Due to an input validation bug Squid is vulnerable to a Denial of Service against all clients using the proxy. This problem allows a remote server to perform Denial of Service when delivering HTTP Response messages. The issue trigger is a header which can be expected to exist in HTTP traffic without any malicious intent by the server. Upstream security advisory: https://github.com/squid-cache/squid/security/advisories/GHSA-jjq6-mh2h-g39h
Created squid tracking bugs for this issue: Affects: fedora-all [bug 1963381]
Upstream commits: https://github.com/squid-cache/squid/commit/051824924c709bd6162a378f746fb859454c674e [master] https://github.com/squid-cache/squid/commit/d09b34de2575af3bab4b34c775f93acb7270b4c3 [v5] https://github.com/squid-cache/squid/commit/b1c37c9e7b30d0efb5e5ccf8200f2a646b9c36f8 [v4]
The supported versions of Red Hat Satellite does not ship Squid and only consumed through Red Hat Enterprise Linux repository. Product uses older version Squid which is not affected by vulnerability.
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:4292 https://access.redhat.com/errata/RHSA-2021:4292
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-28662