Description
An issue was discovered in Squid before 4.9. URN response handling in Squid
suffers from a heap-based buffer overflow. When receiving data from a
remote server in response to an URN request, Squid fails to ensure that the
response can fit within the buffer. This leads to attacker controlled data
overflowing in the heap.
Package
Upstream: | needs-triage
|
Ubuntu 12.04 ESM (Precise Pangolin): | needs-triage
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | released
(3.5.12-1ubuntu7.9)
|
Ubuntu 18.04 LTS (Bionic Beaver): | released
(3.5.27-1ubuntu1.4)
|
Ubuntu 19.04 (Disco Dingo): | DNE
|
Ubuntu 19.10 (Eoan Ermine): | DNE
|
Ubuntu 20.04 (Focal Fossa): | DNE
|
Updated: 2019-12-05 19:59:23 UTC (commit 0aa5e7c87c8b55d2ec5c7f4ca1179cf75de91961)