Bugzilla – Bug 1219131
VUL-0: CVE-2024-23638: squid: Denial of Service attack against Cache Manager error responses
Last modified: 2024-03-07 10:09:18 UTC
Squid is a caching proxy for the Web. Due to an expired pointer reference bug, Squid prior to version 6.6 is vulnerable to a Denial of Service attack against Cache Manager error responses. This problem allows a trusted client to perform Denial of Service when generating error pages for Client Manager reports. Squid older than 5.0.5 have not been tested and should be assumed to be vulnerable. All Squid-5.x up to and including 5.9 are vulnerable. All Squid-6.x up to and including 6.5 are vulnerable. This bug is fixed by Squid version 6.6. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives. As a workaround, prevent access to Cache Manager using Squid's main access control: `http_access deny manager`. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-23638 https://github.com/squid-cache/squid/security/advisories/GHSA-j49p-553x-48rx https://www.cve.org/CVERecord?id=CVE-2024-23638 Patch: http://www.squid-cache.org/Versions/v5/SQUID-2023_11.patch http://www.squid-cache.org/Versions/v6/SQUID-2023_11.patch
Tracking as affected: - SUSE:SLE-12-SP2:Update/squid - SUSE:SLE-12-SP3:Update:Products:Teradata:Update/squid - SUSE:SLE-12-SP5:Update/squid - SUSE:SLE-15-SP4:Update/squid - SUSE:SLE-15:Update/squid
SUSE-SU-2024:0296-1: An update that solves two vulnerabilities can now be installed. Category: security (important) Bug References: 1217654, 1219131 CVE References: CVE-2023-50269, CVE-2024-23638 Sources used: SUSE Linux Enterprise High Performance Computing 12 SP5 (src): squid-4.17-4.41.1 SUSE Linux Enterprise Server 12 SP5 (src): squid-4.17-4.41.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): squid-4.17-4.41.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2024:0298-1: An update that solves two vulnerabilities can now be installed. Category: security (important) Bug References: 1217654, 1219131 CVE References: CVE-2023-50269, CVE-2024-23638 Sources used: SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): squid-4.17-150000.5.49.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): squid-4.17-150000.5.49.1 SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): squid-4.17-150000.5.49.1 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): squid-4.17-150000.5.49.1 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): squid-4.17-150000.5.49.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): squid-4.17-150000.5.49.1 SUSE Enterprise Storage 7.1 (src): squid-4.17-150000.5.49.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2024:0455-1: An update that solves two vulnerabilities can now be installed. Category: security (important) Bug References: 1217654, 1219131 CVE References: CVE-2023-50269, CVE-2024-23638 Sources used: openSUSE Leap 15.4 (src): squid-5.7-150400.3.23.1 openSUSE Leap 15.5 (src): squid-5.7-150400.3.23.1 Server Applications Module 15-SP5 (src): squid-5.7-150400.3.23.1 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (src): squid-5.7-150400.3.23.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (src): squid-5.7-150400.3.23.1 SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (src): squid-5.7-150400.3.23.1 SUSE Linux Enterprise Server for SAP Applications 15 SP4 (src): squid-5.7-150400.3.23.1 SUSE Manager Proxy 4.3 (src): squid-5.7-150400.3.23.1 SUSE Manager Retail Branch Server 4.3 (src): squid-5.7-150400.3.23.1 SUSE Manager Server 4.3 (src): squid-5.7-150400.3.23.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.