-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Moderate: squid:4 security, bug fix, and enhancement update
Advisory ID:       RHSA-2020:4743-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2020:4743
Issue date:        2020-11-03
CVE Names:         CVE-2019-12520 CVE-2019-12521 CVE-2019-12523 
                   CVE-2019-12524 CVE-2019-12526 CVE-2019-12528 
                   CVE-2019-12529 CVE-2019-12854 CVE-2019-18676 
                   CVE-2019-18677 CVE-2019-18678 CVE-2019-18679 
                   CVE-2019-18860 CVE-2020-8449 CVE-2020-8450 
                   CVE-2020-14058 CVE-2020-15049 CVE-2020-24606 
====================================================================
1. Summary:

An update for the squid:4 module is now available for Red Hat Enterprise
Linux 8.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64

3. Description:

Squid is a high-performance proxy caching server for web clients,
supporting FTP, Gopher, and HTTP data objects.

The following packages have been upgraded to a later upstream version:
squid (4.11). (BZ#1829467)

Security Fix(es):

* squid: Improper input validation in request allows for proxy manipulation
(CVE-2019-12520)

* squid: Off-by-one error in addStackElement allows for heap buffer
overflow and crash (CVE-2019-12521)

* squid: Improper input validation in URI processor (CVE-2019-12523)

* squid: Improper access restriction in url_regex may lead to security
bypass (CVE-2019-12524)

* squid: Heap overflow issue in URN processing (CVE-2019-12526)

* squid: Information Disclosure issue in FTP Gateway (CVE-2019-12528)

* squid: Out of bounds read in Proxy-Authorization header causes DoS
(CVE-2019-12529)

* squid: Denial of service in cachemgr.cgi (CVE-2019-12854)

* squid: Buffer overflow in URI processor (CVE-2019-18676)

* squid: Cross-Site Request Forgery issue in HTTP Request processing
(CVE-2019-18677)

* squid: HTTP Request Splitting issue in HTTP message processing
(CVE-2019-18678)

* squid: Information Disclosure issue in HTTP Digest Authentication
(CVE-2019-18679)

* squid: Mishandled HTML in the host parameter to cachemgr.cgi results in
insecure behaviour (CVE-2019-18860)

* squid: Improper input validation issues in HTTP Request processing
(CVE-2020-8449)

* squid: Buffer overflow in reverse-proxy configurations (CVE-2020-8450)

* squid: DoS in TLS handshake (CVE-2020-14058)

* squid: Request smuggling and poisoning attack against the HTTP cache
(CVE-2020-15049)

* squid: Improper input validation could result in a DoS (CVE-2020-24606)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat
Enterprise Linux 8.3 Release Notes linked from the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing this update, the squid service will be restarted
automatically.

5. Bugs fixed (https://bugzilla.redhat.com/):

1730523 - CVE-2019-12854 squid: Denial of service in cachemgr.cgi
1730528 - CVE-2019-12529 squid: Out of bounds read in Proxy-Authorization header causes DoS
1770349 - CVE-2019-18678 squid: HTTP Request Splitting issue in HTTP message processing
1770356 - CVE-2019-12526 squid: Heap overflow issue in URN processing
1770360 - CVE-2019-18679 squid: Information Disclosure issue in HTTP Digest Authentication
1770365 - CVE-2019-18677 squid: Cross-Site Request Forgery issue in HTTP Request processing
1770371 - CVE-2019-12523 squid: Improper input validation in URI processor
1770375 - CVE-2019-18676 squid: Buffer overflow in URI processor
1798534 - CVE-2019-12528 squid: Information Disclosure issue in FTP Gateway
1798540 - CVE-2020-8449 squid: Improper input validation issues in HTTP Request processing
1798552 - CVE-2020-8450 squid: Buffer overflow in reverse-proxy configurations
1817121 - CVE-2019-18860 squid: Mishandled HTML in the host parameter to cachemgr.cgi results in insecure behaviour
1827558 - CVE-2019-12520 squid: Improper input validation in request allows for proxy manipulation
1827562 - CVE-2019-12521 squid: Off-by-one error in addStackElement allows for heap buffer overflow and crash
1827570 - CVE-2019-12524 squid: Improper access restriction in url_regex may lead to security bypass
1852550 - CVE-2020-15049 squid: Request smuggling and poisoning attack against the HTTP cache
1852554 - CVE-2020-14058 squid: DoS in TLS handshake
1871705 - CVE-2020-24606 squid: Improper input validation could result in a DoS

