{
  "document": {
    "aggregate_severity": {
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "CVE-2024-23638: Fix Denial of Service attack against Cache Manager error responses\n- CVE-2024-37894: Fix Out-of-bounds Write error when assigning ESI variables",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2025:1736860159",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1736860159"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/almalinux9.2esu/advisories/2025/clsa-2025_1736860159.json"
      }
    ],
    "tracking": {
      "current_release_date": "2026-05-12T21:41:30Z",
      "generator": {
        "date": "2026-05-12T21:41:30Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2025:1736860159",
      "initial_release_date": "2025-01-14T08:09:22Z",
      "revision_history": [
        {
          "date": "2025-01-14T08:09:22Z",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2026-05-12T21:41:30Z",
          "number": "2",
          "summary": "Official Publication"
        }
      ],
      "status": "final",
      "version": "2"
    },
    "title": "squid: Fix of 2 CVEs"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "AlmaLinux 9.2",
                "product": {
                  "name": "AlmaLinux 9.2",
                  "product_id": "AlmaLinux-9.2",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:almalinux:almalinux:9.2:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "AlmaLinux"
          }
        ],
        "category": "vendor",
        "name": "AlmaLinux OS Foundation"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "squid-7:5.5-5.el9_2.1.tuxcare.els5.x86_64",
                "product": {
                  "name": "squid-7:5.5-5.el9_2.1.tuxcare.els5.x86_64",
                  "product_id": "squid-7:5.5-5.el9_2.1.tuxcare.els5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/squid@5.5-5.el9_2.1.tuxcare.els5?arch=x86_64&epoch=7"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "squid-7:5.5-5.el9_2.1.tuxcare.els4.x86_64",
                "product": {
                  "name": "squid-7:5.5-5.el9_2.1.tuxcare.els4.x86_64",
                  "product_id": "squid-7:5.5-5.el9_2.1.tuxcare.els4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/squid@5.5-5.el9_2.1.tuxcare.els4?arch=x86_64&epoch=7"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "squid-7:5.5-5.el9_2.1.tuxcare.els3.x86_64",
                "product": {
                  "name": "squid-7:5.5-5.el9_2.1.tuxcare.els3.x86_64",
                  "product_id": "squid-7:5.5-5.el9_2.1.tuxcare.els3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/squid@5.5-5.el9_2.1.tuxcare.els3?arch=x86_64&epoch=7"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "squid-7:5.5-5.el9_2.1.tuxcare.els1.x86_64",
                "product": {
                  "name": "squid-7:5.5-5.el9_2.1.tuxcare.els1.x86_64",
                  "product_id": "squid-7:5.5-5.el9_2.1.tuxcare.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/squid@5.5-5.el9_2.1.tuxcare.els1?arch=x86_64&epoch=7"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "squid-7:5.5-5.el9_2.1.tuxcare.els5.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:squid-7:5.5-5.el9_2.1.tuxcare.els5.x86_64"
        },
        "product_reference": "squid-7:5.5-5.el9_2.1.tuxcare.els5.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "squid-7:5.5-5.el9_2.1.tuxcare.els4.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:squid-7:5.5-5.el9_2.1.tuxcare.els4.x86_64"
        },
        "product_reference": "squid-7:5.5-5.el9_2.1.tuxcare.els4.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "squid-7:5.5-5.el9_2.1.tuxcare.els3.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:squid-7:5.5-5.el9_2.1.tuxcare.els3.x86_64"
        },
        "product_reference": "squid-7:5.5-5.el9_2.1.tuxcare.els3.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "squid-7:5.5-5.el9_2.1.tuxcare.els1.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:squid-7:5.5-5.el9_2.1.tuxcare.els1.x86_64"
        },
        "product_reference": "squid-7:5.5-5.el9_2.1.tuxcare.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-37894",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to an Out-of-bounds Write error when assigning ESI variables, Squid is susceptible to a Memory Corruption error. This error can lead to a Denial of Service attack.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:squid-7:5.5-5.el9_2.1.tuxcare.els5.x86_64"
        ],
        "known_affected": [
          "AlmaLinux-9.2:squid-7:5.5-5.el9_2.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:squid-7:5.5-5.el9_2.1.tuxcare.els3.x86_64",
          "AlmaLinux-9.2:squid-7:5.5-5.el9_2.1.tuxcare.els4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-37894"
        }
      ],
      "release_date": "2024-06-25T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-01-14T08:09:22Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1736860159",
