ArchLinux: 201605-13: squid: multiple issues
Summary
- CVE-2016-4554 (cache poisoning, same-origin policy bypass):
Due to incorrect input validation, Squid is vulnerable to a header
smuggling attack leading to cache poisoning and bypass of the
same-origin security policy in Squid and some client browsers.
- CVE-2016-4555, CVE-2016-4556 (denial of service):
Due to incorrect pointer handling and reference counting, Squid is
vulnerable to a denial of service attack when processing ESI responses.
Resolution
Upgrade to 3.5.19-1.
# pacman -Syu "squid>=3.5.19-1"
The problem has been fixed upstream in version 3.5.18.
References
http://www.squid-cache.org/Advisories/SQUID-2016_8.txt http://www.squid-cache.org/Advisories/SQUID-2016_9.txt https://access.redhat.com/security/cve/CVE-2016-4554 https://access.redhat.com/security/cve/CVE-2016-4555 https://access.redhat.com/security/cve/CVE-2016-4556
Workaround
None.