Bug 1200907 - (CVE-2021-46784) VUL-0: CVE-2021-46784: squid: DoS when processing gopher server responses
(CVE-2021-46784)
VUL-0: CVE-2021-46784: squid: DoS when processing gopher server responses
Status: RESOLVED FIXED
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P3 - Medium : Major
: ---
Assigned To: Security Team bot
Security Team bot
https://smash.suse.de/issue/335459/
CVSSv3.1:SUSE:CVE-2021-46784:7.5:(AV:...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2022-06-24 09:03 UTC by Hu
Modified: 2022-12-20 11:23 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Hu 2022-06-24 09:03:44 UTC
rh#2100721

A vulnerability was found in squid. Due to improper buffer management Squid is vulnerable to a Denial of Service attack when processing Gopher server responses.

The issue is fixed upstream in 5.6.

References:
https://github.com/squid-cache/squid/security/advisories/GHSA-f5cp-6rh3-284w

References:
https://bugzilla.redhat.com/show_bug.cgi?id=2100721
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-46784
Comment 1 Hu 2022-06-24 09:04:01 UTC
Fix: https://github.com/squid-cache/squid/pull/1022

Not Affected (gopher functionality does not exist):
- SUSE:SLE-11:Update/squid      2.7.STABLE5

Affected:
- SUSE:SLE-12-SP2:Update/squid  3.5.21
- SUSE:SLE-12-SP5:Update/squid  4.17
- SUSE:SLE-15:Update/squid      4.17
- SUSE:SLE-15-SP4:Update/squid  5.4.1
- openSUSE:Factory/squid        5.4.1
Comment 3 OBSbugzilla Bot 2022-06-24 12:40:06 UTC
This is an autogenerated message for OBS integration:
This bug (1200907) was mentioned in
https://build.opensuse.org/request/show/984871 Factory / squid
Comment 5 Swamp Workflow Management 2022-07-12 13:16:18 UTC
SUSE-SU-2022:2359-1: An update that fixes one vulnerability is now available.

Category: security (important)
Bug References: 1200907
CVE References: CVE-2021-46784
JIRA References: 
Sources used:
openSUSE Leap 15.4 (src):    squid-5.6-150400.3.3.1
SUSE Linux Enterprise Module for Server Applications 15-SP4 (src):    squid-5.6-150400.3.3.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 6 Swamp Workflow Management 2022-07-12 16:20:16 UTC
SUSE-SU-2022:2367-1: An update that solves two vulnerabilities and has one errata is now available.

Category: security (important)
Bug References: 1185923,1186654,1200907
CVE References: CVE-2021-33620,CVE-2021-46784
JIRA References: 
Sources used:
SUSE Linux Enterprise Server 12-SP5 (src):    squid-4.17-4.24.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 7 Swamp Workflow Management 2022-07-13 22:16:08 UTC
SUSE-SU-2022:2392-1: An update that fixes three vulnerabilities is now available.

Category: security (important)
Bug References: 1183436,1185921,1200907
CVE References: CVE-2020-25097,CVE-2021-28651,CVE-2021-46784
JIRA References: 
Sources used:
SUSE OpenStack Cloud Crowbar 9 (src):    squid-3.5.21-26.35.1
SUSE OpenStack Cloud 9 (src):    squid-3.5.21-26.35.1
SUSE Linux Enterprise Server for SAP 12-SP4 (src):    squid-3.5.21-26.35.1
SUSE Linux Enterprise Server 12-SP4-LTSS (src):    squid-3.5.21-26.35.1
SUSE Linux Enterprise Server 12-SP3-BCL (src):    squid-3.5.21-26.35.1
SUSE Linux Enterprise Server 12-SP2-BCL (src):    squid-3.5.21-26.35.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 8 Swamp Workflow Management 2022-07-26 16:17:42 UTC
SUSE-SU-2022:2553-1: An update that solves two vulnerabilities and has one errata is now available.

Category: security (important)
Bug References: 1185923,1186654,1200907
CVE References: CVE-2021-33620,CVE-2021-46784
JIRA References: 
Sources used:
openSUSE Leap 15.3 (src):    squid-4.17-150000.5.32.1
SUSE Manager Server 4.1 (src):    squid-4.17-150000.5.32.1
SUSE Manager Retail Branch Server 4.1 (src):    squid-4.17-150000.5.32.1
SUSE Manager Proxy 4.1 (src):    squid-4.17-150000.5.32.1
SUSE Linux Enterprise Server for SAP 15-SP2 (src):    squid-4.17-150000.5.32.1
SUSE Linux Enterprise Server for SAP 15-SP1 (src):    squid-4.17-150000.5.32.1
SUSE Linux Enterprise Server for SAP 15 (src):    squid-4.17-150000.5.32.1
SUSE Linux Enterprise Server 15-SP2-LTSS (src):    squid-4.17-150000.5.32.1
SUSE Linux Enterprise Server 15-SP2-BCL (src):    squid-4.17-150000.5.32.1
SUSE Linux Enterprise Server 15-SP1-LTSS (src):    squid-4.17-150000.5.32.1
SUSE Linux Enterprise Server 15-SP1-BCL (src):    squid-4.17-150000.5.32.1
SUSE Linux Enterprise Server 15-LTSS (src):    squid-4.17-150000.5.32.1
SUSE Linux Enterprise Module for Server Applications 15-SP3 (src):    squid-4.17-150000.5.32.1
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (src):    squid-4.17-150000.5.32.1
SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (src):    squid-4.17-150000.5.32.1
SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src):    squid-4.17-150000.5.32.1
SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src):    squid-4.17-150000.5.32.1
SUSE Linux Enterprise High Performance Computing 15-LTSS (src):    squid-4.17-150000.5.32.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS (src):    squid-4.17-150000.5.32.1
SUSE Enterprise Storage 7 (src):    squid-4.17-150000.5.32.1
SUSE Enterprise Storage 6 (src):    squid-4.17-150000.5.32.1
SUSE CaaS Platform 4.0 (src):    squid-4.17-150000.5.32.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 12 Hu 2022-12-20 11:23:54 UTC
done