Published: 14 April 2014
Squid 3.1 before 3.3.12 and 3.4 before 3.4.4, when SSL-Bump is enabled, allows remote attackers to cause a denial of service (assertion failure) via a crafted range request, related to state management.
Launchpad, Ubuntu, Debian
|Ubuntu 16.04 ESM (Xenial Xerus)||
|Ubuntu 14.04 ESM (Trusty Tahr)||
Does not exist
(trusty was released [3.3.8-1ubuntu6.6])
Upstream: http://www.squid-cache.org/Versions/v3/3.3/changesets/squid-3.3-12677.patch (3.3)
Flaw requires building the package with --enable-ssl; this flag is not used in Debian nor Ubuntu's builds.
However, we should probably fix this anyway as rebuilding the Ubuntu package locally to enable ssl is a common scenario.