6. Package List:

Red Hat Enterprise Linux AppStream (v. 8):

Source:
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.src.rpm
squid-4.11-3.module+el8.3.0+7851+7808b5f9.src.rpm

aarch64:
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.aarch64.rpm
libecap-debuginfo-1.0.1-2.module+el8.1.0+4044+36416a77.aarch64.rpm
libecap-debugsource-1.0.1-2.module+el8.1.0+4044+36416a77.aarch64.rpm
libecap-devel-1.0.1-2.module+el8.1.0+4044+36416a77.aarch64.rpm
squid-4.11-3.module+el8.3.0+7851+7808b5f9.aarch64.rpm
squid-debuginfo-4.11-3.module+el8.3.0+7851+7808b5f9.aarch64.rpm
squid-debugsource-4.11-3.module+el8.3.0+7851+7808b5f9.aarch64.rpm

ppc64le:
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le.rpm
libecap-debuginfo-1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le.rpm
libecap-debugsource-1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le.rpm
libecap-devel-1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le.rpm
squid-4.11-3.module+el8.3.0+7851+7808b5f9.ppc64le.rpm
squid-debuginfo-4.11-3.module+el8.3.0+7851+7808b5f9.ppc64le.rpm
squid-debugsource-4.11-3.module+el8.3.0+7851+7808b5f9.ppc64le.rpm

s390x:
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.s390x.rpm
libecap-debuginfo-1.0.1-2.module+el8.1.0+4044+36416a77.s390x.rpm
libecap-debugsource-1.0.1-2.module+el8.1.0+4044+36416a77.s390x.rpm
libecap-devel-1.0.1-2.module+el8.1.0+4044+36416a77.s390x.rpm
squid-4.11-3.module+el8.3.0+7851+7808b5f9.s390x.rpm
squid-debuginfo-4.11-3.module+el8.3.0+7851+7808b5f9.s390x.rpm
squid-debugsource-4.11-3.module+el8.3.0+7851+7808b5f9.s390x.rpm

x86_64:
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
libecap-debuginfo-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
libecap-debugsource-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
libecap-devel-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
squid-4.11-3.module+el8.3.0+7851+7808b5f9.x86_64.rpm
squid-debuginfo-4.11-3.module+el8.3.0+7851+7808b5f9.x86_64.rpm
squid-debugsource-4.11-3.module+el8.3.0+7851+7808b5f9.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-12520
https://access.redhat.com/security/cve/CVE-2019-12521
https://access.redhat.com/security/cve/CVE-2019-12523
https://access.redhat.com/security/cve/CVE-2019-12524
https://access.redhat.com/security/cve/CVE-2019-12526
https://access.redhat.com/security/cve/CVE-2019-12528
https://access.redhat.com/security/cve/CVE-2019-12529
https://access.redhat.com/security/cve/CVE-2019-12854
https://access.redhat.com/security/cve/CVE-2019-18676
https://access.redhat.com/security/cve/CVE-2019-18677
https://access.redhat.com/security/cve/CVE-2019-18678
https://access.redhat.com/security/cve/CVE-2019-18679
https://access.redhat.com/security/cve/CVE-2019-18860
https://access.redhat.com/security/cve/CVE-2020-8449
https://access.redhat.com/security/cve/CVE-2020-8450
https://access.redhat.com/security/cve/CVE-2020-14058
https://access.redhat.com/security/cve/CVE-2020-15049
https://access.redhat.com/security/cve/CVE-2020-24606
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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lClE
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2020-4743:01 Moderate: squid:4 security, bug fix,

