CVE-2023-5824

Updated: 2024-10-25 00:14:10.12559

Description:

A flaw was found in Squid. The limits applied for validation of HTTP response headers are applied before caching. However, Squid may grow a cached HTTP response header beyond the configured maximum size, causing a stall or crash of the worker process when a large header is retrieved from the disk cache, resulting in a denial of service.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0
CVSS Version 3.x HIGH 7.5

Status

OS name Project name Version Score Severity Status Errata Last updated
CentOS 6 ELS squid 3.1.23 7.5 HIGH Ignored 2024-05-09 10:11:56
CentOS 6 ELS squid34 3.4.14 7.5 HIGH Ignored 2024-10-09 11:11:42
CentOS 8.4 ELS squid 4.11-4 7.5 HIGH Released CLSA-2024:1730369054 2024-10-31 11:20:34
CentOS 8.5 ELS squid 4.15-1 7.5 HIGH Released CLSA-2024:1730480855 2024-11-01 14:54:15
CloudLinux 6 ELS squid 3.1.23 7.5 HIGH Ignored 2024-05-09 10:11:55
CloudLinux 6 ELS squid34 3.4.14 7.5 HIGH Ignored 2024-10-09 11:11:41
Oracle Linux 6 ELS squid 3.1.23 7.5 HIGH Ignored 2024-05-09 10:11:55
Oracle Linux 6 ELS squid34 3.4.14 7.5 HIGH Ignored 2024-10-09 11:11:40
Ubuntu 16.04 ELS squid 3.5.12-1 7.5 HIGH Ignored 2024-05-09 10:12:00
Ubuntu 18.04 ELS squid 3.5.27-1 7.5 HIGH Ignored 2024-05-09 10:12:00

Statement

We have reasoned not to port this fix because of the extremely high complexity of the changes. There difference between the version 3 and 6 is too big for a safe backport. The upstream recommended workaround is to disable disk caching by removing all cache_dir directives from squid.conf.