[ALSA-2020:4743] squid:4 security, bug fix, and enhancement update
An update for the squid:4 module is now available for AlmaLinux AlmaLinux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
The following packages have been upgraded to a later upstream version: squid (4.11). (BZ#1829467)
Security Fix(es):
squid: Improper input validation in request allows for proxy manipulation (CVE-2019-12520)
squid: Off-by-one error in addStackElement allows for heap buffer overflow and crash (CVE-2019-12521)
squid: Improper input validation in URI processor (CVE-2019-12523)
squid: Improper access restriction in url_regex may lead to security bypass (CVE-2019-12524)
squid: Heap overflow issue in URN processing (CVE-2019-12526)
squid: Information Disclosure issue in FTP Gateway (CVE-2019-12528)
squid: Out of bounds read in Proxy-Authorization header causes DoS (CVE-2019-12529)
squid: Denial of service in cachemgr.cgi (CVE-2019-12854)
squid: Buffer overflow in URI processor (CVE-2019-18676)
squid: Cross-Site Request Forgery issue in HTTP Request processing (CVE-2019-18677)
squid: HTTP Request Splitting issue in HTTP message processing (CVE-2019-18678)
squid: Information Disclosure issue in HTTP Digest Authentication (CVE-2019-18679)
squid: Mishandled HTML in the host parameter to cachemgr.cgi results in insecure behaviour (CVE-2019-18860)
squid: Improper input validation issues in HTTP Request processing (CVE-2020-8449)
squid: Buffer overflow in reverse-proxy configurations (CVE-2020-8450)
squid: DoS in TLS handshake (CVE-2020-14058)
squid: Request smuggling and poisoning attack against the HTTP cache (CVE-2020-15049)
squid: Improper input validation could result in a DoS (CVE-2020-24606)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
Package | Affected Version |
---|---|
pkg:rpm/almalinux/squid?arch=x86_64&distro=almalinux-8.3 | < 4.11-3.module_el8.3.0+6184+7808b5f9 |
pkg:rpm/almalinux/libecap?arch=x86_64&distro=almalinux-8.6 | < 1.0.1-2.module_el8.6.0+2741+01592ae8 |
pkg:rpm/almalinux/libecap?arch=x86_64&distro=almalinux-8.4 | < 1.0.1-2.module_el8.4.0+2339+2063f9d1 |
pkg:rpm/almalinux/libecap?arch=x86_64&distro=almalinux-8.1 | < 1.0.1-2.module_el8.1.0+6030+78f2fc2a |
pkg:rpm/almalinux/libecap?arch=aarch64&distro=almalinux-8.6 | < 1.0.1-2.module_el8.6.0+2741+01592ae8 |
pkg:rpm/almalinux/libecap-devel?arch=x86_64&distro=almalinux-8.6 | < 1.0.1-2.module_el8.6.0+2741+01592ae8 |
pkg:rpm/almalinux/libecap-devel?arch=x86_64&distro=almalinux-8.4 | < 1.0.1-2.module_el8.4.0+2339+2063f9d1 |
pkg:rpm/almalinux/libecap-devel?arch=x86_64&distro=almalinux-8.1 | < 1.0.1-2.module_el8.1.0+6030+78f2fc2a |
pkg:rpm/almalinux/libecap-devel?arch=aarch64&distro=almalinux-8.6 | < 1.0.1-2.module_el8.6.0+2741+01592ae8 |
- ID
- ALSA-2020:4743
- Severity
- moderate
- URL
- https://errata.almalinux.org/ALSA-2020:4743.html
- Published
-
2020-11-03T12:32:17
(3 years ago) - Modified
-
2020-11-03T19:54:15
(3 years ago) - Rights
- Copyright 2022 AlmaLinux OS
- Other Advisories
-
- ALAS-2020-1378
- ALAS-2020-1453
- ALAS-2023-1754
- ALAS-2023-1757
