CVE-2023-5824

A flaw was found in Squid. The limits applied for validation of HTTP response headers are applied before caching. However, Squid may grow a cached HTTP response header beyond the configured maximum size, causing a stall or crash of the worker process when a large header is retrieved from the disk cache, resulting in a denial of service.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 83%
Affected Products (NVD)
VendorProductVersion
squid-cachesquid
𝑥
< 6.4
redhatenterprise_linux
6.0
redhatenterprise_linux
7.0
redhatenterprise_linux
8.0
redhatenterprise_linux
9.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
squid
bookworm
ignored
bookworm (security)
vulnerable
bullseye
ignored
bullseye (security)
vulnerable
sid
6.12-1
fixed
trixie
6.12-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
squid
bionic
ignored
focal
Fixed 4.10-1ubuntu1.12
released
jammy
Fixed 5.7-0ubuntu0.22.04.4
released
lunar
ignored
mantic
Fixed 6.1-2ubuntu1.3
released
noble
Fixed 6.5-1ubuntu1
released
oracular
Fixed 6.5-1ubuntu1
released
trusty
ignored
xenial
ignored
squid3
bionic
needed
focal
dne
jammy
dne
lunar
dne
mantic
dne
noble
dne
oracular
dne
trusty
ignored
xenial
needed
Red Hat logo
Red Hat Enterprise Linux Releases
Red Hat Product
Release
squid
RHEL 9
7:5.5-6.el9_3.2
fixed