SUSE-SU-2019:2975-1: important: Security update for squid

sle-updates at lists.suse.com sle-updates at lists.suse.com
Thu Nov 14 13:14:11 MST 2019


   SUSE Security Update: Security update for squid
______________________________________________________________________________

Announcement ID:    SUSE-SU-2019:2975-1
Rating:             important
References:         #1133089 #1140738 #1141329 #1141330 #1141332 
                    #1141442 #1156323 #1156324 #1156326 #1156328 
                    #1156329 
Cross-References:   CVE-2019-12523 CVE-2019-12525 CVE-2019-12526
                    CVE-2019-12527 CVE-2019-12529 CVE-2019-12854
                    CVE-2019-13345 CVE-2019-18676 CVE-2019-18677
                    CVE-2019-18678 CVE-2019-18679 CVE-2019-3688
                   
Affected Products:
                    SUSE Linux Enterprise Module for Server Applications 15-SP1
                    SUSE Linux Enterprise Module for Server Applications 15
______________________________________________________________________________

   An update that fixes 12 vulnerabilities is now available.

Description:

   This update for squid to version 4.9 fixes the following issues:

   Security issues fixed:

   - CVE-2019-13345: Fixed multiple cross-site scripting vulnerabilities in
     cachemgr.cgi (bsc#1140738).
   - CVE-2019-12526: Fixed potential remote code execution during URN
     processing (bsc#1156326).
   - CVE-2019-12523,CVE-2019-18676: Fixed multiple improper validations in
     URI processing (bsc#1156329).
   - CVE-2019-18677: Fixed Cross-Site Request Forgery in HTTP Request
     processing (bsc#1156328).
   - CVE-2019-18678: Fixed incorrect message parsing which could have led to
     HTTP request splitting issue (bsc#1156323).
   - CVE-2019-18679: Fixed information disclosure when processing HTTP Digest
     Authentication (bsc#1156324).

   Other issues addressed:

    * Fixed DNS failures when peer name was configured with any upper case
      characters
    * Fixed several rock cache_dir corruption issues


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Module for Server Applications 15-SP1:

      zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP1-2019-2975=1

   - SUSE Linux Enterprise Module for Server Applications 15:

      zypper in -t patch SUSE-SLE-Module-Server-Applications-15-2019-2975=1



Package List:

   - SUSE Linux Enterprise Module for Server Applications 15-SP1 (aarch64 ppc64le s390x x86_64):

      squid-4.9-5.11.1
      squid-debuginfo-4.9-5.11.1
      squid-debugsource-4.9-5.11.1

   - SUSE Linux Enterprise Module for Server Applications 15 (aarch64 ppc64le s390x x86_64):

      squid-4.9-5.11.1
      squid-debuginfo-4.9-5.11.1
      squid-debugsource-4.9-5.11.1


References:

   https://www.suse.com/security/cve/CVE-2019-12523.html
   https://www.suse.com/security/cve/CVE-2019-12525.html
   https://www.suse.com/security/cve/CVE-2019-12526.html
   https://www.suse.com/security/cve/CVE-2019-12527.html
   https://www.suse.com/security/cve/CVE-2019-12529.html
   https://www.suse.com/security/cve/CVE-2019-12854.html
   https://www.suse.com/security/cve/CVE-2019-13345.html
   https://www.suse.com/security/cve/CVE-2019-18676.html
   https://www.suse.com/security/cve/CVE-2019-18677.html
   https://www.suse.com/security/cve/CVE-2019-18678.html
   https://www.suse.com/security/cve/CVE-2019-18679.html
   https://www.suse.com/security/cve/CVE-2019-3688.html
   https://bugzilla.suse.com/1133089
   https://bugzilla.suse.com/1140738
   https://bugzilla.suse.com/1141329
   https://bugzilla.suse.com/1141330
   https://bugzilla.suse.com/1141332
   https://bugzilla.suse.com/1141442
   https://bugzilla.suse.com/1156323
   https://bugzilla.suse.com/1156324
   https://bugzilla.suse.com/1156326
   https://bugzilla.suse.com/1156328
   https://bugzilla.suse.com/1156329



More information about the sle-updates mailing list