This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============5113406905785337425==
Content-Type: multipart/signed; micalg=pgp-sha256;
protocol="application/pgp-signature";
boundary="OswVcsulpzRELx5ZPVKmrwkpvOx4qaD2g"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--OswVcsulpzRELx5ZPVKmrwkpvOx4qaD2g
Content-Type: multipart/mixed; boundary="45GaF5xhhp7P4AJQMVGN7aFWod5w9STck";
protected-headers="v1"
From: Marc Deslauriers
Reply-To: Ubuntu Security
To: "ubuntu-security-announce@lists.ubuntu.com"
Message-ID: <5102eeea-882d-dd9c-9962-bebd5c717089@canonical.com>
Subject: [USN-4895-1] Squid vulnerabilities
--45GaF5xhhp7P4AJQMVGN7aFWod5w9STck
Content-Type: text/plain; charset=utf-8
Content-Language: en-C
Content-Transfer-Encoding: quoted-printable
==========================================================================
Ubuntu Security Notice USN-4895-1
March 29, 2021
squid, squid3 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.10
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in Squid.
Software Description:
- squid: Web proxy cache server
- squid3: Web proxy cache server
Details:
Alex Rousskov and Amit Klein discovered that Squid incorrectly handled
certain Content-Length headers. A remote attacker could possibly use this
issue to perform an HTTP request smuggling attack, resulting in cache
poisoning. This issue only affected Ubuntu 20.04 LTS. (CVE-2020-15049)
Jianjun Chen discovered that Squid incorrectly validated certain input. A
remote attacker could use this issue to perform HTTP Request Smuggling and
possibly access services forbidden by the security controls.
(CVE-2020-25097)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.10:
squid 4.13-1ubuntu2.1
Ubuntu 20.04 LTS:
squid 4.10-1ubuntu1.3
Ubuntu 18.04 LTS:
squid 3.5.27-1ubuntu1.10
Ubuntu 16.04 LTS:
squid 3.5.12-1ubuntu7.16
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-4895-1
CVE-2020-15049, CVE-2020-25097
Package Information:
https://launchpad.net/ubuntu/+source/squid/4.13-1ubuntu2.1
https://launchpad.net/ubuntu/+source/squid/4.10-1ubuntu1.3
https://launchpad.net/ubuntu/+source/squid3/3.5.27-1ubuntu1.10
https://launchpad.net/ubuntu/+source/squid3/3.5.12-1ubuntu7.16
--45GaF5xhhp7P4AJQMVGN7aFWod5w9STck--
--OswVcsulpzRELx5ZPVKmrwkpvOx4qaD2g
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"
-----BEGIN PGP SIGNATURE-----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=U2hi
-----END PGP SIGNATURE-----
--OswVcsulpzRELx5ZPVKmrwkpvOx4qaD2g--
--===============5113406905785337425==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline
LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK
--===============5113406905785337425==--
|