USN-4981-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-4981-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4981-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-4981-1
Related
Published
2021-06-03T16:24:27.876407Z
Modified
2021-06-03T16:24:27.876407Z
Summary
squid, squid3 vulnerabilities
Details

Joshua Rogers discovered that Squid incorrectly handled requests with the urn: scheme. A remote attacker could possibly use this issue to cause Squid to consume resources, leading to a denial of service. (CVE-2021-28651)

Joshua Rogers discovered that Squid incorrectly handled requests to the Cache Manager API. A remote attacker with access privileges could possibly use this issue to cause Squid to consume resources, leading to a denial of service. This issue was only addressed in Ubuntu 20.04 LTS, Ubuntu 20.10, and Ubuntu 21.04. (CVE-2021-28652)

Joshua Rogers discovered that Squid incorrectly handled certain response headers. A remote attacker could possibly use this issue to cause Squid to crash, resulting in a denial of service. This issue was only affected Ubuntu 20.04 LTS, Ubuntu 20.10, and Ubuntu 21.04. (CVE-2021-28662)

Joshua Rogers discovered that Squid incorrectly handled range request processing. A remote attacker could possibly use this issue to cause Squid to crash, resulting in a denial of service. (CVE-2021-31806, CVE-2021-31807, CVE-2021-31808)

Joshua Rogers discovered that Squid incorrectly handled certain HTTP responses. A remote attacker could possibly use this issue to cause Squid to crash, resulting in a denial of service. (CVE-2021-33620)

References

Affected packages

Ubuntu:18.04:LTS / squid3

Package

Name
squid3
Purl
pkg:deb/ubuntu/squid3@3.5.27-1ubuntu1.11?arch=src?distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.5.27-1ubuntu1.11

Affected versions

3.*

3.5.23-5ubuntu1
3.5.23-5ubuntu2
3.5.27-1ubuntu1
3.5.27-1ubuntu1.1
3.5.27-1ubuntu1.2
3.5.27-1ubuntu1.3
3.5.27-1ubuntu1.4
3.5.27-1ubuntu1.5
3.5.27-1ubuntu1.6
3.5.27-1ubuntu1.7
3.5.27-1ubuntu1.8
3.5.27-1ubuntu1.9
3.5.27-1ubuntu1.10

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "squid": "3.5.27-1ubuntu1.11",
            "squid-dbg": "3.5.27-1ubuntu1.11",
            "squid-common": "3.5.27-1ubuntu1.11",
            "squid-cgi": "3.5.27-1ubuntu1.11",
            "squidclient": "3.5.27-1ubuntu1.11",
            "squid-purge": "3.5.27-1ubuntu1.11",
            "squid3": "3.5.27-1ubuntu1.11"
        }
    ]
}

Ubuntu:20.04:LTS / squid

Package

Name
squid
Purl
pkg:deb/ubuntu/squid@4.10-1ubuntu1.4?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.10-1ubuntu1.4

Affected versions

4.*

4.8-1ubuntu2
4.8-1ubuntu3
4.9-2ubuntu1
4.9-2ubuntu2
4.9-2ubuntu3
4.9-2ubuntu4
4.10-1ubuntu1
4.10-1ubuntu1.1
4.10-1ubuntu1.2
4.10-1ubuntu1.3

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "squid": "4.10-1ubuntu1.4",
            "squid-common": "4.10-1ubuntu1.4",
            "squid-cgi": "4.10-1ubuntu1.4",
            "squidclient": "4.10-1ubuntu1.4",
            "squid-purge": "4.10-1ubuntu1.4",
            "squid-cgi-dbgsym": "4.10-1ubuntu1.4",
            "squidclient-dbgsym": "4.10-1ubuntu1.4",
            "squid-purge-dbgsym": "4.10-1ubuntu1.4",
            "squid-dbgsym": "4.10-1ubuntu1.4"
        }
    ]
}