Updated: 2024-10-25 00:14:10.12559
Description:
A flaw was found in Squid. The limits applied for validation of HTTP response headers are applied before caching. However, Squid may grow a cached HTTP response header beyond the configured maximum size, causing a stall or crash of the worker process when a large header is retrieved from the disk cache, resulting in a denial of service.
Links | NIST | CIRCL | RHEL | Ubuntu |
Severity | Score | |
---|---|---|
CVSS Version 2.x | 0 | |
CVSS Version 3.x | HIGH | 7.5 |
OS name | Project name | Version | Score | Severity | Status | Errata | Last updated |
---|---|---|---|---|---|---|---|
CentOS 6 ELS | squid | 3.1.23 | 7.5 | HIGH | Ignored | 2024-05-09 10:11:56 | |
CentOS 6 ELS | squid34 | 3.4.14 | 7.5 | HIGH | Ignored | 2024-10-09 11:11:42 | |
CentOS 8.4 ELS | squid | 4.11-4 | 7.5 | HIGH | Released | CLSA-2024:1730369054 | 2024-10-31 11:20:34 |
CentOS 8.5 ELS | squid | 4.15-1 | 7.5 | HIGH | Released | CLSA-2024:1730480855 | 2024-11-01 14:54:15 |
CloudLinux 6 ELS | squid | 3.1.23 | 7.5 | HIGH | Ignored | 2024-05-09 10:11:55 | |
CloudLinux 6 ELS | squid34 | 3.4.14 | 7.5 | HIGH | Ignored | 2024-10-09 11:11:41 | |
Oracle Linux 6 ELS | squid | 3.1.23 | 7.5 | HIGH | Ignored | 2024-05-09 10:11:55 | |
Oracle Linux 6 ELS | squid34 | 3.4.14 | 7.5 | HIGH | Ignored | 2024-10-09 11:11:40 | |
Ubuntu 16.04 ELS | squid | 3.5.12-1 | 7.5 | HIGH | Ignored | 2024-05-09 10:12:00 | |
Ubuntu 18.04 ELS | squid | 3.5.27-1 | 7.5 | HIGH | Ignored | 2024-05-09 10:12:00 |
We have reasoned not to port this fix because of the extremely high complexity of the changes. There difference between the version 3 and 6 is too big for a safe backport. The upstream recommended workaround is to disable disk caching by removing all cache_dir directives from squid.conf.