USN-4477-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-4477-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4477-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-4477-1
Related
Published
2020-08-27T17:13:52.756328Z
Modified
2020-08-27T17:13:52.756328Z
Summary
squid vulnerabilities
Details

Amit Klein discovered that Squid incorrectly validated certain data. A remote attacker could possibly use this issue to perform an HTTP request smuggling attack, resulting in cache poisoning. (CVE-2020-15810)

Régis Leroy discovered that Squid incorrectly validated certain data. A remote attacker could possibly use this issue to perform an HTTP request splitting attack, resulting in cache poisoning. (CVE-2020-15811)

Lubos Uhliarik discovered that Squid incorrectly handled certain Cache Digest response messages sent by trusted peers. A remote attacker could possibly use this issue to cause Squid to consume resources, resulting in a denial of service. (CVE-2020-24606)

References

Affected packages

Ubuntu:20.04:LTS / squid

Package

Name
squid
Purl
pkg:deb/ubuntu/squid@4.10-1ubuntu1.2?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.10-1ubuntu1.2

Affected versions

4.*

4.8-1ubuntu2
4.8-1ubuntu3
4.9-2ubuntu1
4.9-2ubuntu2
4.9-2ubuntu3
4.9-2ubuntu4
4.10-1ubuntu1
4.10-1ubuntu1.1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "squid": "4.10-1ubuntu1.2",
            "squid-common": "4.10-1ubuntu1.2",
            "squid-cgi": "4.10-1ubuntu1.2",
            "squidclient": "4.10-1ubuntu1.2",
            "squid-purge": "4.10-1ubuntu1.2",
            "squid-cgi-dbgsym": "4.10-1ubuntu1.2",
            "squidclient-dbgsym": "4.10-1ubuntu1.2",
            "squid-purge-dbgsym": "4.10-1ubuntu1.2",
            "squid-dbgsym": "4.10-1ubuntu1.2"
        }
    ]
}