Bug 1217825 (CVE-2023-49288) - VUL-0: CVE-2023-49288: squid: Use-After-Free in the HTTP Collapsed Forwarding Feature
Summary: VUL-0: CVE-2023-49288: squid: Use-After-Free in the HTTP Collapsed Forwarding...
Status: IN_PROGRESS
: 1217778 (view as bug list)
Alias: CVE-2023-49288
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Major
Target Milestone: ---
Assignee: Adam Majer
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/387016/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-49288:7.5:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2023-12-05 15:37 UTC by SMASH SMASH
Modified: 2024-02-13 09:47 UTC (History)
5 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2023-12-05 15:37:06 UTC
Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Affected versions of squid are subject to a a Use-After-Free bug which can lead to a Denial of Service attack via collapsed forwarding. All versions of Squid from 3.5 up to and including 5.9 configured with "collapsed_forwarding on" are vulnerable. Configurations with "collapsed_forwarding off" or without a "collapsed_forwarding" directive are not vulnerable. This bug is fixed by Squid version 6.0.1. Users are advised to upgrade. Users unable to upgrade should remove all collapsed_forwarding lines from their squid.conf.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-49288
https://github.com/squid-cache/squid/security/advisories/GHSA-rj5h-46j6-q2g5
Comment 4 Andrea Mattiazzo 2023-12-13 09:29:14 UTC
Could you please double check my assumption? With the information in the advisory, I wasn't able to find the specific flow and which pointers are affected by this use-after-free bug.
Comment 5 Gabriele Sonnu 2023-12-13 10:49:21 UTC
*** Bug 1217778 has been marked as a duplicate of this bug. ***