CVE-2020-24606

Squid before 4.13 and 5.x before 5.0.4 allows a trusted peer to perform Denial of Service by consuming all available CPU cycles during handling of a crafted Cache Digest response message. This only occurs when cache_peer is used with the cache digests feature. The problem exists because peerDigestHandleReply() livelocking in peer_digest.cc mishandles EOF.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00012.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00017.html Mailing List Third Party Advisory
http://www.squid-cache.org/Versions/v4/changesets/SQUID-2020_9.patch Patch Vendor Advisory
https://github.com/squid-cache/squid/security/advisories/GHSA-vvj7-xjgq-g2jg Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/10/msg00005.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BE6FKUN7IGTIR2MEEMWYDT7N5EJJLZI2/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BMTFLVB7GLRF2CKGFPZ4G4R5DIIPHWI3/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJJDI7JQFGQLVNCKMVY64LAFMKERAOK7/
https://security.netapp.com/advisory/ntap-20210219-0007/ Third Party Advisory
https://security.netapp.com/advisory/ntap-20210226-0006/ Third Party Advisory
https://security.netapp.com/advisory/ntap-20210226-0007/ Broken Link
https://usn.ubuntu.com/4477-1/ Third Party Advisory
https://usn.ubuntu.com/4551-1/ Third Party Advisory
https://www.debian.org/security/2020/dsa-4751 Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00012.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00017.html Mailing List Third Party Advisory
http://www.squid-cache.org/Versions/v4/changesets/SQUID-2020_9.patch Patch Vendor Advisory
https://github.com/squid-cache/squid/security/advisories/GHSA-vvj7-xjgq-g2jg Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/10/msg00005.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BE6FKUN7IGTIR2MEEMWYDT7N5EJJLZI2/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BMTFLVB7GLRF2CKGFPZ4G4R5DIIPHWI3/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJJDI7JQFGQLVNCKMVY64LAFMKERAOK7/
https://security.netapp.com/advisory/ntap-20210219-0007/ Third Party Advisory
https://security.netapp.com/advisory/ntap-20210226-0006/ Third Party Advisory
https://security.netapp.com/advisory/ntap-20210226-0007/ Broken Link
https://usn.ubuntu.com/4477-1/ Third Party Advisory
https://usn.ubuntu.com/4551-1/ Third Party Advisory
https://www.debian.org/security/2020/dsa-4751 Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*

History

21 Nov 2024, 05:15

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00012.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00012.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00017.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00017.html - Mailing List, Third Party Advisory
References () http://www.squid-cache.org/Versions/v4/changesets/SQUID-2020_9.patch - Patch, Vendor Advisory () http://www.squid-cache.org/Versions/v4/changesets/SQUID-2020_9.patch - Patch, Vendor Advisory
References () https://github.com/squid-cache/squid/security/advisories/GHSA-vvj7-xjgq-g2jg - Third Party Advisory () https://github.com/squid-cache/squid/security/advisories/GHSA-vvj7-xjgq-g2jg - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2020/10/msg00005.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2020/10/msg00005.html - Mailing List, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BE6FKUN7IGTIR2MEEMWYDT7N5EJJLZI2/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BE6FKUN7IGTIR2MEEMWYDT7N5EJJLZI2/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BMTFLVB7GLRF2CKGFPZ4G4R5DIIPHWI3/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BMTFLVB7GLRF2CKGFPZ4G4R5DIIPHWI3/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJJDI7JQFGQLVNCKMVY64LAFMKERAOK7/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJJDI7JQFGQLVNCKMVY64LAFMKERAOK7/ -
References () https://security.netapp.com/advisory/ntap-20210219-0007/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20210219-0007/ - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20210226-0006/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20210226-0006/ - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20210226-0007/ - Broken Link () https://security.netapp.com/advisory/ntap-20210226-0007/ - Broken Link
References () https://usn.ubuntu.com/4477-1/ - Third Party Advisory () https://usn.ubuntu.com/4477-1/ - Third Party Advisory
References () https://usn.ubuntu.com/4551-1/ - Third Party Advisory () https://usn.ubuntu.com/4551-1/ - Third Party Advisory
References () https://www.debian.org/security/2020/dsa-4751 - Third Party Advisory () https://www.debian.org/security/2020/dsa-4751 - Third Party Advisory
CVSS v2 : 7.1
v3 : 7.5
v2 : 7.1
v3 : 8.6

07 Nov 2023, 03:20

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HJJDI7JQFGQLVNCKMVY64LAFMKERAOK7/', 'name': 'FEDORA-2020-73af8655eb', 'tags': ['Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMTFLVB7GLRF2CKGFPZ4G4R5DIIPHWI3/', 'name': 'FEDORA-2020-63f3bd656e', 'tags': ['Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BE6FKUN7IGTIR2MEEMWYDT7N5EJJLZI2/', 'name': 'FEDORA-2020-6c58bff862', 'tags': ['Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BE6FKUN7IGTIR2MEEMWYDT7N5EJJLZI2/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJJDI7JQFGQLVNCKMVY64LAFMKERAOK7/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BMTFLVB7GLRF2CKGFPZ4G4R5DIIPHWI3/ -

Information

Published : 2020-08-24 18:15

Updated : 2024-11-21 05:15


NVD link : CVE-2020-24606

Mitre link : CVE-2020-24606

CVE.ORG link : CVE-2020-24606


JSON object : View

Products Affected

squid-cache

  • squid

fedoraproject

  • fedora

debian

  • debian_linux

opensuse

  • leap

canonical

  • ubuntu_linux
CWE
CWE-667

Improper Locking