CVE-2024-25111

NameCVE-2024-25111
DescriptionSquid is a web proxy cache. Starting in version 3.5.27 and prior to version 6.8, Squid may be vulnerable to a Denial of Service attack against HTTP Chunked decoder due to an uncontrolled recursion bug. This problem allows a remote attacker to cause Denial of Service when sending a crafted, chunked, encoded HTTP Message. This bug is fixed in Squid version 6.8. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives. There is no workaround for this issue.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
squid (PTS)buster (security), buster, buster (lts)4.6-1+deb10u10vulnerable
bullseye (security), bullseye4.13-10+deb11u3vulnerable
bookworm (security), bookworm5.7-2+deb12u2fixed
sid, trixie6.12-1fixed
squid3 (PTS)jessie, jessie (lts)3.5.23-5+deb8u7fixed
stretch (security)3.5.23-5+deb9u7fixed
stretch (lts), stretch3.5.23-5+deb9u10fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
squidsourcebookworm5.7-2+deb12u1
squidsource(unstable)6.8-1
squid3sourcejessie(not affected)
squid3sourcestretch(not affected)
squid3source(unstable)(unfixed)

Notes

https://lists.squid-cache.org/pipermail/squid-announce/2024-March/000165.html
https://github.com/squid-cache/squid/security/advisories/GHSA-72c2-c3wm-8qxc
https://github.com/squid-cache/squid/pull/1553
https://github.com/squid-cache/squid/commit/50c5af88bd74208103722f87593a974bb0f0b8e9 (master)
https://github.com/squid-cache/squid/commit/4658d0fc049738c2e6cd25fc0af10e820cf4c11a (v6)
[stretch] - squid3 <not-affected> (vulnerable code introduced in 3.5.27)
[jessie] - squid3 <not-affected> (vulnerable code introduced in 3.5.27)

Search for package or bug name: Reporting problems