Total vulnerabilities in the database
Squid before 4.13 and 5.x before 5.0.4 allows a trusted peer to perform Denial of Service by consuming all available CPU cycles during handling of a crafted Cache Digest response message. This only occurs when cache_peer is used with the cache digests feature. The problem exists because peerDigestHandleReply() livelocking in peer_digest.cc mishandles EOF.
Software | From | Fixed in |
---|---|---|
squid-cache / squid | 5.0.1 | 5.0.4 |
squid-cache / squid | 3.0 | 4.13 |
canonical / ubuntu_linux | 16.04 | 16.04.x |
canonical / ubuntu_linux | 18.04 | 18.04.x |
canonical / ubuntu_linux | 20.04 | 20.04.x |
debian / debian_linux | 9.0 | 9.0.x |
debian / debian_linux | 10.0 | 10.0.x |
fedoraproject / fedora | 31 | 31.x |
fedoraproject / fedora | 32 | 32.x |
fedoraproject / fedora | 33 | 33.x |
opensuse / leap | 15.1 | 15.1.x |
opensuse / leap | 15.2 | 15.2.x |