[RHSA-2019:2593] squid:4 security update
Severity
Important
Affected Packages
12
CVEs
1
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
- squid: heap-based buffer overflow in HttpHeader::getAuth (CVE-2019-12527)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
- ID
- RHSA-2019:2593
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2019:2593
- Published
-
2019-09-03T00:00:00
(5 years ago) - Modified
-
2019-09-03T00:00:00
(5 years ago) - Rights
- Copyright 2019 Red Hat, Inc.
- Other Advisories
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 1730533 | https://bugzilla.redhat.com/1730533 | |
RHSA | RHSA-2019:2593 | https://access.redhat.com/errata/RHSA-2019:2593 | |
CVE | CVE-2019-12527 | https://access.redhat.com/security/cve/CVE-2019-12527 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/squid?arch=x86_64&distro=redhat-8.0 | redhat | squid | < 4.4-5.module+el8.0.0+4045+70edde92 | redhat-8.0 | x86_64 | |
Affected | pkg:rpm/redhat/squid?arch=s390x&distro=redhat-8.0 | redhat | squid | < 4.4-5.module+el8.0.0+4045+70edde92 | redhat-8.0 | s390x | |
Affected | pkg:rpm/redhat/squid?arch=ppc64le&distro=redhat-8.0 | redhat | squid | < 4.4-5.module+el8.0.0+4045+70edde92 | redhat-8.0 | ppc64le | |
Affected | pkg:rpm/redhat/squid?arch=aarch64&distro=redhat-8.0 | redhat | squid | < 4.4-5.module+el8.0.0+4045+70edde92 | redhat-8.0 | aarch64 | |
Affected | pkg:rpm/redhat/libecap?arch=x86_64&distro=redhat-8.0 | redhat | libecap | < 1.0.1-2.module+el8.0.0+4045+70edde92 | redhat-8.0 | x86_64 | |
Affected | pkg:rpm/redhat/libecap?arch=s390x&distro=redhat-8.0 | redhat | libecap | < 1.0.1-2.module+el8.0.0+4045+70edde92 | redhat-8.0 | s390x | |
Affected | pkg:rpm/redhat/libecap?arch=ppc64le&distro=redhat-8.0 | redhat | libecap | < 1.0.1-2.module+el8.0.0+4045+70edde92 | redhat-8.0 | ppc64le | |
Affected | pkg:rpm/redhat/libecap?arch=aarch64&distro=redhat-8.0 | redhat | libecap | < 1.0.1-2.module+el8.0.0+4045+70edde92 | redhat-8.0 | aarch64 | |
Affected | pkg:rpm/redhat/libecap-devel?arch=x86_64&distro=redhat-8.0 | redhat | libecap-devel | < 1.0.1-2.module+el8.0.0+4045+70edde92 | redhat-8.0 | x86_64 | |
Affected | pkg:rpm/redhat/libecap-devel?arch=s390x&distro=redhat-8.0 | redhat | libecap-devel | < 1.0.1-2.module+el8.0.0+4045+70edde92 | redhat-8.0 | s390x | |
Affected | pkg:rpm/redhat/libecap-devel?arch=ppc64le&distro=redhat-8.0 | redhat | libecap-devel | < 1.0.1-2.module+el8.0.0+4045+70edde92 | redhat-8.0 | ppc64le | |
Affected | pkg:rpm/redhat/libecap-devel?arch=aarch64&distro=redhat-8.0 | redhat | libecap-devel | < 1.0.1-2.module+el8.0.0+4045+70edde92 | redhat-8.0 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |