CVE-2024-25111

NameCVE-2024-25111
DescriptionSquid is a web proxy cache. Starting in version 3.5.27 and prior to version 6.8, Squid may be vulnerable to a Denial of Service attack against HTTP Chunked decoder due to an uncontrolled recursion bug. This problem allows a remote attacker to cause Denial of Service when sending a crafted, chunked, encoded HTTP Message. This bug is fixed in Squid version 6.8. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives. There is no workaround for this issue.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
squid (PTS)buster4.6-1+deb10u7vulnerable
buster (security)4.6-1+deb10u10vulnerable
bullseye4.13-10+deb11u2vulnerable
bullseye (security)4.13-10+deb11u3vulnerable
bookworm5.7-2vulnerable
bookworm (security)5.7-2+deb12u1fixed
trixie6.6-1vulnerable
sid6.9-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
squidsourcebookworm5.7-2+deb12u1
squidsource(unstable)6.8-1
squid3source(unstable)(unfixed)

Notes

https://lists.squid-cache.org/pipermail/squid-announce/2024-March/000165.html
https://github.com/squid-cache/squid/security/advisories/GHSA-72c2-c3wm-8qxc
https://github.com/squid-cache/squid/pull/1553
https://github.com/squid-cache/squid/commit/50c5af88bd74208103722f87593a974bb0f0b8e9 (master)
https://github.com/squid-cache/squid/commit/4658d0fc049738c2e6cd25fc0af10e820cf4c11a (v6)

Search for package or bug name: Reporting problems