9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.931 High
EPSS
Percentile
99.0%
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
The following packages have been upgraded to a later upstream version: squid (4.11). (BZ#1829467)
Security Fix(es):
squid: Improper input validation in request allows for proxy manipulation (CVE-2019-12520)
squid: Off-by-one error in addStackElement allows for heap buffer overflow and crash (CVE-2019-12521)
squid: Improper input validation in URI processor (CVE-2019-12523)
squid: Improper access restriction in url_regex may lead to security bypass (CVE-2019-12524)
squid: Heap overflow issue in URN processing (CVE-2019-12526)
squid: Information Disclosure issue in FTP Gateway (CVE-2019-12528)
squid: Out of bounds read in Proxy-Authorization header causes DoS (CVE-2019-12529)
squid: Denial of service in cachemgr.cgi (CVE-2019-12854)
squid: Buffer overflow in URI processor (CVE-2019-18676)
squid: Cross-Site Request Forgery issue in HTTP Request processing (CVE-2019-18677)
squid: HTTP Request Splitting issue in HTTP message processing (CVE-2019-18678)
squid: Information Disclosure issue in HTTP Digest Authentication (CVE-2019-18679)
squid: Mishandled HTML in the host parameter to cachemgr.cgi results in insecure behaviour (CVE-2019-18860)
squid: Improper input validation issues in HTTP Request processing (CVE-2020-8449)
squid: Buffer overflow in reverse-proxy configurations (CVE-2020-8450)
squid: DoS in TLS handshake (CVE-2020-14058)
squid: Request smuggling and poisoning attack against the HTTP cache (CVE-2020-15049)
squid: Improper input validation could result in a DoS (CVE-2020-24606)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
almalinux | 8 | x86_64 | libecap | < 1.0.1-2.module_el8.6.0+2741+01592ae8 | libecap-1.0.1-2.module_el8.6.0+2741+01592ae8.x86_64.rpm |
almalinux | 8 | x86_64 | libecap-devel | < 1.0.1-2.module_el8.6.0+2741+01592ae8 | libecap-devel-1.0.1-2.module_el8.6.0+2741+01592ae8.x86_64.rpm |
almalinux | 8 | aarch64 | libecap-devel | < 1.0.1-2.module_el8.6.0+2741+01592ae8 | libecap-devel-1.0.1-2.module_el8.6.0+2741+01592ae8.aarch64.rpm |
almalinux | 8 | aarch64 | libecap | < 1.0.1-2.module_el8.6.0+2741+01592ae8 | libecap-1.0.1-2.module_el8.6.0+2741+01592ae8.aarch64.rpm |
almalinux | 8 | ppc64le | libecap | < 1.0.1-2.module_el8.6.0+2741+01592ae8 | libecap-1.0.1-2.module_el8.6.0+2741+01592ae8.ppc64le.rpm |
almalinux | 8 | ppc64le | libecap-devel | < 1.0.1-2.module_el8.6.0+2741+01592ae8 | libecap-devel-1.0.1-2.module_el8.6.0+2741+01592ae8.ppc64le.rpm |
errata.almalinux.org/8/ALSA-2020-4743.html
vulners.com/cve/CVE-2019-12520
vulners.com/cve/CVE-2019-12521
vulners.com/cve/CVE-2019-12523
vulners.com/cve/CVE-2019-12524
vulners.com/cve/CVE-2019-12526
vulners.com/cve/CVE-2019-12528
vulners.com/cve/CVE-2019-12529
vulners.com/cve/CVE-2019-12854
vulners.com/cve/CVE-2019-18676
vulners.com/cve/CVE-2019-18677
vulners.com/cve/CVE-2019-18678
vulners.com/cve/CVE-2019-18679
vulners.com/cve/CVE-2019-18860
vulners.com/cve/CVE-2020-14058
vulners.com/cve/CVE-2020-15049
vulners.com/cve/CVE-2020-24606
vulners.com/cve/CVE-2020-8449
vulners.com/cve/CVE-2020-8450
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.931 High
EPSS
Percentile
99.0%