Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1308865 - (CVE-2016-2390) CVE-2016-2390 squid: incorrect server error handling resulting in denial of service
CVE-2016-2390 squid: incorrect server error handling resulting in denial of s...
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20160216,repor...
: Reopened, Security
Depends On: 1308866
Blocks: 1308870
  Show dependency treegraph
 
Reported: 2016-02-16 05:26 EST by Andrej Nemec
Modified: 2016-06-22 09:12 EDT (History)
7 users (show)

See Also:
Fixed In Version: squid 3.5.14, squid 4.0.6
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2016-04-05 04:44:44 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Andrej Nemec 2016-02-16 05:26:57 EST
Due to incorrectly handling server errors Squid is vulnerable to
a denial of service attack when connecting to TLS or SSL servers.
This problem allows any trusted client to perform a denial of
service attack on the Squid service regardless of whether TLS or
SSL is configured for use in the proxy.

Upstream advisory:

http://www.squid-cache.org/Advisories/SQUID-2016_1.txt

CVE request:

http://seclists.org/oss-sec/2016/q1/345
Comment 1 Andrej Nemec 2016-02-16 05:27:20 EST
Created squid tracking bugs for this issue:

Affects: fedora-all [bug 1308866]
Comment 2 Andrej Nemec 2016-02-16 10:18:56 EST
CVE assignment:

http://seclists.org/oss-sec/2016/q1/348
Comment 3 Luboš Uhliarik 2016-03-01 07:52:38 EST
Fix committed to F24 and RAWHIDE.
Comment 7 Cedric Buissart 2016-04-05 04:43:38 EDT
Statement:

This issue did not affect the versions of squid as shipped with Red Hat Enterprise Linux versions 5, 6 and 7, as they are not shipped with a vulnerable version of squid, and no currently backported patch would introduce the bug.

Note You need to log in before you can comment on or make changes to this bug.