Bug 2294353 (CVE-2024-37894)

Summary: CVE-2024-37894 squid: Out-of-bounds write error may lead to Denial of Service
Product: [Other] Security Response Reporter: Patrick Del Bello <pdelbell>
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedKeywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A flaw was found in Squid. An out-of-bounds write can be triggered when an Edge Side Includes (ESI) variable is assigned to a value not in the standard ASCII range, for example, multi-byte characters. This flaw allows a trusted server to crash Squid while processing an ESI response content, resulting in a denial of service.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2294354, 2294355, 2294356    
Bug Blocks: 2294352    

Description Patrick Del Bello 2024-06-26 01:09:36 UTC
Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to an Out-of-bounds Write error when assigning ESI variables, Squid is susceptible to a Memory Corruption error. This error can lead to a Denial of Service attack.

References:
https://github.com/squid-cache/squid/security/advisories/GHSA-wgvf-q977-9xjg
https://megamansec.github.io/Squid-Security-Audit/esi-underflow.html

Upstream patch:
https://github.com/squid-cache/squid/commit/f411fe7d75197852f0e5ee85027a06d58dd8df4c.patch

Comment 1 Patrick Del Bello 2024-06-26 01:12:40 UTC
Created clustal-omega tracking bugs for this issue:

Affects: epel-7 [bug 2294355]
Affects: fedora-all [bug 2294356]


Created squid tracking bugs for this issue:

Affects: fedora-all [bug 2294354]

Comment 3 errata-xmlrpc 2024-07-25 08:37:06 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2024:4861 https://access.redhat.com/errata/RHSA-2024:4861

Comment 4 errata-xmlrpc 2024-08-27 18:27:30 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2024:5906 https://access.redhat.com/errata/RHSA-2024:5906