An update for the squid:4 module is now available for Red Hat Enterprise Linux 8

Summary

Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
The following packages have been upgraded to a later upstream version: squid (4.11). (BZ#1829467)
Security Fix(es):
* squid: Improper input validation in request allows for proxy manipulation (CVE-2019-12520)
* squid: Off-by-one error in addStackElement allows for heap buffer overflow and crash (CVE-2019-12521)
* squid: Improper input validation in URI processor (CVE-2019-12523)
* squid: Improper access restriction in url_regex may lead to security bypass (CVE-2019-12524)
* squid: Heap overflow issue in URN processing (CVE-2019-12526)
* squid: Information Disclosure issue in FTP Gateway (CVE-2019-12528)
* squid: Out of bounds read in Proxy-Authorization header causes DoS (CVE-2019-12529)
* squid: Denial of service in cachemgr.cgi (CVE-2019-12854)
* squid: Buffer overflow in URI processor (CVE-2019-18676)
* squid: Cross-Site Request Forgery issue in HTTP Request processing (CVE-2019-18677)
* squid: HTTP Request Splitting issue in HTTP message processing (CVE-2019-18678)
* squid: Information Disclosure issue in HTTP Digest Authentication (CVE-2019-18679)
* squid: Mishandled HTML in the host parameter to cachemgr.cgi results in insecure behaviour (CVE-2019-18860)
* squid: Improper input validation issues in HTTP Request processing (CVE-2020-8449)
* squid: Buffer overflow in reverse-proxy configurations (CVE-2020-8450)
* squid: DoS in TLS handshake (CVE-2020-14058)
* squid: Request smuggling and poisoning attack against the HTTP cache (CVE-2020-15049)
* squid: Improper input validation could result in a DoS (CVE-2020-24606)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing this update, the squid service will be restarted automatically.

References

https://access.redhat.com/security/cve/CVE-2019-12520 https://access.redhat.com/security/cve/CVE-2019-12521 https://access.redhat.com/security/cve/CVE-2019-12523 https://access.redhat.com/security/cve/CVE-2019-12524 https://access.redhat.com/security/cve/CVE-2019-12526 https://access.redhat.com/security/cve/CVE-2019-12528 https://access.redhat.com/security/cve/CVE-2019-12529 https://access.redhat.com/security/cve/CVE-2019-12854 https://access.redhat.com/security/cve/CVE-2019-18676 https://access.redhat.com/security/cve/CVE-2019-18677 https://access.redhat.com/security/cve/CVE-2019-18678 https://access.redhat.com/security/cve/CVE-2019-18679 https://access.redhat.com/security/cve/CVE-2019-18860 https://access.redhat.com/security/cve/CVE-2020-8449 https://access.redhat.com/security/cve/CVE-2020-8450 https://access.redhat.com/security/cve/CVE-2020-14058 https://access.redhat.com/security/cve/CVE-2020-15049 https://access.redhat.com/security/cve/CVE-2020-24606 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/

