CVE-2023-46728

NameCVE-2023-46728
DescriptionSquid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a NULL pointer dereference bug Squid is vulnerable to a Denial of Service attack against Squid's Gopher gateway. The gopher protocol is always available and enabled in Squid prior to Squid 6.0.1. Responses triggering this bug are possible to be received from any gopher server, even those without malicious intent. Gopher support has been removed in Squid version 6.0.1. Users are advised to upgrade. Users unable to upgrade should reject all gopher URL requests.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
squid (PTS)buster4.6-1+deb10u7vulnerable
buster (security)4.6-1+deb10u10vulnerable
bullseye4.13-10+deb11u2vulnerable
bullseye (security)4.13-10+deb11u3vulnerable
bookworm5.7-2vulnerable
bookworm (security)5.7-2+deb12u1vulnerable
trixie6.6-1fixed
sid6.9-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
squidsource(unstable)6.1-1

Notes

[bookworm] - squid <ignored> (unsupported, Gopher support has been removed upstream)
[bullseye] - squid <ignored> (unsupported, Gopher support has been removed upstream)
[buster] - squid <ignored> (unsupported, Gopher support has been removed upstream)
No code fix, gopher support was removed:
https://github.com/squid-cache/squid/commit/6ea12e8fb590ac6959e9356a81aa3370576568c3 (SQUID_6_0_1)
https://github.com/squid-cache/squid/security/advisories/GHSA-cg5h-v6vc-w33f
https://megamansec.github.io/Squid-Security-Audit/gopher-nullpointer.html

Search for package or bug name: Reporting problems