-28 14:41:41 | |
| CentOS 8.5 ELS | squid | 4.15-1 | 6.5 | MEDIUM | Not Vulnerable | 2022-02-17 12:11:05 | ||
| CloudLinux 6 ELS | squid34 | 3.4.14 | 6.5 | MEDIUM | Ignored | 2021-11-02 14:03:19 | We have reasoned not to port the fix for this vulnerability due to low base score of the CVE | |
| CloudLinux 6 ELS | squid | 3.1.23 | 6.5 | MEDIUM | Ignored | 2021-11-02 14:03:19 | We have reasoned not to port the fix for this vulnerability due to low base score of the CVE | |
| CloudLinux 7 ELS | squid | 3.5.20 | 6.5 | MEDIUM | Released | CLSA-2024:1733909428 | 2024-12-25 23:21:37 | |
| Debian 10 ELS | squid | 4.6.0 | 6.5 | MEDIUM | Ignored | 2025-10-11 00:19:37 | Ignored due to low severity | |
| Oracle Linux 6 ELS | squid | 3.1.23 | 6.5 | MEDIUM | Ignored | 2021-11-02 14:03:19 | Ignored due to low severity | |
| Oracle Linux 6 ELS | squid34 | 3.4.14 | 6.5 | MEDIUM | Ignored | 2021-11-02 14:03:19 | Ignored due to low severity |