squid:4 Security update
エラータID: AXSA:2020-790:01
リリース日:
2020/10/25 Sunday - 17:38
題名:
squid:4 Security update
影響のあるチャネル:
Asianux Server 8 for x86_64
Severity:
High
Description:
以下項目について対処しました。
[Security Fix]
- Squidには、正しくないデータバリデーションが原因で、
HTTP Request Smuggling攻撃が可能な脆弱性があります。
(CVE-2020-15810)
- Squidには、正しくないデータバリデーションが原因で、
HTTPリクエスト分割攻撃が可能な脆弱性があります。
(CVE-2020-15811)
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2020-15810
An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Smuggling attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the proxy cache and any downstream caches with content from an arbitrary source. When configured for relaxed header parsing (the default), Squid relays headers containing whitespace characters to upstream servers. When this occurs as a prefix to a Content-Length header, the frame length specified will be ignored by Squid (allowing for a conflicting length to be used from another Content-Length header) but relayed upstream.
An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Smuggling attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the proxy cache and any downstream caches with content from an arbitrary source. When configured for relaxed header parsing (the default), Squid relays headers containing whitespace characters to upstream servers. When this occurs as a prefix to a Content-Length header, the frame length specified will be ignored by Squid (allowing for a conflicting length to be used from another Content-Length header) but relayed upstream.
CVE-2020-15811
An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Splitting attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the browser cache and any downstream caches with content from an arbitrary source. Squid uses a string search instead of parsing the Transfer-Encoding header to find chunked encoding. This allows an attacker to hide a second request inside Transfer-Encoding: it is interpreted by Squid as chunked and split out into a second request delivered upstream. Squid will then deliver two distinct responses to the client, corrupting any downstream caches.
An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Splitting attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the browser cache and any downstream caches with content from an arbitrary source. Squid uses a string search instead of parsing the Transfer-Encoding header to find chunked encoding. This allows an attacker to hide a second request inside Transfer-Encoding: it is interpreted by Squid as chunked and split out into a second request delivered upstream. Squid will then deliver two distinct responses to the client, corrupting any downstream caches.
追加情報:
N/A
ダウンロード:
SRPMS
- libecap-1.0.1-2.module+el8+130+e0ed6a72.src.rpm
MD5: d050318ac3b54f5f5f7c69b25df2c472
SHA-256: 16dddacd8deda4b44808e4577aad49fe04a3f7a622ef73855868168d33eaa426
Size: 343.58 kB - squid-4.4-8.module+el8+130+e0ed6a72.2.src.rpm
MD5: 3f091923d6a8db0f9156c062aa92c0aa
SHA-256: 9d1319417fc51faedc8aa5cae208498a271662c5bb3716325f6fd9ed7ddf40ed
Size: 2.41 MB
Asianux Server 8 for x86_64
- libecap-1.0.1-2.module+el8+130+e0ed6a72.x86_64.rpm
MD5: 5e087a9763f90200167183cfb828cd2d
SHA-256: 2bf05f620b343d74b6cb5857bc64666374dc31b233a5396d592d5e1b2d1fbc39
Size: 27.78 kB - libecap-devel-1.0.1-2.module+el8+130+e0ed6a72.x86_64.rpm
MD5: 8d91dc69d62e509729e156a584c03d7e
SHA-256: ddc5fdbbfb5bbeb7717983b4b6eefca07d8e7416236ca67f18622e40b9879d3c
Size: 20.46 kB - squid-4.4-8.module+el8+130+e0ed6a72.2.x86_64.rpm
MD5: 0b3d5bcf2338e37de6ebdc9985da6901
SHA-256: 9bf11f655805707357e71cf348e2b13e94167b67d1c0915479fcbfb6603b7988
Size: 3.54 MB