openSUSE Security Update: Security update for squid
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2019:2540-1
Rating:             important
References:         #1133089 #1140738 #1141329 #1141330 #1141332 
                    #1141442 #1156323 #1156324 #1156326 #1156328 
                    #1156329 
Cross-References:   CVE-2019-12523 CVE-2019-12525 CVE-2019-12526
                    CVE-2019-12527 CVE-2019-12529 CVE-2019-12854
                    CVE-2019-13345 CVE-2019-18676 CVE-2019-18677
                    CVE-2019-18678 CVE-2019-18679 CVE-2019-3688
                   
Affected Products:
                    openSUSE Leap 15.0
______________________________________________________________________________

   An update that fixes 12 vulnerabilities is now available.

Description:

   This update for squid to version 4.9 fixes the following issues:

   Security issues fixed:

   - CVE-2019-13345: Fixed multiple cross-site scripting vulnerabilities in
     cachemgr.cgi (bsc#1140738).
   - CVE-2019-12526: Fixed potential remote code execution during URN
     processing (bsc#1156326).
   - CVE-2019-12523,CVE-2019-18676: Fixed multiple improper validations in
     URI processing (bsc#1156329).
   - CVE-2019-18677: Fixed Cross-Site Request Forgery in HTTP Request
     processing (bsc#1156328).
   - CVE-2019-18678: Fixed incorrect message parsing which could have led to
     HTTP request splitting issue (bsc#1156323).
   - CVE-2019-18679: Fixed information disclosure when processing HTTP Digest
     Authentication (bsc#1156324).

   Other issues addressed:

    * Fixed DNS failures when peer name was configured with any upper case
      characters    * Fixed several rock cache_dir corruption issues

   This update was imported from the SUSE:SLE-15:Update update project.


Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Leap 15.0:

      zypper in -t patch openSUSE-2019-2540=1



Package List:

   - openSUSE Leap 15.0 (x86_64):

      squid-4.9-lp150.13.1
      squid-debuginfo-4.9-lp150.13.1
      squid-debugsource-4.9-lp150.13.1


References:

   https://www.suse.com/security/cve/CVE-2019-12523.html
   https://www.suse.com/security/cve/CVE-2019-12525.html
   https://www.suse.com/security/cve/CVE-2019-12526.html
   https://www.suse.com/security/cve/CVE-2019-12527.html
   https://www.suse.com/security/cve/CVE-2019-12529.html
   https://www.suse.com/security/cve/CVE-2019-12854.html
   https://www.suse.com/security/cve/CVE-2019-13345.html
   https://www.suse.com/security/cve/CVE-2019-18676.html
   https://www.suse.com/security/cve/CVE-2019-18677.html
   https://www.suse.com/security/cve/CVE-2019-18678.html
   https://www.suse.com/security/cve/CVE-2019-18679.html
   https://www.suse.com/security/cve/CVE-2019-3688.html
   https://bugzilla.suse.com/1133089
   https://bugzilla.suse.com/1140738
   https://bugzilla.suse.com/1141329
   https://bugzilla.suse.com/1141330
   https://bugzilla.suse.com/1141332
   https://bugzilla.suse.com/1141442
   https://bugzilla.suse.com/1156323
   https://bugzilla.suse.com/1156324
   https://bugzilla.suse.com/1156326
   https://bugzilla.suse.com/1156328
   https://bugzilla.suse.com/1156329

-- 

openSUSE: 2019:2540-1: important: squid

November 21, 2019
An update that fixes 12 vulnerabilities is now available.

Description

This update for squid to version 4.9 fixes the following issues: Security issues fixed: - CVE-2019-13345: Fixed multiple cross-site scripting vulnerabilities in cachemgr.cgi (bsc#1140738). - CVE-2019-12526: Fixed potential remote code execution during URN processing (bsc#1156326). - CVE-2019-12523,CVE-2019-18676: Fixed multiple improper validations in URI processing (bsc#1156329). - CVE-2019-18677: Fixed Cross-Site Request Forgery in HTTP Request processing (bsc#1156328). - CVE-2019-18678: Fixed incorrect message parsing which could have led to HTTP request splitting issue (bsc#1156323). - CVE-2019-18679: Fixed information disclosure when processing HTTP Digest Authentication (bsc#1156324). Other issues addressed: * Fixed DNS failures when peer name was configured with any upper case characters * Fixed several rock cache_dir corruption issues This update was imported from the SUSE:SLE-15:Update update project.

 

Patch

Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.0: zypper in -t patch openSUSE-2019-2540=1


Package List

- openSUSE Leap 15.0 (x86_64): squid-4.9-lp150.13.1 squid-debuginfo-4.9-lp150.13.1 squid-debugsource-4.9-lp150.13.1


References

https://www.suse.com/security/cve/CVE-2019-12523.html https://www.suse.com/security/cve/CVE-2019-12525.html https://www.suse.com/security/cve/CVE-2019-12526.html https://www.suse.com/security/cve/CVE-2019-12527.html https://www.suse.com/security/cve/CVE-2019-12529.html https://www.suse.com/security/cve/CVE-2019-12854.html https://www.suse.com/security/cve/CVE-2019-13345.html https://www.suse.com/security/cve/CVE-2019-18676.html https://www.suse.com/security/cve/CVE-2019-18677.html https://www.suse.com/security/cve/CVE-2019-18678.html https://www.suse.com/security/cve/CVE-2019-18679.html https://www.suse.com/security/cve/CVE-2019-3688.html https://bugzilla.suse.com/1133089 https://bugzilla.suse.com/1140738 https://bugzilla.suse.com/1141329 https://bugzilla.suse.com/1141330 https://bugzilla.suse.com/1141332 https://bugzilla.suse.com/1141442 https://bugzilla.suse.com/1156323 https://bugzilla.suse.com/1156324 https://bugzilla.suse.com/1156326 https://bugzilla.suse.com/1156328 https://bugzilla.suse.com/1156329--


Severity
Announcement ID: openSUSE-SU-2019:2540-1
Rating: important
Affected Products: openSUSE Leap 15.0

Related News