Package List

Red Hat Enterprise Linux AppStream (v. 8):
Source: libecap-1.0.1-2.module+el8.1.0+4044+36416a77.src.rpm squid-4.11-3.module+el8.3.0+7851+7808b5f9.src.rpm
aarch64: libecap-1.0.1-2.module+el8.1.0+4044+36416a77.aarch64.rpm libecap-debuginfo-1.0.1-2.module+el8.1.0+4044+36416a77.aarch64.rpm libecap-debugsource-1.0.1-2.module+el8.1.0+4044+36416a77.aarch64.rpm libecap-devel-1.0.1-2.module+el8.1.0+4044+36416a77.aarch64.rpm squid-4.11-3.module+el8.3.0+7851+7808b5f9.aarch64.rpm squid-debuginfo-4.11-3.module+el8.3.0+7851+7808b5f9.aarch64.rpm squid-debugsource-4.11-3.module+el8.3.0+7851+7808b5f9.aarch64.rpm
ppc64le: libecap-1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le.rpm libecap-debuginfo-1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le.rpm libecap-debugsource-1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le.rpm libecap-devel-1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le.rpm squid-4.11-3.module+el8.3.0+7851+7808b5f9.ppc64le.rpm squid-debuginfo-4.11-3.module+el8.3.0+7851+7808b5f9.ppc64le.rpm squid-debugsource-4.11-3.module+el8.3.0+7851+7808b5f9.ppc64le.rpm
s390x: libecap-1.0.1-2.module+el8.1.0+4044+36416a77.s390x.rpm libecap-debuginfo-1.0.1-2.module+el8.1.0+4044+36416a77.s390x.rpm libecap-debugsource-1.0.1-2.module+el8.1.0+4044+36416a77.s390x.rpm libecap-devel-1.0.1-2.module+el8.1.0+4044+36416a77.s390x.rpm squid-4.11-3.module+el8.3.0+7851+7808b5f9.s390x.rpm squid-debuginfo-4.11-3.module+el8.3.0+7851+7808b5f9.s390x.rpm squid-debugsource-4.11-3.module+el8.3.0+7851+7808b5f9.s390x.rpm
x86_64: libecap-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm libecap-debuginfo-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm libecap-debugsource-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm libecap-devel-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm squid-4.11-3.module+el8.3.0+7851+7808b5f9.x86_64.rpm squid-debuginfo-4.11-3.module+el8.3.0+7851+7808b5f9.x86_64.rpm squid-debugsource-4.11-3.module+el8.3.0+7851+7808b5f9.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2020:4743-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2020:4743
Issued Date: : 2020-11-03
CVE Names: CVE-2019-12520 CVE-2019-12521 CVE-2019-12523 CVE-2019-12524 CVE-2019-12526 CVE-2019-12528 CVE-2019-12529 CVE-2019-12854 CVE-2019-18676 CVE-2019-18677 CVE-2019-18678 CVE-2019-18679 CVE-2019-18860 CVE-2020-8449 CVE-2020-8450 CVE-2020-14058 CVE-2020-15049 CVE-2020-24606

Topic

An update for the squid:4 module is now available for Red Hat EnterpriseLinux 8.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64


Bugs Fixed

1730523 - CVE-2019-12854 squid: Denial of service in cachemgr.cgi

1730528 - CVE-2019-12529 squid: Out of bounds read in Proxy-Authorization header causes DoS

1770349 - CVE-2019-18678 squid: HTTP Request Splitting issue in HTTP message processing

1770356 - CVE-2019-12526 squid: Heap overflow issue in URN processing

1770360 - CVE-2019-18679 squid: Information Disclosure issue in HTTP Digest Authentication

1770365 - CVE-2019-18677 squid: Cross-Site Request Forgery issue in HTTP Request processing

1770371 - CVE-2019-12523 squid: Improper input validation in URI processor

1770375 - CVE-2019-18676 squid: Buffer overflow in URI processor

1798534 - CVE-2019-12528 squid: Information Disclosure issue in FTP Gateway

1798540 - CVE-2020-8449 squid: Improper input validation issues in HTTP Request processing

1798552 - CVE-2020-8450 squid: Buffer overflow in reverse-proxy configurations

1817121 - CVE-2019-18860 squid: Mishandled HTML in the host parameter to cachemgr.cgi results in insecure behaviour

1827558 - CVE-2019-12520 squid: Improper input validation in request allows for proxy manipulation

1827562 - CVE-2019-12521 squid: Off-by-one error in addStackElement allows for heap buffer overflow and crash

1827570 - CVE-2019-12524 squid: Improper access restriction in url_regex may lead to security bypass

1852550 - CVE-2020-15049 squid: Request smuggling and poisoning attack against the HTTP cache

1852554 - CVE-2020-14058 squid: DoS in TLS handshake

1871705 - CVE-2020-24606 squid: Improper input validation could result in a DoS


Related News