squid is vulnerable to arbitrary code execution. The vulnerability exists as a heap-based buffer overflow could occur when receiving data from a remote server in response to an URN request, and when squid fails to ensure that the response can fit within the buffer.
www.squid-cache.org/Advisories/SQUID-2019_7.txt
bugzilla.suse.com/show_bug.cgi?id=1156326
lists.debian.org/debian-lts-announce/2019/12/msg00011.html
lists.debian.org/debian-lts-announce/2020/07/msg00009.html
lists.fedoraproject.org/archives/list/[email protected]/message/MTM74TU2BSLT5B3H4F3UDW53672NVLMC/
lists.fedoraproject.org/archives/list/[email protected]/message/UEMOYTMCCFWK5NOXSXEIH5D2VGWVXR67/
security.gentoo.org/glsa/202003-34
usn.ubuntu.com/4213-1/
www.debian.org/security/2020/dsa-4682