USN-6857-1: Squid vulnerabilities
27 June 2024
Several security issues were fixed in Squid.
Releases
Packages
- squid3 - Web proxy cache server
Details
Joshua Rogers discovered that Squid incorrectly handled requests with the
urn: scheme. A remote attacker could possibly use this issue to cause
Squid to consume resources, leading to a denial of service. This issue
only affected Ubuntu 16.04 LTS. (CVE-2021-28651)
It was discovered that Squid incorrectly handled SSPI and SMB
authentication. A remote attacker could use this issue to cause Squid to
crash, resulting in a denial of service, or possibly obtain sensitive
information. This issue only affected Ubuntu 16.04 LTS. (CVE-2022-41318)
Joshua Rogers discovered that Squid incorrectly handled HTTP message
processing. A remote attacker could possibly use this issue to cause
Squid to crash, resulting in a denial of service. (CVE-2023-49285)
Joshua Rogers discovered that Squid incorrectly handled Helper process
management. A remote attacker could possibly use this issue to cause
Squid to crash, resulting in a denial of service. (CVE-2023-49286)
Joshua Rogers discovered that Squid incorrectly handled HTTP request
parsing. A remote attacker could possibly use this issue to cause
Squid to crash, resulting in a denial of service.
(CVE-2023-50269, CVE-2024-25617)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 18.04
-
squid
-
3.5.27-1ubuntu1.14+esm2
Available with Ubuntu Pro
-
squid3
-
3.5.27-1ubuntu1.14+esm2
Available with Ubuntu Pro
Ubuntu 16.04
-
squid
-
3.5.12-1ubuntu7.16+esm3
Available with Ubuntu Pro
-
squid3
-
3.5.12-1ubuntu7.16+esm3
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.