Summary: | CVE-2016-4553 squid: Cache poisoning issue in HTTP Request handling | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Andrej Nemec <anemec> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | dmoppert, henrik, jonathansteffan, jtrutwin, luhliari, psimerda, thozza |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | squid 3.5.18 | Doc Type: | Bug Fix |
Doc Text: |
An input validation flaw was found in the way Squid handled intercepted HTTP Request messages. An attacker could use this flaw to bypass the protection against issues related to CVE-2009-0801, and perform cache poisoning attacks on Squid.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2016-06-09 12:43:19 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Bug Depends On: | 1334251, 1334506, 1334507, 1334508, 1334509 | ||
Bug Blocks: | 1334247 |
Description
Andrej Nemec
2016-05-09 09:00:32 UTC
Created squid tracking bugs for this issue: Affects: fedora-all [bug 1334251] This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2016:1139 https://access.redhat.com/errata/RHSA-2016:1139 This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2016:1140 https://access.redhat.com/errata/RHSA-2016:1140 squid-3.5.19-2.fc24 has been pushed to the Fedora 24 stable repository. If problems still persist, please make note of it in this bug report. squid-3.5.10-4.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report. This issue has now been publicised as "Host of troubles" aka Cert VU#916855. Red Hat products were patched in May and July, no further action is needed. External URL: https://hostoftroubles.com/ |