This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============2138794542907450662== Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="YmbtcLg3m4tYXWsG6LPxwfK5YB1SfYwCV"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --YmbtcLg3m4tYXWsG6LPxwfK5YB1SfYwCV Content-Type: multipart/mixed; boundary="sN4nnwPzDOcMkI1JWmpO3Ku7JvcHiOynU"; protected-headers="v1" From: Marc Deslauriers <marc.deslauriers@canonical.com> Reply-To: Ubuntu Security <security@ubuntu.com> To: "ubuntu-security-announce@lists.ubuntu.com" <ubuntu-security-announce@lists.ubuntu.com> Message-ID: <83a60eb8-ed86-569f-4b7d-a827933c5efd@canonical.com> Subject: [USN-4981-1] Squid vulnerabilities
--sN4nnwPzDOcMkI1JWmpO3Ku7JvcHiOynU Content-Type: text/plain; charset=utf-8 Content-Language: en-C Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-4981-1 June 03, 2021
squid, squid3 vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 21.04 - Ubuntu 20.10 - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS
Summary:
Several security issues were fixed in Squid.
Software Description: - squid: Web proxy cache server - squid3: Web proxy cache server
Details:
Joshua Rogers discovered that Squid incorrectly handled requests with the urn: scheme. A remote attacker could possibly use this issue to cause Squid to consume resources, leading to a denial of service. (CVE-2021-28651)
Joshua Rogers discovered that Squid incorrectly handled requests to the Cache Manager API. A remote attacker with access privileges could possibly use this issue to cause Squid to consume resources, leading to a denial of service. This issue was only addressed in Ubuntu 20.04 LTS, Ubuntu 20.10, and Ubuntu 21.04. (CVE-2021-28652)
Joshua Rogers discovered that Squid incorrectly handled certain response headers. A remote attacker could possibly use this issue to cause Squid to crash, resulting in a denial of service. This issue was only affected Ubuntu 20.04 LTS, Ubuntu 20.10, and Ubuntu 21.04. (CVE-2021-28662)
Joshua Rogers discovered that Squid incorrectly handled range request processing. A remote attacker could possibly use this issue to cause Squid to crash, resulting in a denial of service. (CVE-2021-31806, CVE-2021-31807, CVE-2021-31808)
Joshua Rogers discovered that Squid incorrectly handled certain HTTP responses. A remote attacker could possibly use this issue to cause Squid to crash, resulting in a denial of service. (CVE-2021-33620)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 21.04: squid 4.13-1ubuntu4.1
Ubuntu 20.10: squid 4.13-1ubuntu2.2
Ubuntu 20.04 LTS: squid 4.10-1ubuntu1.4
Ubuntu 18.04 LTS: squid 3.5.27-1ubuntu1.11
In general, a standard system update will make all the necessary changes.
References: https://ubuntu.com/security/notices/USN-4981-1 CVE-2021-28651, CVE-2021-28652, CVE-2021-28662, CVE-2021-31806, CVE-2021-31807, CVE-2021-31808, CVE-2021-33620
Package Information: https://launchpad.net/ubuntu/+source/squid/4.13-1ubuntu4.1 https://launchpad.net/ubuntu/+source/squid/4.13-1ubuntu2.2 https://launchpad.net/ubuntu/+source/squid/4.10-1ubuntu1.4 https://launchpad.net/ubuntu/+source/squid3/3.5.27-1ubuntu1.11
--sN4nnwPzDOcMkI1JWmpO3Ku7JvcHiOynU--
--YmbtcLg3m4tYXWsG6LPxwfK5YB1SfYwCV Content-Type: application/pgp-signature; name="OpenPGP_signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="OpenPGP_signature"
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEUMSg3c8x5FLOsZtRZWnYVadEvpMFAmC5B3EACgkQZWnYVadE vpNDPRAAtPC/iMUHMt3HOKa+antwFyveih7wy3DVFzUYLLeYJ2+gy7ujxjNbZIXZ QlGL7J3Molo1+7LuzCNMf0gGip775rZelL+ELP9sXXBpjV3qxzE00bY5lIjor48A 43BKWQvtqgtlsQ3pGEoUC8iD4W2LLADkPWLBS/xKpS2Y6Ae6PTRl1+NEOnVBSPRN h2yqJTeZsK3Z04F6LdGfT87kD92yzuciqvj19NefSOyhuOC8KbgXbu2YFnyDOla2 jngfC33pi7tbqc+4k+CJ4xl2PaVirJxLZAhbb5hSf0kYVO8C4ni2/wZB008MG+ru FInbAya0o7OLq5FxRZuau1EffGfGArbOqbuGBMS3T4cANaPUTx53MmOj9w5rGgTD GSu9jtRjMGX6wTEO0FcdP+z25K324geWvy+phdJvg7wtMErUtY0Bk/hKphxDblZR BxDjTaelRZEmW8mDqfLIIpA5/DQLpaBmtkY6mzkC2XJ/FYsQGGV4tfrEX/uaMDdq x9+Lba4IKDN9CznIsbAmz+HO7aIZL/iDvD/bSzN4Bk3dHvdqMCgC2abDp0+AXqKH Lr6+sKTioRSVplgX5X9+WHxcQ//MgVzghyhjF1+Qp6itnr/4s0wf0qAxympfDIi4 qIfDJP77LpiDvFLuYfSv4NcmA6D5bpy6o19DhVf3CiwllNB4tWg= =b6ig -----END PGP SIGNATURE-----
--YmbtcLg3m4tYXWsG6LPxwfK5YB1SfYwCV--
--===============2138794542907450662== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5 LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj dXJpdHktYW5ub3VuY2UK
--===============2138794542907450662==--
|