CVE-2021-31806

NameCVE-2021-31806
DescriptionAn issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to a memory-management bug, it is vulnerable to a Denial of Service attack (against all clients using the proxy) via HTTP Range request processing.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2685-1, DSA-4924-1
Debian Bugs989043

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
squid (PTS)buster4.6-1+deb10u7fixed
buster (security)4.6-1+deb10u10fixed
bullseye4.13-10+deb11u2fixed
bullseye (security)4.13-10+deb11u3fixed
bookworm5.7-2fixed
bookworm (security)5.7-2+deb12u1fixed
trixie6.6-1fixed
sid6.8-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
squidsourcebuster4.6-1+deb10u6DSA-4924-1
squidsource(unstable)4.13-10989043
squid3sourcestretch3.5.23-5+deb9u7DLA-2685-1
squid3source(unstable)(unfixed)

Notes

https://bugzilla.suse.com/show_bug.cgi?id=1185916
https://github.com/squid-cache/squid/security/advisories/GHSA-pxwq-f3qr-w2xf
http://www.squid-cache.org/Versions/v4/changesets/squid-4-e7cf864f938f24eea8af0692c04d16790983c823.patch
https://megamansec.github.io/Squid-Security-Audit/range-assert.html

Search for package or bug name: Reporting problems