USN-5771-1

Source
https://ubuntu.com/security/notices/USN-5771-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5771-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-5771-1
Published
2022-12-12T00:46:49Z
Modified
2026-02-10T04:42:52Z
Summary
squid3 regression
Details

USN-3557-1 fixed vulnerabilities in Squid. This update introduced a regression which could cause the cache log to be filled with many Vary loop messages. This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

Mathias Fischer discovered that Squid incorrectly handled certain long strings in headers. A malicious remote server could possibly cause Squid to crash, resulting in a denial of service. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2016-2569)

William Lima discovered that Squid incorrectly handled XML parsing when processing Edge Side Includes (ESI). A malicious remote server could possibly cause Squid to crash, resulting in a denial of service. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2016-2570)

Alex Rousskov discovered that Squid incorrectly handled response-parsing failures. A malicious remote server could possibly cause Squid to crash, resulting in a denial of service. This issue only applied to Ubuntu 16.04 LTS. (CVE-2016-2571)

Santiago Ruano Rincón discovered that Squid incorrectly handled certain Vary headers. A remote attacker could possibly use this issue to cause Squid to crash, resulting in a denial of service. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2016-3948)

Louis Dion-Marcil discovered that Squid incorrectly handled certain Edge Side Includes (ESI) responses. A malicious remote server could possibly cause Squid to crash, resulting in a denial of service. (CVE-2018-1000024)

Louis Dion-Marcil discovered that Squid incorrectly handled certain Edge Side Includes (ESI) responses. A malicious remote server could possibly cause Squid to crash, resulting in a denial of service. (CVE-2018-1000027)

References

Affected packages

Ubuntu:Pro:16.04:LTS / squid3

Package

Name
squid3
Purl
pkg:deb/ubuntu/squid3@3.5.12-1ubuntu7.16+esm1?arch=source&distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.5.12-1ubuntu7.16+esm1

Affected versions

3.*
3.3.8-1ubuntu16
3.3.8-1ubuntu17
3.5.12-1ubuntu6
3.5.12-1ubuntu7
3.5.12-1ubuntu7.1
3.5.12-1ubuntu7.2
3.5.12-1ubuntu7.3
3.5.12-1ubuntu7.4
3.5.12-1ubuntu7.5
3.5.12-1ubuntu7.6
3.5.12-1ubuntu7.7
3.5.12-1ubuntu7.8
3.5.12-1ubuntu7.9
3.5.12-1ubuntu7.10
3.5.12-1ubuntu7.11
3.5.12-1ubuntu7.12
3.5.12-1ubuntu7.13
3.5.12-1ubuntu7.14
3.5.12-1ubuntu7.15
3.5.12-1ubuntu7.16

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "3.5.12-1ubuntu7.16+esm1",
            "binary_name": "squid"
        },
        {
            "binary_version": "3.5.12-1ubuntu7.16+esm1",
            "binary_name": "squid-cgi"
        },
        {
            "binary_version": "3.5.12-1ubuntu7.16+esm1",
            "binary_name": "squid-common"
        },
        {
            "binary_version": "3.5.12-1ubuntu7.16+esm1",
            "binary_name": "squid-purge"
        },
        {
            "binary_version": "3.5.12-1ubuntu7.16+esm1",
            "binary_name": "squid3"
        },
        {
            "binary_version": "3.5.12-1ubuntu7.16+esm1",
            "binary_name": "squidclient"
        }
    ],
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5771-1.json"
cves_map
{
    "ecosystem": "Ubuntu:Pro:16.04:LTS",
    "cves": []
}