what you don't know can hurt you

Red Hat Security Advisory 2020-4743-01

Red Hat Security Advisory 2020-4743-01
Posted Nov 4, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-4743-01 - Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Issues addressed include buffer overflow, bypass, cross site request forgery, denial of service, heap overflow, information leakage, and out of bounds read vulnerabilities.

tags | advisory, web, denial of service, overflow, vulnerability, csrf
systems | linux, redhat
advisories | CVE-2019-12520, CVE-2019-12521, CVE-2019-12523, CVE-2019-12524, CVE-2019-12526, CVE-2019-12528, CVE-2019-12529, CVE-2019-12854, CVE-2019-18676, CVE-2019-18677, CVE-2019-18678, CVE-2019-18679, CVE-2019-18860, CVE-2020-14058, CVE-2020-15049, CVE-2020-24606, CVE-2020-8449, CVE-2020-8450
MD5 | 9d6e01336e2e2755764b1fc2058759d5

Red Hat Security Advisory 2020-4743-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Moderate: squid:4 security, bug fix, and enhancement update
Advisory ID: RHSA-2020:4743-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2020:4743
Issue date: 2020-11-03
CVE Names: CVE-2019-12520 CVE-2019-12521 CVE-2019-12523
CVE-2019-12524 CVE-2019-12526 CVE-2019-12528
CVE-2019-12529 CVE-2019-12854 CVE-2019-18676
CVE-2019-18677 CVE-2019-18678 CVE-2019-18679
CVE-2019-18860 CVE-2020-8449 CVE-2020-8450
CVE-2020-14058 CVE-2020-15049 CVE-2020-24606
====================================================================
1. Summary:

An update for the squid:4 module is now available for Red Hat Enterprise
Linux 8.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64

3. Description:

Squid is a high-performance proxy caching server for web clients,
supporting FTP, Gopher, and HTTP data objects.

The following packages have been upgraded to a later upstream version:
squid (4.11). (BZ#1829467)

Security Fix(es):

* squid: Improper input validation in request allows for proxy manipulation
(CVE-2019-12520)

* squid: Off-by-one error in addStackElement allows for heap buffer
overflow and crash (CVE-2019-12521)

* squid: Improper input validation in URI processor (CVE-2019-12523)

* squid: Improper access restriction in url_regex may lead to security
bypass (CVE-2019-12524)

* squid: Heap overflow issue in URN processing (CVE-2019-12526)

* squid: Information Disclosure issue in FTP Gateway (CVE-2019-12528)

* squid: Out of bounds read in Proxy-Authorization header causes DoS
(CVE-2019-12529)

* squid: Denial of service in cachemgr.cgi (CVE-2019-12854)

* squid: Buffer overflow in URI processor (CVE-2019-18676)

* squid: Cross-Site Request Forgery issue in HTTP Request processing
(CVE-2019-18677)

* squid: HTTP Request Splitting issue in HTTP message processing
(CVE-2019-18678)

* squid: Information Disclosure issue in HTTP Digest Authentication
(CVE-2019-18679)

* squid: Mishandled HTML in the host parameter to cachemgr.cgi results in
insecure behaviour (CVE-2019-18860)

* squid: Improper input validation issues in HTTP Request processing
(CVE-2020-8449)

* squid: Buffer overflow in reverse-proxy configurations (CVE-2020-8450)

* squid: DoS in TLS handshake (CVE-2020-14058)

* squid: Request smuggling and poisoning attack against the HTTP cache
(CVE-2020-15049)

* squid: Improper input validation could result in a DoS (CVE-2020-24606)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat
Enterprise Linux 8.3 Release Notes linked from the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing this update, the squid service will be restarted
automatically.

5. Bugs fixed (https://bugzilla.redhat.com/):

1730523 - CVE-2019-12854 squid: Denial of service in cachemgr.cgi
1730528 - CVE-2019-12529 squid: Out of bounds read in Proxy-Authorization header causes DoS
1770349 - CVE-2019-18678 squid: HTTP Request Splitting issue in HTTP message processing
1770356 - CVE-2019-12526 squid: Heap overflow issue in URN processing
1770360 - CVE-2019-18679 squid: Information Disclosure issue in HTTP Digest Authentication
1770365 - CVE-2019-18677 squid: Cross-Site Request Forgery issue in HTTP Request processing
1770371 - CVE-2019-12523 squid: Improper input validation in URI processor
1770375 - CVE-2019-18676 squid: Buffer overflow in URI processor
1798534 - CVE-2019-12528 squid: Information Disclosure issue in FTP Gateway
1798540 - CVE-2020-8449 squid: Improper input validation issues in HTTP Request processing
1798552 - CVE-2020-8450 squid: Buffer overflow in reverse-proxy configurations
1817121 - CVE-2019-18860 squid: Mishandled HTML in the host parameter to cachemgr.cgi results in insecure behaviour
1827558 - CVE-2019-12520 squid: Improper input validation in request allows for proxy manipulation
1827562 - CVE-2019-12521 squid: Off-by-one error in addStackElement allows for heap buffer overflow and crash
1827570 - CVE-2019-12524 squid: Improper access restriction in url_regex may lead to security bypass
1852550 - CVE-2020-15049 squid: Request smuggling and poisoning attack against the HTTP cache
1852554 - CVE-2020-14058 squid: DoS in TLS handshake
1871705 - CVE-2020-24606 squid: Improper input validation could result in a DoS

6. Package List:

Red Hat Enterprise Linux AppStream (v. 8):

Source:
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.src.rpm
squid-4.11-3.module+el8.3.0+7851+7808b5f9.src.rpm

aarch64:
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.aarch64.rpm
libecap-debuginfo-1.0.1-2.module+el8.1.0+4044+36416a77.aarch64.rpm
libecap-debugsource-1.0.1-2.module+el8.1.0+4044+36416a77.aarch64.rpm
libecap-devel-1.0.1-2.module+el8.1.0+4044+36416a77.aarch64.rpm
squid-4.11-3.module+el8.3.0+7851+7808b5f9.aarch64.rpm
squid-debuginfo-4.11-3.module+el8.3.0+7851+7808b5f9.aarch64.rpm
squid-debugsource-4.11-3.module+el8.3.0+7851+7808b5f9.aarch64.rpm

ppc64le:
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le.rpm
libecap-debuginfo-1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le.rpm
libecap-debugsource-1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le.rpm
libecap-devel-1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le.rpm
squid-4.11-3.module+el8.3.0+7851+7808b5f9.ppc64le.rpm
squid-debuginfo-4.11-3.module+el8.3.0+7851+7808b5f9.ppc64le.rpm
squid-debugsource-4.11-3.module+el8.3.0+7851+7808b5f9.ppc64le.rpm

s390x:
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.s390x.rpm
libecap-debuginfo-1.0.1-2.module+el8.1.0+4044+36416a77.s390x.rpm
libecap-debugsource-1.0.1-2.module+el8.1.0+4044+36416a77.s390x.rpm
libecap-devel-1.0.1-2.module+el8.1.0+4044+36416a77.s390x.rpm
squid-4.11-3.module+el8.3.0+7851+7808b5f9.s390x.rpm
squid-debuginfo-4.11-3.module+el8.3.0+7851+7808b5f9.s390x.rpm
squid-debugsource-4.11-3.module+el8.3.0+7851+7808b5f9.s390x.rpm

x86_64:
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
libecap-debuginfo-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
libecap-debugsource-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
libecap-devel-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
squid-4.11-3.module+el8.3.0+7851+7808b5f9.x86_64.rpm
squid-debuginfo-4.11-3.module+el8.3.0+7851+7808b5f9.x86_64.rpm
squid-debugsource-4.11-3.module+el8.3.0+7851+7808b5f9.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-12520
https://access.redhat.com/security/cve/CVE-2019-12521
https://access.redhat.com/security/cve/CVE-2019-12523
https://access.redhat.com/security/cve/CVE-2019-12524
https://access.redhat.com/security/cve/CVE-2019-12526
https://access.redhat.com/security/cve/CVE-2019-12528
https://access.redhat.com/security/cve/CVE-2019-12529
https://access.redhat.com/security/cve/CVE-2019-12854
https://access.redhat.com/security/cve/CVE-2019-18676
https://access.redhat.com/security/cve/CVE-2019-18677
https://access.redhat.com/security/cve/CVE-2019-18678
https://access.redhat.com/security/cve/CVE-2019-18679
https://access.redhat.com/security/cve/CVE-2019-18860
https://access.redhat.com/security/cve/CVE-2020-8449
https://access.redhat.com/security/cve/CVE-2020-8450
https://access.redhat.com/security/cve/CVE-2020-14058
https://access.redhat.com/security/cve/CVE-2020-15049
https://access.redhat.com/security/cve/CVE-2020-24606
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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lClE
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

October 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    16 Files
  • 2
    Oct 2nd
    1 Files
  • 3
    Oct 3rd
    1 Files
  • 4
    Oct 4th
    24 Files
  • 5
    Oct 5th
    24 Files
  • 6
    Oct 6th
    11 Files
  • 7
    Oct 7th
    14 Files
  • 8
    Oct 8th
    19 Files
  • 9
    Oct 9th
    1 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    7 Files
  • 12
    Oct 12th
    15 Files
  • 13
    Oct 13th
    26 Files
  • 14
    Oct 14th
    10 Files
  • 15
    Oct 15th
    6 Files
  • 16
    Oct 16th
    2 Files
  • 17
    Oct 17th
    1 Files
  • 18
    Oct 18th
    14 Files
  • 19
    Oct 19th
    15 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close