ALAS-2024-1916

Related Vulnerabilities: CVE-2023-50269  

Squid is a caching proxy for the Web. Due to an Uncontrolled Recursion bug in versions 2.6 through 2.7.STABLE9, versions 3.1 through 5.9, and versions 6.0.1 through 6.5, Squid may be vulnerable to a Denial of Service attack against HTTP Request parsing. This problem allows a remote client to perform Denial of Service attack by sending a large X-Forwarded-For header when the follow_x_forwarded_for feature is configured. This bug is fixed by Squid version 6.6. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives. (CVE-2023-50269)

ALAS-2024-1916


Amazon Linux 1 Security Advisory: ALAS-2024-1916
Advisory Release Date: 2024-02-01 19:33 Pacific
Advisory Updated Date: 2024-02-01 19:33 Pacific
Severity: Important

Issue Overview:

Squid is a caching proxy for the Web. Due to an Uncontrolled Recursion bug in versions 2.6 through 2.7.STABLE9, versions 3.1 through 5.9, and versions 6.0.1 through 6.5, Squid may be vulnerable to a Denial of Service attack against HTTP Request parsing. This problem allows a remote client to perform Denial of Service attack by sending a large X-Forwarded-For header when the follow_x_forwarded_for feature is configured. This bug is fixed by Squid version 6.6. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives. (CVE-2023-50269)


Affected Packages:

squid


Issue Correction:
Run yum update squid to update your system.

New Packages:
i686:
    squid-debuginfo-3.5.20-17.54.amzn1.i686
    squid-migration-script-3.5.20-17.54.amzn1.i686
    squid-3.5.20-17.54.amzn1.i686

src:
    squid-3.5.20-17.54.amzn1.src

x86_64:
    squid-3.5.20-17.54.amzn1.x86_64
    squid-debuginfo-3.5.20-17.54.amzn1.x86_64
    squid-migration-script-3.5.20-17.54.amzn1.x86_64