Bug 1217825 (CVE-2023-49288)

Summary: VUL-0: CVE-2023-49288: squid: Use-After-Free in the HTTP Collapsed Forwarding Feature
Product: [Novell Products] SUSE Security Incidents Reporter: SMASH SMASH <smash_bz>
Component: IncidentsAssignee: Adam Majer <amajer>
Status: IN_PROGRESS --- QA Contact: Security Team bot <security-team>
Severity: Major    
Priority: P3 - Medium CC: amajer, andrea.mattiazzo, meissner, stoyan.manolov, thomas.leroy
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/387016/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-49288:7.5:(AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description SMASH SMASH 2023-12-05 15:37:06 UTC
Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Affected versions of squid are subject to a a Use-After-Free bug which can lead to a Denial of Service attack via collapsed forwarding. All versions of Squid from 3.5 up to and including 5.9 configured with "collapsed_forwarding on" are vulnerable. Configurations with "collapsed_forwarding off" or without a "collapsed_forwarding" directive are not vulnerable. This bug is fixed by Squid version 6.0.1. Users are advised to upgrade. Users unable to upgrade should remove all collapsed_forwarding lines from their squid.conf.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-49288
https://github.com/squid-cache/squid/security/advisories/GHSA-rj5h-46j6-q2g5
Comment 4 Andrea Mattiazzo 2023-12-13 09:29:14 UTC
Could you please double check my assumption? With the information in the advisory, I wasn't able to find the specific flow and which pointers are affected by this use-after-free bug.
Comment 5 Gabriele Sonnu 2023-12-13 10:49:21 UTC
*** Bug 1217778 has been marked as a duplicate of this bug. ***