Bug 439801 (CVE-2008-1612)

Summary: CVE-2008-1612 squid: regression in SQUID-2007:2 / CVE-2007-6239
Product: [Other] Security Response Reporter: Tomas Hoger <thoger>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: kreilly, mnagy
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2008-07-25 10:17:56 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 439988, 439989, 439990, 439991, 439992, 439993    
Bug Blocks:    

Description Tomas Hoger 2008-03-31 14:29:38 UTC
Squid security advisory SQUID-2007:2 was released on 2007-11-27 describing
potential denial of service (DoS) bug in squid proxy server:

  http://www.squid-cache.org/Advisories/SQUID-2007_2.txt

The advisory was now updated to address problem introduced by the fix:

  http://marc.info/?l=squid-announce&m=120614453813157&w=2

Following patch is need to allow shrinking squid Arrays to zero-sized arrays:

  http://www.squid-cache.org/Versions/v2/2.6/changesets/11882.patch

Comment 1 Tomas Hoger 2008-03-31 15:50:29 UTC
Issue was previously tracked using bug bug #410181.

Comment 3 Tomas Hoger 2008-03-31 16:16:14 UTC
This issue was introduced in the original fix for SQUID-2007_2.  An attacker can
possibly cause squid child process to exit due to a failed assert.  New child
process is spawned by the parent squid process to replace exited child.  Child
process exit can easily interrupt current connections of other users.

Issue affects squid packages currently shipped in Red Hat Enterprise Linux 2.1,
3, 4, and 5.

Comment 6 Red Hat Product Security 2008-07-25 10:17:56 UTC
This issue was addressed in:

Red Hat Enterprise Linux:
  http://rhn.redhat.com/errata/RHSA-2008-0214.html