First published: Tue Jan 23 2024(Updated: )
Joshua Rogers discovered that Squid incorrectly handled HTTP message processing. A remote attacker could possibly use this issue to cause Squid to crash, resulting in a denial of service. (CVE-2023-49285) Joshua Rogers discovered that Squid incorrectly handled Helper process management. A remote attacker could possibly use this issue to cause Squid to crash, resulting in a denial of service. (CVE-2023-49286) Joshua Rogers discovered that Squid incorrectly handled HTTP request parsing. A remote attacker could possibly use this issue to cause Squid to crash, resulting in a denial of service. (CVE-2023-50269)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/squid | <6.1-2ubuntu1.2 | 6.1-2ubuntu1.2 |
Ubuntu | =23.10 | |
All of | ||
ubuntu/squid | <5.7-1ubuntu3.2 | 5.7-1ubuntu3.2 |
Ubuntu | =23.04 | |
All of | ||
ubuntu/squid | <5.7-0ubuntu0.22.04.3 | 5.7-0ubuntu0.22.04.3 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/squid | <4.10-1ubuntu1.9 | 4.10-1ubuntu1.9 |
Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-6594-1 is classified as a denial of service vulnerability that could lead to application crashes.
To fix USN-6594-1, upgrade Squid to the latest versions specified in the advisory for your Ubuntu release.
USN-6594-1 affects various versions of Squid across multiple Ubuntu releases including 20.04, 22.04, 23.04, and 23.10.
The impact of USN-6594-1 is that a remote attacker could exploit it to crash the Squid service, causing a denial of service.
The vulnerability in USN-6594-1 was discovered by Joshua Rogers.