An update for squid34 is now available for Red Hat Enterprise Linux 6.Red Hat Product Security has rated this update as having a security impact ofModerate.

A Common Vulnerability Scoring System (CVSS) base score, which gives adetailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
The “squid34” packages provide version 3.4 of Squid, a high-performance proxycaching server for web clients, supporting FTP, Gopher, and HTTP data objects.Note that apart from “squid34”, this version of Red Hat Enterprise Linux alsoincludes the “squid” packages which provide Squid version 3.1.Security Fix(es):* A buffer overflow flaw was found in the way the Squid cachemgr.cgi utilityprocessed remotely relayed Squid input. When the CGI interface utility is used,a remote attacker could possibly use this flaw to execute arbitrary code.(CVE-2016-4051)* Buffer overflow and input validation flaws were found in the way Squidprocessed ESI responses.
If Squid was used as a reverse proxy, or for TLS/HTTPSinterception, a remote attacker able to control ESI components on an HTTP servercould use these flaws to crash Squid, disclose parts of the stack memory, orpossibly execute arbitrary code as the user running Squid. (CVE-2016-4052,CVE-2016-4053, CVE-2016-4054)* An input validation flaw was found in the way Squid handled intercepted HTTPRequest messages.

An attacker could use this flaw to bypass the protectionagainst issues related to CVE-2009-0801, and perform cache poisoning attacks onSquid. (CVE-2016-4553)* An input validation flaw was found in Squid’s mime_get_header_field()function, which is used to search for headers within HTTP requests.

An attackercould send an HTTP request from the client side with specially crafted headerHost header that bypasses same-origin security protections, causing Squidoperating as interception or reverse-proxy to contact the wrong origin server.It could also be used for cache poisoning for client not following RFC 7230.(CVE-2016-4554)* A NULL pointer dereference flaw was found in the way Squid processes ESIresponses.
If Squid was used as a reverse proxy or for TLS/HTTPS interception, amalicious server could use this flaw to crash the Squid worker process.(CVE-2016-4555)* An incorrect reference counting flaw was found in the way Squid processes ESIresponses.
If Squid is configured as reverse-proxy, for TLS/HTTPS interception,an attacker controlling a server accessed by Squid, could crash the squidworker, causing a Denial of Service attack. (CVE-2016-4556)
For details on how to apply this update, which includes the changes described inthis advisory, refer to:https://access.redhat.com/articles/11258After installing this update, the squid service will be restarted automatically.Red Hat Enterprise Linux Server (v. 6)

SRPMS:
squid34-3.4.14-9.el6_8.3.src.rpm
    MD5: 4fa50307c9e1f8693c8c11d9c80fa1bfSHA-256: 9c88c11c58acfff007cd744da06fa8ab1bd0c2a250541ad6ecd6884e43546cc8
 
IA-32:
squid34-3.4.14-9.el6_8.3.i686.rpm
    MD5: 56d27978bd4ce5801ca243994ccd00dcSHA-256: d5f686b99d7ac72a2e8f11b6561c4dd1cfd9a4cb42af13233d1968f63f2f5cad
squid34-debuginfo-3.4.14-9.el6_8.3.i686.rpm
    MD5: c14d4f15c4ef065b399ed7dde081c0b6SHA-256: cd4be61ba19744e03004fa1ea20399054c0841fc4df4ccf3428697f278607fb0
 
PPC:
squid34-3.4.14-9.el6_8.3.ppc64.rpm
    MD5: dbc7bec0d3a0d55f900c6001ef141881SHA-256: b77735c9d1ffd4d8a48f104fbfdb227e7364293f2aa48d0b4abcf559ffe6d7ce
squid34-debuginfo-3.4.14-9.el6_8.3.ppc64.rpm
    MD5: 382073aba7a985f2ecab18720a992145SHA-256: b3e87cfe6b82abdad549053c107d565404a6b3f6dea9d56e86269d4cd2c3ccb1
 
s390x:
squid34-3.4.14-9.el6_8.3.s390x.rpm
    MD5: 2f7a05011ba7f13b27cbc2ddcc3dcd7fSHA-256: d4656e2f10490af66b2ccecf5dc0e157b754c81ce4b49e12584a662e66ffc9dd
squid34-debuginfo-3.4.14-9.el6_8.3.s390x.rpm
    MD5: 295a96805ef2a5e081542523dc2e5884SHA-256: f793a0adbde385fec5a6457b2fb502c076320416e279b1d4d443e2dbbcad5d54
 
x86_64:
squid34-3.4.14-9.el6_8.3.x86_64.rpm
    MD5: dd37cfb6d8464548f59a01aaad7ba4aaSHA-256: 831425fbbf157658b9efa9cb0b00912f3a279737d8b506a8c2c5209475789443
squid34-debuginfo-3.4.14-9.el6_8.3.x86_64.rpm
    MD5: d786f03a9ad5bae7ab3a5a06ad08055cSHA-256: 87681ebef61c22aad0ef062b3bd7ef473c6b1f981b13e5afa0fd65a6aca17cb1
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
squid34-3.4.14-9.el6_8.3.src.rpm
    MD5: 4fa50307c9e1f8693c8c11d9c80fa1bfSHA-256: 9c88c11c58acfff007cd744da06fa8ab1bd0c2a250541ad6ecd6884e43546cc8
 
IA-32:
squid34-3.4.14-9.el6_8.3.i686.rpm
    MD5: 56d27978bd4ce5801ca243994ccd00dcSHA-256: d5f686b99d7ac72a2e8f11b6561c4dd1cfd9a4cb42af13233d1968f63f2f5cad
squid34-debuginfo-3.4.14-9.el6_8.3.i686.rpm
    MD5: c14d4f15c4ef065b399ed7dde081c0b6SHA-256: cd4be61ba19744e03004fa1ea20399054c0841fc4df4ccf3428697f278607fb0
 
x86_64:
squid34-3.4.14-9.el6_8.3.x86_64.rpm
    MD5: dd37cfb6d8464548f59a01aaad7ba4aaSHA-256: 831425fbbf157658b9efa9cb0b00912f3a279737d8b506a8c2c5209475789443
squid34-debuginfo-3.4.14-9.el6_8.3.x86_64.rpm
    MD5: d786f03a9ad5bae7ab3a5a06ad08055cSHA-256: 87681ebef61c22aad0ef062b3bd7ef473c6b1f981b13e5afa0fd65a6aca17cb1
 
(The unlinked packages above are only available from the Red Hat Network)

1329126 – CVE-2016-4051 squid: buffer overflow in cachemgr.cgi1329136 – CVE-2016-4052 CVE-2016-4053 CVE-2016-4054 squid: multiple issues in ESI processing1334233 – CVE-2016-4553 squid: Cache poisoning issue in HTTP Request handling1334241 – CVE-2016-4554 squid: Header Smuggling issue in HTTP Request processing1334246 – CVE-2016-4555 squid: SegFault from ESIInclude::Start1334786 – CVE-2016-4556 squid: SIGSEGV in ESIContext response handling

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from: