Bug 1312262 (CVE-2016-2571, CVE-2016-2572)
Summary: | CVE-2016-2571 CVE-2016-2572 squid: wrong error handling for malformed HTTP responses | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Andrej Nemec <anemec> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | cbuissar, henrik, jonathansteffan, luhliari, psimerda, sardella, thozza, yozone |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | squid 4.0.7, squid 3.5.15 | Doc Type: | Bug Fix |
Doc Text: |
It was found that squid did not properly handle errors when failing to parse an HTTP response, possibly leading to an assertion failure. A malicious HTTP server could use this flaw to crash squid using a specially crafted HTTP response.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2016-11-04 09:00:53 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1312267, 1322770 | ||
Bug Blocks: | 1312266 |
Description
Andrej Nemec
2016-02-26 09:22:46 UTC
External references: http://www.squid-cache.org/Advisories/SQUID-2016_2.txt Upstream patches: http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-13990.patch http://www.squid-cache.org/Versions/v4/changesets/squid-4-14548.patch CVE assignment: http://seclists.org/oss-sec/2016/q1/442 Also adding CVE-2016-2572, as assigned by Mitre for another part of this issue, fixed in this patch. Created squid tracking bugs for this issue: Affects: fedora-all [bug 1312267] This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2016:2600 https://rhn.redhat.com/errata/RHSA-2016-2600.html Statement: Red Hat Product Security has rated this issue as having Moderate security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/. |