Hide Forgot
Due to incorrect buffer management Squid cachemgr.cgi tool is vulnerable to a buffer overflow when processing remotely supplied inputs relayed to it from Squid. External references: http://www.squid-cache.org/Advisories/SQUID-2016_5.txt Upstream fixes: [RHEL-7] www.squid-cache.org/Versions/v3/3.3/changesets/SQUID-2016_5.patch [Fedora-23] http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2016_5.patch [Fedora-22] http://www.squid-cache.org/Versions/v3/3.4/changesets/SQUID-2016_5.patch
Created squid tracking bugs for this issue: Affects: fedora-all [bug 1329144]
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2016:1139 https://access.redhat.com/errata/RHSA-2016:1139
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2016:1140 https://access.redhat.com/errata/RHSA-2016:1140
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2016:1138 https://access.redhat.com/errata/RHSA-2016:1138
squid-3.5.19-2.fc24 has been pushed to the Fedora 24 stable repository. If problems still persist, please make note of it in this bug report.
squid-3.5.10-4.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report.
Additional Note: It was found that RHSA-2016:1138 (squid-3.1.23-16.el6_8.4 on RHEL-6.8.z) did not fully fixed CVE-2016-4051. A new fix is available, under the name CVE-2016-5408, and released via errata RHSA-2016:1573