==========================================================================
Ubuntu Security Notice USN-4551-1
September 28, 2020
squid3 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in Squid.
Software Description:
– squid3: Web proxy cache server
Details:
Alex Rousskov and Amit Klein discovered that Squid incorrectly handled
certain Content-Length headers. A remote attacker could possibly use this
issue to perform an HTTP request smuggling attack, resulting in cache
poisoning. (CVE-2020-15049)
Amit Klein discovered that Squid incorrectly validated certain data. A
remote attacker could possibly use this issue to perform an HTTP request
smuggling attack, resulting in cache poisoning. (CVE-2020-15810)
Régis Leroy discovered that Squid incorrectly validated certain data. A
remote attacker could possibly use this issue to perform an HTTP request
splitting attack, resulting in cache poisoning. (CVE-2020-15811)
Lubos Uhliarik discovered that Squid incorrectly handled certain Cache
Digest response messages sent by trusted peers. A remote attacker could
possibly use this issue to cause Squid to consume resources, resulting in a
denial of service. (CVE-2020-24606)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS:
squid 3.5.27-1ubuntu1.9
Ubuntu 16.04 LTS:
squid 3.5.12-1ubuntu7.15
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/4551-1
CVE-2020-15049, CVE-2020-15810, CVE-2020-15811, CVE-2020-24606
Package Information:
https://launchpad.net/ubuntu/+source/squid3/3.5.27-1ubuntu1.9
https://launchpad.net/ubuntu/+source/squid3/3.5.12-1ubuntu7.15
—–BEGIN PGP SIGNATURE—–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=rb/d
—–END PGP SIGNATURE—–
—