Squid is vulnerable to denial of service (DoS). Parsing of header Proxy-Authentication leads to memory corruption.
lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html
lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html
www.squid-cache.org/Versions/v4/changesets/
www.squid-cache.org/Versions/v4/changesets/squid-4-7f73e9c5d17664b882ed32590e6af310c247f320.patch
access.redhat.com/errata/RHSA-2020:2040
access.redhat.com/security/updates/classification/#important
github.com/squid-cache/squid/commits/v4
lists.debian.org/debian-lts-announce/2019/07/msg00018.html
lists.debian.org/debian-lts-announce/2020/07/msg00009.html
lists.fedoraproject.org/archives/list/[email protected]/message/SPXN2CLAGN5QSQBTOV5IGVLDOQSRFNTZ/
seclists.org/bugtraq/2019/Aug/42
usn.ubuntu.com/4065-1/
usn.ubuntu.com/4065-2/
www.debian.org/security/2019/dsa-4507