          "product_ids": [
            "AlmaLinux-9.2:squid-7:5.5-5.el9_2.1.tuxcare.els5.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1736860159"
        },
        {
          "category": "none_available",
          "date": "2024-06-25T00:00:00Z",
          "details": "Affected",
          "product_ids": [
            "AlmaLinux-9.2:squid-7:5.5-5.el9_2.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:squid-7:5.5-5.el9_2.1.tuxcare.els3.x86_64",
            "AlmaLinux-9.2:squid-7:5.5-5.el9_2.1.tuxcare.els4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:squid-7:5.5-5.el9_2.1.tuxcare.els5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2024-23638",
      "cwe": {
        "id": "CWE-825",
        "name": "Expired Pointer Dereference"
      },
      "notes": [
        {
          "category": "description",
          "text": "Squid is a caching proxy for the Web. Due to an expired pointer reference bug, Squid prior to version 6.6 is vulnerable to a Denial of Service attack against Cache Manager error responses. This problem allows a trusted client to perform Denial of Service when generating error pages for Client Manager reports. Squid older than 5.0.5 have not been tested and should be assumed to be vulnerable. All Squid-5.x up to and including 5.9 are vulnerable. All Squid-6.x up to and including 6.5 are vulnerable. This bug is fixed by Squid version 6.6. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives. As a workaround, prevent access to Cache Manager using Squid's main access control: `http_access deny manager`.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:squid-7:5.5-5.el9_2.1.tuxcare.els5.x86_64"
        ],
        "known_affected": [
          "AlmaLinux-9.2:squid-7:5.5-5.el9_2.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:squid-7:5.5-5.el9_2.1.tuxcare.els3.x86_64",
          "AlmaLinux-9.2:squid-7:5.5-5.el9_2.1.tuxcare.els4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-23638"
        },
        {
          "category": "external",
          "summary": "http://www.squid-cache.org/Versions/v5/SQUID-2023_11.patch",
          "url": "http://www.squid-cache.org/Versions/v5/SQUID-2023_11.patch"
        },
        {
          "category": "external",
          "summary": "http://www.squid-cache.org/Versions/v6/SQUID-2023_11.patch",
          "url": "http://www.squid-cache.org/Versions/v6/SQUID-2023_11.patch"
        },
        {
          "category": "external",
          "summary": "https://github.com/squid-cache/squid/commit/290ae202883ac28a48867079c2fb34c40efd382b",
          "url": "https://github.com/squid-cache/squid/commit/290ae202883ac28a48867079c2fb34c40efd382b"
        },
        {
          "category": "external",
          "summary": "https://github.com/squid-cache/squid/commit/e8118a7381213f5cfcdeb4cec1d2d854bfd261c8",
          "url": "https://github.com/squid-cache/squid/commit/e8118a7381213f5cfcdeb4cec1d2d854bfd261c8"
        },
        {
          "category": "external",
          "summary": "https://github.com/squid-cache/squid/security/advisories/GHSA-j49p-553x-48rx",
          "url": "https://github.com/squid-cache/squid/security/advisories/GHSA-j49p-553x-48rx"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7R4KPSO3MQT3KAOZV7LC2GG3CYMCGK7H/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7R4KPSO3MQT3KAOZV7LC2GG3CYMCGK7H/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWQHRDRHDM5PQTU6BHH4C5KGL37X6TVI/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWQHRDRHDM5PQTU6BHH4C5KGL37X6TVI/"
        },
        {
          "category": "external",
          "summary": "https://megamansec.github.io/Squid-Security-Audit/stream-assert.html",
          "url": "https://megamansec.github.io/Squid-Security-Audit/stream-assert.html"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20240208-0010/",
          "url": "https://security.netapp.com/advisory/ntap-20240208-0010/"
        }
      ],
      "release_date": "2024-01-24T00:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-01-14T08:09:22Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1736860159",
          "product_ids": [
            "AlmaLinux-9.2:squid-7:5.5-5.el9_2.1.tuxcare.els5.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1736860159"
        },
        {
          "category": "none_available",
          "date": "2024-01-24T00:15:00Z",
          "details": "Affected",
          "product_ids": [
            "AlmaLinux-9.2:squid-7:5.5-5.el9_2.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:squid-7:5.5-5.el9_2.1.tuxcare.els3.x86_64",
            "AlmaLinux-9.2:squid-7:5.5-5.el9_2.1.tuxcare.els4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:squid-7:5.5-5.el9_2.1.tuxcare.els5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    }
  ]
}