Due to incorrect input validation Squid is vulnerable to a header smuggling attack leading to cache poisoning and to bypass of same-origin security policy in Squid and some client browsers. External references: http://www.squid-cache.org/Advisories/SQUID-2016_8.txt Upstream fixes: [RHEL-7]: http://www.squid-cache.org/Versions/v3/3.3/changesets/SQUID-2016_8.patch> [RHEL-6]: http://www.squid-cache.org/Versions/v3/3.1/changesets/SQUID-2016_8.patch [Fedora-22]: http://www.squid-cache.org/Versions/v3/3.4/changesets/SQUID-2016_8.patch [Fedora-23]: http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2016_8.patch
Created squid tracking bugs for this issue: Affects: fedora-all [bug 1334251]
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2016:1139 https://access.redhat.com/errata/RHSA-2016:1139
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2016:1140 https://access.redhat.com/errata/RHSA-2016:1140
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2016:1138 https://access.redhat.com/errata/RHSA-2016:1138
squid-3.5.19-2.fc24 has been pushed to the Fedora 24 stable repository. If problems still persist, please make note of it in this bug report.
squid-3.5.10-4.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report.
This issue has now been publicised as "Host of troubles" aka Cert VU#916855. Red Hat products were patched in May and July, no further action is needed. External URL: https://hostoftroubles.com/