Security update for squid
Announcement ID: | SUSE-SU-2019:2975-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves 12 vulnerabilities can now be installed.
Description:
This update for squid to version 4.9 fixes the following issues:
Security issues fixed:
- CVE-2019-13345: Fixed multiple cross-site scripting vulnerabilities in cachemgr.cgi (bsc#1140738).
- CVE-2019-12526: Fixed potential remote code execution during URN processing (bsc#1156326).
- CVE-2019-12523,CVE-2019-18676: Fixed multiple improper validations in URI processing (bsc#1156329).
- CVE-2019-18677: Fixed Cross-Site Request Forgery in HTTP Request processing (bsc#1156328).
- CVE-2019-18678: Fixed incorrect message parsing which could have led to HTTP request splitting issue (bsc#1156323).
- CVE-2019-18679: Fixed information disclosure when processing HTTP Digest Authentication (bsc#1156324).
Other issues addressed:
- Fixed DNS failures when peer name was configured with any upper case characters
- Fixed several rock cache_dir corruption issues
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
Server Applications Module 15
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-2019-2975=1
-
Server Applications Module 15-SP1
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP1-2019-2975=1
Package List:
-
Server Applications Module 15 (aarch64 ppc64le s390x x86_64)
- squid-debugsource-4.9-5.11.1
- squid-debuginfo-4.9-5.11.1
- squid-4.9-5.11.1
-
Server Applications Module 15-SP1 (aarch64 ppc64le s390x x86_64)
- squid-debugsource-4.9-5.11.1
- squid-debuginfo-4.9-5.11.1
- squid-4.9-5.11.1
References:
- https://www.suse.com/security/cve/CVE-2019-12523.html
- https://www.suse.com/security/cve/CVE-2019-12525.html
- https://www.suse.com/security/cve/CVE-2019-12526.html
- https://www.suse.com/security/cve/CVE-2019-12527.html
- https://www.suse.com/security/cve/CVE-2019-12529.html
- https://www.suse.com/security/cve/CVE-2019-12854.html
- https://www.suse.com/security/cve/CVE-2019-13345.html
- https://www.suse.com/security/cve/CVE-2019-18676.html
- https://www.suse.com/security/cve/CVE-2019-18677.html
- https://www.suse.com/security/cve/CVE-2019-18678.html
- https://www.suse.com/security/cve/CVE-2019-18679.html
- https://www.suse.com/security/cve/CVE-2019-3688.html
- https://bugzilla.suse.com/show_bug.cgi?id=1133089
- https://bugzilla.suse.com/show_bug.cgi?id=1140738
- https://bugzilla.suse.com/show_bug.cgi?id=1141329
- https://bugzilla.suse.com/show_bug.cgi?id=1141330
- https://bugzilla.suse.com/show_bug.cgi?id=1141332
- https://bugzilla.suse.com/show_bug.cgi?id=1141442
- https://bugzilla.suse.com/show_bug.cgi?id=1156323
- https://bugzilla.suse.com/show_bug.cgi?id=1156324
- https://bugzilla.suse.com/show_bug.cgi?id=1156326
- https://bugzilla.suse.com/show_bug.cgi?id=1156328
- https://bugzilla.suse.com/show_bug.cgi?id=1156329