USN-4446-1 fixed vulnerabilities in Squid. The update introduced a regression when using Squid with the icap or ecap protocols. This update fixes the problem.
We apologize for the inconvenience.
Original advisory details:
Jeriko One discovered that Squid incorrectly handled caching certain requests. A remote attacker could possibly use this issue to perform cache-injection attacks or gain access to reverse proxy features such as ESI. (CVE-2019-12520)
Jeriko One and Kristoffer Danielsson discovered that Squid incorrectly handled certain URN requests. A remote attacker could possibly use this issue to bypass access checks. (CVE-2019-12523)
Jeriko One discovered that Squid incorrectly handled URL decoding. A remote attacker could possibly use this issue to bypass certain rule checks. (CVE-2019-12524)
Jeriko One and Kristoffer Danielsson discovered that Squid incorrectly handled input validation. A remote attacker could use this issue to cause Squid to crash, resulting in a denial of service. (CVE-2019-18676)
{
"binaries": [
{
"binary_version": "3.5.12-1ubuntu7.13",
"binary_name": "squid"
},
{
"binary_version": "3.5.12-1ubuntu7.13",
"binary_name": "squid-cgi"
},
{
"binary_version": "3.5.12-1ubuntu7.13",
"binary_name": "squid-common"
},
{
"binary_version": "3.5.12-1ubuntu7.13",
"binary_name": "squid-purge"
},
{
"binary_version": "3.5.12-1ubuntu7.13",
"binary_name": "squid3"
},
{
"binary_version": "3.5.12-1ubuntu7.13",
"binary_name": "squidclient"
}
],
"availability": "No subscription required"
}
{
"binaries": [
{
"binary_version": "3.5.27-1ubuntu1.8",
"binary_name": "squid"
},
{
"binary_version": "3.5.27-1ubuntu1.8",
"binary_name": "squid-cgi"
},
{
"binary_version": "3.5.27-1ubuntu1.8",
"binary_name": "squid-common"
},
{
"binary_version": "3.5.27-1ubuntu1.8",
"binary_name": "squid-purge"
},
{
"binary_version": "3.5.27-1ubuntu1.8",
"binary_name": "squid3"
},
{
"binary_version": "3.5.27-1ubuntu1.8",
"binary_name": "squidclient"
}
],
"availability": "No subscription required"
}