squid:4 security, bug fix, and enhancement update

エラータID: AXSA:2021-2820:01

Release date: 
Tuesday, December 21, 2021 - 05:20
Subject: 
squid:4 security, bug fix, and enhancement update
Affected Channels: 
Asianux Server 8 for x86_64
Severity: 
Moderate
Description: 

Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.

The following packages have been upgraded to a later upstream version: squid (4.15).

Security Fix(es):

* squid: denial of service in URN processing (CVE-2021-28651)
* squid: denial of service issue in Cache Manager (CVE-2021-28652)
* squid: denial of service in HTTP response processing (CVE-2021-28662)
* squid: improper input validation in HTTP Range header (CVE-2021-31806)
* squid: incorrect memory management in HTTP Range header (CVE-2021-31807)
* squid: integer overflow in HTTP Range header (CVE-2021-31808)
* squid: denial of service in HTTP response processing (CVE-2021-33620)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2021-28651
An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to a buffer-management bug, it allows a denial of service. When resolving a request with the urn: scheme, the parser leaks a small amount of memory. However, there is an unspecified attack methodology that can easily trigger a large amount of memory consumption.
CVE-2021-28652
An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to incorrect parser validation, it allows a Denial of Service attack against the Cache Manager API. This allows a trusted client to trigger memory leaks that. over time, lead to a Denial of Service via an unspecified short query string. This attack is limited to clients with Cache Manager API access privilege.
CVE-2021-28662
An issue was discovered in Squid 4.x before 4.15 and 5.x before 5.0.6. If a remote server sends a certain response header over HTTP or HTTPS, there is a denial of service. This header can plausibly occur in benign network traffic.
CVE-2021-31806
An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to a memory-management bug, it is vulnerable to a Denial of Service attack (against all clients using the proxy) via HTTP Range request processing.
CVE-2021-31807
An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. An integer overflow problem allows a remote server to achieve Denial of Service when delivering responses to HTTP Range requests. The issue trigger is a header that can be expected to exist in HTTP traffic without any malicious intent.
CVE-2021-31808
An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to an input-validation bug, it is vulnerable to a Denial of Service attack (against all clients using the proxy). A client sends an HTTP Range request to trigger this.
CVE-2021-33620
Squid before 4.15 and 5.x before 5.0.6 allows remote servers to cause a denial of service (affecting availability to all clients) via an HTTP response. The issue trigger is a header that can be expected to exist in HTTP traffic without any malicious intent by the server.

Modularity name: squid
Stream name: 4

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. libecap-1.0.1-2.module+el8+1342+c6322b80.src.rpm
    MD5: 59e46c7885085663f1cb2559e284dd4c
    SHA-256: 74bea7fc7200e18b991e83cdb6670ea603c4e0708325b7161004cdbfd201b4a7
    Size: 343.58 kB
  2. squid-4.15-1.module+el8+1342+c6322b80.src.rpm
    MD5: 5aa8d0acd7b4a2c6e1769e693b0db45a
    SHA-256: aed750121d6ce3e3416898e96e3d6e9b04fc1378c5e9af31fc3b0c41a54ac182
    Size: 2.42 MB

Asianux Server 8 for x86_64
  1. libecap-1.0.1-2.module+el8+1342+c6322b80.x86_64.rpm
    MD5: b93af18add139da6a895e209fdec6c35
    SHA-256: 57d131dc7f9f2cf2b4568dbc349336c72e35d4aba3be5d358a815c38b4a4340d
    Size: 27.81 kB
  2. libecap-debugsource-1.0.1-2.module+el8+1342+c6322b80.x86_64.rpm
    MD5: 2497c57708133055f0299709698a1a1e
    SHA-256: 92e0857b57eee9a1e36f107876970fa795710b0fdc829429d7064cc1d98cb2c9
    Size: 18.92 kB
  3. libecap-devel-1.0.1-2.module+el8+1342+c6322b80.x86_64.rpm
    MD5: 29662d109bf33bc40da32913935dcf3f
    SHA-256: cfd1086c8afe6d8a967af9927ceaebbc064eac3943bf4a5b5906cd138a28d808
    Size: 20.46 kB
  4. squid-4.15-1.module+el8+1342+c6322b80.x86_64.rpm
    MD5: 295af9a7f1630fbced01c4f167ca8dd1
    SHA-256: 3219722560e6ce826250961c4076ca4e81484534beb45545276404ca402f03bb
    Size: 3.57 MB
  5. squid-debugsource-4.15-1.module+el8+1342+c6322b80.x86_64.rpm
    MD5: a5919c849a7df99776b70c90c37ef173
    SHA-256: e19c8f65e8eea5b9fb20bb5b376bd29452aaa8fedbee0245cd9667015ea36af6
    Size: 1.73 MB