A buffer overrun (on write(2)) has been found in Squid proxy 'pinger' process that allows an attacker to craft ICMPv6 messages that will either crash the child process (if the OS protects against over-write) or alter heap contents allowing the attacker to bypass CVE-2014-7142 protection and leak arbitrary heap data into the Squid log files. The pinger is setuid root (though it does drop those privileges prior to this attack being possible). Upstream fix: http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-14015.patch External references: http://www.squid-cache.org/Advisories/SQUID-2016_3.txt References: http://seclists.org/oss-sec/2016/q2/2
Created squid tracking bugs for this issue: Affects: fedora-all [bug 1323591]
Statement: This issue did not affect the versions of squid as shipped with Red Hat Enterprise Linux 5, 6 and 7 as they did not include support for ICMP pinging and the 'pinger' binary.
squid-3.5.19-2.fc24 has been pushed to the Fedora 24 stable repository. If problems still persist, please make note of it in this bug report.
squid-3.5.10-4.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report.