A flaw was found in Squid. The limits applied for validation of HTTP response headers are applied before caching. However, Squid may grow a cached HTTP response header beyond the configured maximum size, causing a stall or crash of the worker process when a large header is retrieved from the disk cache, resulting in a denial of service.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 08:42
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://access.redhat.com/errata/RHSA-2023:7465 - | |
References | () https://access.redhat.com/errata/RHSA-2023:7668 - | |
References | () https://access.redhat.com/errata/RHSA-2024:0072 - | |
References | () https://access.redhat.com/errata/RHSA-2024:0397 - | |
References | () https://access.redhat.com/errata/RHSA-2024:0771 - | |
References | () https://access.redhat.com/errata/RHSA-2024:0772 - | |
References | () https://access.redhat.com/errata/RHSA-2024:0773 - | |
References | () https://access.redhat.com/errata/RHSA-2024:1153 - | |
References | () https://access.redhat.com/security/cve/CVE-2023-5824 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2245914 - Issue Tracking | |
References | () https://github.com/squid-cache/squid/security/advisories/GHSA-543m-w2m2-g255 - Vendor Advisory |
24 Oct 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) A flaw was found in Squid. The limits applied for validation of HTTP response headers are applied before caching. However, Squid may grow a cached HTTP response header beyond the configured maximum size, causing a stall or crash of the worker process when a large header is retrieved from the disk cache, resulting in a denial of service. |
16 Sep 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Apr 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
12 Feb 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Jan 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
08 Jan 2024, 09:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
06 Dec 2023, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
30 Nov 2023, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
22 Nov 2023, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
13 Nov 2023, 18:25
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2245914 - Issue Tracking | |
References | (MISC) https://access.redhat.com/security/cve/CVE-2023-5824 - Third Party Advisory | |
References | (MISC) https://github.com/squid-cache/squid/security/advisories/GHSA-543m-w2m2-g255 - Vendor Advisory | |
CPE | cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CWE | CWE-755 | |
First Time |
Redhat enterprise Linux
Squid-cache squid Squid-cache Redhat |
03 Nov 2023, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-03 08:15
Updated : 2024-11-21 08:42
NVD link : CVE-2023-5824
Mitre link : CVE-2023-5824
CVE.ORG link : CVE-2023-5824
JSON object : View
Products Affected
squid-cache
- squid
redhat
- enterprise_linux
CWE
CWE-755
Improper Handling of Exceptional Conditions