Bug 1311584

Summary: squid: Multiple Denial of Service issues in HTTP Response processing
Product: [Other] Security Response Reporter: Adam Mariš <amaris>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED DUPLICATE QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: henrik, jonathansteffan, luhliari, psimerda, thozza
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: squid 3.5.15, squid 4.0.7 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2016-03-02 15:09:38 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1311585, 1312267    
Bug Blocks: 1311588    

Description Adam Mariš 2016-02-24 14:14:23 UTC
Due to incorrect bounds checking Squid is vulnerable to a denial of service attack when processing HTTP responses. Squid-4 is due to incorrect error handling vulnerable to a denial of service attack when processing malformed HTTP responses.

These problems allow remote servers delivering certain unusual HTTP response syntax to trigger a denial of service for all clients accessing the Squid service.

Upstream patches:

http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-13990.patch
http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-13991.patch

External Reference:

http://www.squid-cache.org/Advisories/SQUID-2016_2.txt

Comment 1 Adam Mariš 2016-02-24 14:14:51 UTC
Created squid tracking bugs for this issue:

Affects: fedora-all [bug 1311585]

Comment 2 Adam Mariš 2016-02-24 15:15:11 UTC
CVE request:

http://seclists.org/oss-sec/2016/q1/422

Comment 3 Adam Mariš 2016-03-02 15:09:38 UTC

*** This bug has been marked as a duplicate of bug 1312257 ***