Squid before 4.15 and 5.x before 5.0.6 allows remote servers to cause a denial of service (affecting availability to all clients) via an HTTP response. The issue trigger is a header that can be expected to exist in HTTP traffic without any malicious intent by the server.
{ "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "squid", "binary_version": "3.5.27-1ubuntu1.11" }, { "binary_name": "squid-cgi", "binary_version": "3.5.27-1ubuntu1.11" }, { "binary_name": "squid-common", "binary_version": "3.5.27-1ubuntu1.11" }, { "binary_name": "squid-dbg", "binary_version": "3.5.27-1ubuntu1.11" }, { "binary_name": "squid-purge", "binary_version": "3.5.27-1ubuntu1.11" }, { "binary_name": "squid3", "binary_version": "3.5.27-1ubuntu1.11" }, { "binary_name": "squidclient", "binary_version": "3.5.27-1ubuntu1.11" } ] }
{ "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "squid", "binary_version": "4.10-1ubuntu1.4" }, { "binary_name": "squid-cgi", "binary_version": "4.10-1ubuntu1.4" }, { "binary_name": "squid-cgi-dbgsym", "binary_version": "4.10-1ubuntu1.4" }, { "binary_name": "squid-common", "binary_version": "4.10-1ubuntu1.4" }, { "binary_name": "squid-dbgsym", "binary_version": "4.10-1ubuntu1.4" }, { "binary_name": "squid-purge", "binary_version": "4.10-1ubuntu1.4" }, { "binary_name": "squid-purge-dbgsym", "binary_version": "4.10-1ubuntu1.4" }, { "binary_name": "squidclient", "binary_version": "4.10-1ubuntu1.4" }, { "binary_name": "squidclient-dbgsym", "binary_version": "4.10-1ubuntu1.4" } ] }