squid:4 security, bug fix, and enhancement update
エラータID: AXSA:2021-2820:01
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
The following packages have been upgraded to a later upstream version: squid (4.15).
Security Fix(es):
* squid: denial of service in URN processing (CVE-2021-28651)
* squid: denial of service issue in Cache Manager (CVE-2021-28652)
* squid: denial of service in HTTP response processing (CVE-2021-28662)
* squid: improper input validation in HTTP Range header (CVE-2021-31806)
* squid: incorrect memory management in HTTP Range header (CVE-2021-31807)
* squid: integer overflow in HTTP Range header (CVE-2021-31808)
* squid: denial of service in HTTP response processing (CVE-2021-33620)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2021-28651
An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to a buffer-management bug, it allows a denial of service. When resolving a request with the urn: scheme, the parser leaks a small amount of memory. However, there is an unspecified attack methodology that can easily trigger a large amount of memory consumption.
CVE-2021-28652
An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to incorrect parser validation, it allows a Denial of Service attack against the Cache Manager API. This allows a trusted client to trigger memory leaks that. over time, lead to a Denial of Service via an unspecified short query string. This attack is limited to clients with Cache Manager API access privilege.
CVE-2021-28662
An issue was discovered in Squid 4.x before 4.15 and 5.x before 5.0.6. If a remote server sends a certain response header over HTTP or HTTPS, there is a denial of service. This header can plausibly occur in benign network traffic.
CVE-2021-31806
An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to a memory-management bug, it is vulnerable to a Denial of Service attack (against all clients using the proxy) via HTTP Range request processing.
CVE-2021-31807
An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. An integer overflow problem allows a remote server to achieve Denial of Service when delivering responses to HTTP Range requests. The issue trigger is a header that can be expected to exist in HTTP traffic without any malicious intent.
CVE-2021-31808
An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to an input-validation bug, it is vulnerable to a Denial of Service attack (against all clients using the proxy). A client sends an HTTP Range request to trigger this.
CVE-2021-33620
Squid before 4.15 and 5.x before 5.0.6 allows remote servers to cause a denial of service (affecting availability to all clients) via an HTTP response. The issue trigger is a header that can be expected to exist in HTTP traffic without any malicious intent by the server.
Modularity name: squid
Stream name: 4
Update packages.
An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to a buffer-management bug, it allows a denial of service. When resolving a request with the urn: scheme, the parser leaks a small amount of memory. However, there is an unspecified attack methodology that can easily trigger a large amount of memory consumption.
An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to incorrect parser validation, it allows a Denial of Service attack against the Cache Manager API. This allows a trusted client to trigger memory leaks that. over time, lead to a Denial of Service via an unspecified short query string. This attack is limited to clients with Cache Manager API access privilege.
An issue was discovered in Squid 4.x before 4.15 and 5.x before 5.0.6. If a remote server sends a certain response header over HTTP or HTTPS, there is a denial of service. This header can plausibly occur in benign network traffic.
An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to a memory-management bug, it is vulnerable to a Denial of Service attack (against all clients using the proxy) via HTTP Range request processing.
An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. An integer overflow problem allows a remote server to achieve Denial of Service when delivering responses to HTTP Range requests. The issue trigger is a header that can be expected to exist in HTTP traffic without any malicious intent.
An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to an input-validation bug, it is vulnerable to a Denial of Service attack (against all clients using the proxy). A client sends an HTTP Range request to trigger this.
Squid before 4.15 and 5.x before 5.0.6 allows remote servers to cause a denial of service (affecting availability to all clients) via an HTTP response. The issue trigger is a header that can be expected to exist in HTTP traffic without any malicious intent by the server.
N/A
SRPMS
- libecap-1.0.1-2.module+el8+1342+c6322b80.src.rpm
MD5: 59e46c7885085663f1cb2559e284dd4c
SHA-256: 74bea7fc7200e18b991e83cdb6670ea603c4e0708325b7161004cdbfd201b4a7
Size: 343.58 kB - squid-4.15-1.module+el8+1342+c6322b80.src.rpm
MD5: 5aa8d0acd7b4a2c6e1769e693b0db45a
SHA-256: aed750121d6ce3e3416898e96e3d6e9b04fc1378c5e9af31fc3b0c41a54ac182
Size: 2.42 MB
Asianux Server 8 for x86_64
- libecap-1.0.1-2.module+el8+1342+c6322b80.x86_64.rpm
MD5: b93af18add139da6a895e209fdec6c35
SHA-256: 57d131dc7f9f2cf2b4568dbc349336c72e35d4aba3be5d358a815c38b4a4340d
Size: 27.81 kB - libecap-debugsource-1.0.1-2.module+el8+1342+c6322b80.x86_64.rpm
MD5: 2497c57708133055f0299709698a1a1e
SHA-256: 92e0857b57eee9a1e36f107876970fa795710b0fdc829429d7064cc1d98cb2c9
Size: 18.92 kB - libecap-devel-1.0.1-2.module+el8+1342+c6322b80.x86_64.rpm
MD5: 29662d109bf33bc40da32913935dcf3f
SHA-256: cfd1086c8afe6d8a967af9927ceaebbc064eac3943bf4a5b5906cd138a28d808
Size: 20.46 kB - squid-4.15-1.module+el8+1342+c6322b80.x86_64.rpm
MD5: 295af9a7f1630fbced01c4f167ca8dd1
SHA-256: 3219722560e6ce826250961c4076ca4e81484534beb45545276404ca402f03bb
Size: 3.57 MB - squid-debugsource-4.15-1.module+el8+1342+c6322b80.x86_64.rpm
MD5: a5919c849a7df99776b70c90c37ef173
SHA-256: e19c8f65e8eea5b9fb20bb5b376bd29452aaa8fedbee0245cd9667015ea36af6
Size: 1.73 MB