- ALAS-2023-1774
- ALAS2-2020-1486
- ALAS2-2020-1548
- ALAS2-2023-2063
- ALAS2-2023-2065
- ALAS2-2023-2081
- ALAS2-2023-2318
- ALAS2-2024-2509
- ALPINE:CVE-2019-12521
- ALPINE:CVE-2019-12528
- ALPINE:CVE-2019-12529
- ALPINE:CVE-2019-18679
- ALPINE:CVE-2020-15049
- ALPINE:CVE-2020-24606
- ALPINE:CVE-2020-8449
- ALPINE:CVE-2020-8450
- ASA-201911-8
- DSA-4507-1
- DSA-4682-1
- DSA-4732-1
- DSA-4751-1
- ELSA-2020-4082
- ELSA-2022-22254
- FEDORA-2019-0b16cbdd0e
- FEDORA-2019-9538783033
- FEDORA-2019-cb50bcc189
- FEDORA-2020-56e809930e
- FEDORA-2020-63f3bd656e
- FEDORA-2020-6c58bff862
- FEDORA-2020-73af8655eb
- FEDORA-2020-790296a8f4
- FEDORA-2020-ab8e7463ab
- FEDORA-2020-cbebc5617e
- FREEBSD:57C1C2EE-7914-11EA-90BF-0800276545C1
- FREEBSD:620685D6-0AA3-11EA-9673-4C72B94353B5
- GLSA-202003-34
- GLSA-202005-05
- openSUSE-SU-2019:2540-1
- openSUSE-SU-2019:2541-1
- openSUSE-SU-2020:0307-1
- openSUSE-SU-2020:0606-1
- openSUSE-SU-2020:0623-1
- openSUSE-SU-2020:1346-1
- openSUSE-SU-2020:1369-1
- RHSA-2020:4082
- RHSA-2020:4743
- RLSA-2020:4743
- SUSE-SU-2019:2089-1
- SUSE-SU-2019:2089-2
- SUSE-SU-2019:2975-1
- SUSE-SU-2019:3067-1
- SUSE-SU-2020:0487-1
- SUSE-SU-2020:0493-1
- SUSE-SU-2020:0661-1
- SUSE-SU-2020:1134-1
- SUSE-SU-2020:1156-1
- SUSE-SU-2020:1227-1
- SUSE-SU-2020:1803-1
- SUSE-SU-2020:1946-1
- SUSE-SU-2020:2442-1
- SUSE-SU-2020:2443-1
- SUSE-SU-2020:2471-1
- USN-4065-1
- USN-4065-2
- USN-4213-1
- USN-4289-1
- USN-4356-1
- USN-4446-1
- USN-4477-1
- USN-4551-1
- USN-4895-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/almalinux/squid?arch=x86_64&distro=almalinux-8.3 | almalinux | squid | < 4.11-3.module_el8.3.0+6184+7808b5f9 | almalinux-8.3 | x86_64 | |
Affected | pkg:rpm/almalinux/libecap?arch=x86_64&distro=almalinux-8.6 | almalinux | libecap | < 1.0.1-2.module_el8.6.0+2741+01592ae8 | almalinux-8.6 | x86_64 | |
Affected | pkg:rpm/almalinux/libecap?arch=x86_64&distro=almalinux-8.4 | almalinux | libecap | < 1.0.1-2.module_el8.4.0+2339+2063f9d1 | almalinux-8.4 | x86_64 | |
Affected | pkg:rpm/almalinux/libecap?arch=x86_64&distro=almalinux-8.1 | almalinux | libecap | < 1.0.1-2.module_el8.1.0+6030+78f2fc2a | almalinux-8.1 | x86_64 | |
Affected | pkg:rpm/almalinux/libecap?arch=aarch64&distro=almalinux-8.6 | almalinux | libecap | < 1.0.1-2.module_el8.6.0+2741+01592ae8 | almalinux-8.6 | aarch64 | |
Affected | pkg:rpm/almalinux/libecap-devel?arch=x86_64&distro=almalinux-8.6 | almalinux | libecap-devel | < 1.0.1-2.module_el8.6.0+2741+01592ae8 | almalinux-8.6 | x86_64 | |
Affected | pkg:rpm/almalinux/libecap-devel?arch=x86_64&distro=almalinux-8.4 | almalinux | libecap-devel | < 1.0.1-2.module_el8.4.0+2339+2063f9d1 | almalinux-8.4 | x86_64 | |
Affected | pkg:rpm/almalinux/libecap-devel?arch=x86_64&distro=almalinux-8.1 | almalinux | libecap-devel | < 1.0.1-2.module_el8.1.0+6030+78f2fc2a | almalinux-8.1 | x86_64 | |
Affected | pkg:rpm/almalinux/libecap-devel?arch=aarch64&distro=almalinux-8.6 | almalinux | libecap-devel | < 1.0.1-2.module_el8.6.0+2741+01592ae8 | almalinux-8.6 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |