Red Hat Security Advisory 2020-4743-01 - Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Issues addressed include buffer overflow, bypass, cross site request forgery, denial of service, heap overflow, information leakage, and out of bounds read vulnerabilities.
6a36bcffb87c3fe39872c03d6a9977d9fae1e90b42488ae64fd7e983caa0c436
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Moderate: squid:4 security, bug fix, and enhancement update
Advisory ID: RHSA-2020:4743-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2020:4743
Issue date: 2020-11-03
CVE Names: CVE-2019-12520 CVE-2019-12521 CVE-2019-12523
CVE-2019-12524 CVE-2019-12526 CVE-2019-12528
CVE-2019-12529 CVE-2019-12854 CVE-2019-18676
CVE-2019-18677 CVE-2019-18678 CVE-2019-18679
CVE-2019-18860 CVE-2020-8449 CVE-2020-8450
CVE-2020-14058 CVE-2020-15049 CVE-2020-24606
====================================================================
1. Summary:
An update for the squid:4 module is now available for Red Hat Enterprise
Linux 8.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64
3. Description:
Squid is a high-performance proxy caching server for web clients,
supporting FTP, Gopher, and HTTP data objects.
The following packages have been upgraded to a later upstream version:
squid (4.11). (BZ#1829467)
Security Fix(es):
* squid: Improper input validation in request allows for proxy manipulation
(CVE-2019-12520)
* squid: Off-by-one error in addStackElement allows for heap buffer
overflow and crash (CVE-2019-12521)
* squid: Improper input validation in URI processor (CVE-2019-12523)
* squid: Improper access restriction in url_regex may lead to security
bypass (CVE-2019-12524)
* squid: Heap overflow issue in URN processing (CVE-2019-12526)
* squid: Information Disclosure issue in FTP Gateway (CVE-2019-12528)
* squid: Out of bounds read in Proxy-Authorization header causes DoS
(CVE-2019-12529)
* squid: Denial of service in cachemgr.cgi (CVE-2019-12854)
* squid: Buffer overflow in URI processor (CVE-2019-18676)
* squid: Cross-Site Request Forgery issue in HTTP Request processing
(CVE-2019-18677)
* squid: HTTP Request Splitting issue in HTTP message processing
(CVE-2019-18678)
* squid: Information Disclosure issue in HTTP Digest Authentication
(CVE-2019-18679)
* squid: Mishandled HTML in the host parameter to cachemgr.cgi results in
insecure behaviour (CVE-2019-18860)
* squid: Improper input validation issues in HTTP Request processing
(CVE-2020-8449)
* squid: Buffer overflow in reverse-proxy configurations (CVE-2020-8450)
* squid: DoS in TLS handshake (CVE-2020-14058)
* squid: Request smuggling and poisoning attack against the HTTP cache
(CVE-2020-15049)
* squid: Improper input validation could result in a DoS (CVE-2020-24606)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat
Enterprise Linux 8.3 Release Notes linked from the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing this update, the squid service will be restarted
automatically.
5. Bugs fixed (https://bugzilla.redhat.com/):
1730523 - CVE-2019-12854 squid: Denial of service in cachemgr.cgi
1730528 - CVE-2019-12529 squid: Out of bounds read in Proxy-Authorization header causes DoS
1770349 - CVE-2019-18678 squid: HTTP Request Splitting issue in HTTP message processing
1770356 - CVE-2019-12526 squid: Heap overflow issue in URN processing
1770360 - CVE-2019-18679 squid: Information Disclosure issue in HTTP Digest Authentication
1770365 - CVE-2019-18677 squid: Cross-Site Request Forgery issue in HTTP Request processing
1770371 - CVE-2019-12523 squid: Improper input validation in URI processor
1770375 - CVE-2019-18676 squid: Buffer overflow in URI processor
1798534 - CVE-2019-12528 squid: Information Disclosure issue in FTP Gateway
1798540 - CVE-2020-8449 squid: Improper input validation issues in HTTP Request processing
1798552 - CVE-2020-8450 squid: Buffer overflow in reverse-proxy configurations
1817121 - CVE-2019-18860 squid: Mishandled HTML in the host parameter to cachemgr.cgi results in insecure behaviour
1827558 - CVE-2019-12520 squid: Improper input validation in request allows for proxy manipulation
1827562 - CVE-2019-12521 squid: Off-by-one error in addStackElement allows for heap buffer overflow and crash
1827570 - CVE-2019-12524 squid: Improper access restriction in url_regex may lead to security bypass
1852550 - CVE-2020-15049 squid: Request smuggling and poisoning attack against the HTTP cache
1852554 - CVE-2020-14058 squid: DoS in TLS handshake
1871705 - CVE-2020-24606 squid: Improper input validation could result in a DoS
6. Package List:
Red Hat Enterprise Linux AppStream (v. 8):
Source:
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.src.rpm
squid-4.11-3.module+el8.3.0+7851+7808b5f9.src.rpm
aarch64:
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.aarch64.rpm
libecap-debuginfo-1.0.1-2.module+el8.1.0+4044+36416a77.aarch64.rpm
libecap-debugsource-1.0.1-2.module+el8.1.0+4044+36416a77.aarch64.rpm
libecap-devel-1.0.1-2.module+el8.1.0+4044+36416a77.aarch64.rpm
squid-4.11-3.module+el8.3.0+7851+7808b5f9.aarch64.rpm
squid-debuginfo-4.11-3.module+el8.3.0+7851+7808b5f9.aarch64.rpm
squid-debugsource-4.11-3.module+el8.3.0+7851+7808b5f9.aarch64.rpm
ppc64le:
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le.rpm
libecap-debuginfo-1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le.rpm
libecap-debugsource-1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le.rpm
libecap-devel-1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le.rpm
squid-4.11-3.module+el8.3.0+7851+7808b5f9.ppc64le.rpm
squid-debuginfo-4.11-3.module+el8.3.0+7851+7808b5f9.ppc64le.rpm
squid-debugsource-4.11-3.module+el8.3.0+7851+7808b5f9.ppc64le.rpm
s390x:
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.s390x.rpm
libecap-debuginfo-1.0.1-2.module+el8.1.0+4044+36416a77.s390x.rpm
libecap-debugsource-1.0.1-2.module+el8.1.0+4044+36416a77.s390x.rpm
libecap-devel-1.0.1-2.module+el8.1.0+4044+36416a77.s390x.rpm
squid-4.11-3.module+el8.3.0+7851+7808b5f9.s390x.rpm
squid-debuginfo-4.11-3.module+el8.3.0+7851+7808b5f9.s390x.rpm
squid-debugsource-4.11-3.module+el8.3.0+7851+7808b5f9.s390x.rpm
x86_64:
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
libecap-debuginfo-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
libecap-debugsource-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
libecap-devel-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
squid-4.11-3.module+el8.3.0+7851+7808b5f9.x86_64.rpm
squid-debuginfo-4.11-3.module+el8.3.0+7851+7808b5f9.x86_64.rpm
squid-debugsource-4.11-3.module+el8.3.0+7851+7808b5f9.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2019-12520
https://access.redhat.com/security/cve/CVE-2019-12521
https://access.redhat.com/security/cve/CVE-2019-12523
https://access.redhat.com/security/cve/CVE-2019-12524
https://access.redhat.com/security/cve/CVE-2019-12526
https://access.redhat.com/security/cve/CVE-2019-12528
https://access.redhat.com/security/cve/CVE-2019-12529
https://access.redhat.com/security/cve/CVE-2019-12854
https://access.redhat.com/security/cve/CVE-2019-18676
https://access.redhat.com/security/cve/CVE-2019-18677
https://access.redhat.com/security/cve/CVE-2019-18678
https://access.redhat.com/security/cve/CVE-2019-18679
https://access.redhat.com/security/cve/CVE-2019-18860
https://access.redhat.com/security/cve/CVE-2020-8449
https://access.redhat.com/security/cve/CVE-2020-8450
https://access.redhat.com/security/cve/CVE-2020-14058
https://access.redhat.com/security/cve/CVE-2020-15049
https://access.redhat.com/security/cve/CVE-2020-24606
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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lClE
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce