Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2023-5824

Published: 3 November 2023

Squid is vulnerable to Denial of Service attack against HTTP and HTTPS clients due to an Improper Handling of Structural Elements bug.

Notes

AuthorNote
mdeslaur
as of 2024-01-26, this is not fixed in the upstream 5.x
repository. The patches to fix this issue are large and
intrusive.
Per the researcher's advisory, "Of course, such 'attacks' are
completely theoretical and are only considered for entertainment
purposes."
Ubuntu 20.04 LTS was patched in USN-6728-1, but the fix
introduced crashes and was backed out in USN-6728-2. It was
ultimately fixed in USN-6728-3.

Priority

Medium

Cvss 3 Severity Score

7.5

Score breakdown

Status

Package Release Status
squid
Launchpad, Ubuntu, Debian
bionic Ignored
(end of standard support)
focal
Released (4.10-1ubuntu1.12)
jammy
Released (5.7-0ubuntu0.22.04.4)
lunar Ignored
(end of life, was deferred [2024-01-26])
mantic
Released (6.1-2ubuntu1.3)
trusty Ignored
(end of standard support)
upstream
Released (6.5)
xenial Ignored
(end of standard support)
Patches:
upstream: https://github.com/squid-cache/squid/commit/a27bf4b84da23594150c7a86a23435df0b35b988
upstream: https://github.com/squid-cache/squid/commit/57acdb7dcec38605ede048db82b495ba316e6311
upstream: https://github.com/squid-cache/squid/commit/2f3efe5d9e1c9444cb3f95fc09cbbf52985f37bf
upstream: https://github.com/squid-cache/squid/commit/18209199f8c330176401eac7ef2deb06ca4389b9
vendor: https://git.rockylinux.org/staging/rpms/squid/-/blob/r9/SOURCES/squid-5.5-CVE-2023-5824.patch
vendor: https://git.rockylinux.org/staging/rpms/squid/-/blob/r8-stream-4/SOURCES/squid-4.15-CVE-2023-5824.patch
squid3
Launchpad, Ubuntu, Debian
bionic Needed

focal Does not exist

jammy Does not exist

lunar Does not exist

mantic Does not exist

trusty Ignored
(end of standard support)
upstream Needs triage

xenial Needed

Severity score breakdown

Parameter Value
Base score 7.5
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H