Description
Squid before 4.13 and 5.x before 5.0.4 allows a trusted peer to perform Denial of Service by consuming all available CPU cycles during handling of a crafted Cache Digest response message. This only occurs when cache_peer is used with the cache digests feature. The problem exists because peerDigestHandleReply() livelocking in peer_digest.cc mishandles EOF.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2394-1 | squid3 security update |
Debian DSA |
DSA-4751-1 | squid security update |
EUVD |
EUVD-2020-17323 | Squid before 4.13 and 5.x before 5.0.4 allows a trusted peer to perform Denial of Service by consuming all available CPU cycles during handling of a crafted Cache Digest response message. This only occurs when cache_peer is used with the cache digests feature. The problem exists because peerDigestHandleReply() livelocking in peer_digest.cc mishandles EOF. |
Ubuntu USN |
USN-4477-1 | Squid vulnerabilities |
Ubuntu USN |
USN-4551-1 | Squid vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T15:19:08.544Z
Reserved: 2020-08-24T00:00:00.000Z
Link: CVE-2020-24606
No data.
Status : Modified
Published: 2020-08-24T18:15:10.047
Modified: 2024-11-21T05:15:08.487
Link: CVE-2020-24606
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN