File _patchinfo of Package patchinfo.14299

<patchinfo incident="14299">
  <issue tracker="cve" id="2019-12523"/>
  <issue tracker="cve" id="2019-18676"/>
  <issue tracker="cve" id="2019-18677"/>
  <issue tracker="cve" id="2019-18678"/>
  <issue tracker="cve" id="2019-12526"/>
  <issue tracker="cve" id="2019-18679"/>
  <issue tracker="cve" id="2020-8449"/>
  <issue tracker="cve" id="2020-8450"/>
  <issue tracker="cve" id="2019-12528"/>
  <issue tracker="cve" id="2020-8517"/>
  <issue tracker="bnc" id="1162687">VUL-0: CVE-2020-8449, CVE-2020-8450: squid: improper input validation in HTTP Request processing (SQUID-2020:1)</issue>
  <issue tracker="bnc" id="1156323">VUL-0: CVE-2019-18678: squid,squid3: incorrect message parsing leads to HTTP request splitting issue</issue>
  <issue tracker="bnc" id="1156328">VUL-0: CVE-2019-18677: squid,squid3: incorrect message processing can lead to inappropriately redirect traffic</issue>
  <issue tracker="bnc" id="1156329">VUL-0: CVE-2019-12523,CVE-2019-18676: squid,squid3: improper input validation can lead to access to restricted HTTP servers or denial of service</issue>
  <issue tracker="bnc" id="1156326">VUL-0: CVE-2019-12526: squid,squid3: possible remote code execution attack when processing URN</issue>
  <issue tracker="bnc" id="1162691">VUL-0: CVE-2020-8517: squid: Buffer Overflow issue in ext_lm_group_acl helper  (SQUID-2020:3)</issue>
  <issue tracker="bnc" id="1162689">VUL-0: CVE-2019-12528: squid: information Disclosure issue in FTP Gateway (SQUID-2020:2)</issue>
  <issue tracker="bnc" id="1156324">VUL-0: CVE-2019-18679: squid,squid3: information disclosure when processing HTTP Digest  Authentication</issue>
  <packager>adamm</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for squid</summary>
  <description>This update for squid fixes the following issues:

- CVE-2019-12528: Fixed an information disclosure flaw in the FTP gateway (bsc#1162689). 
- CVE-2019-12526: Fixed potential remote code execution during URN processing (bsc#1156326).
- CVE-2019-12523,CVE-2019-18676: Fixed multiple improper validations in URI processing (bsc#1156329).
- CVE-2019-18677: Fixed Cross-Site Request Forgery in HTTP Request processing (bsc#1156328).
- CVE-2019-18678: Fixed incorrect message parsing which could have led to HTTP request splitting issue (bsc#1156323).
- CVE-2019-18679: Fixed information disclosure when processing HTTP Digest Authentication (bsc#1156324).
- CVE-2020-8449: Fixed a buffer overflow when squid is acting as reverse-proxy (bsc#1162687).
- CVE-2020-8450: Fixed a buffer overflow when squid is acting as reverse-proxy (bsc#1162687).
- CVE-2020-8517: Fixed a buffer overflow in ext_lm_group_acl when processing NTLM Authentication credentials (bsc#1162691).	  
</description>
</patchinfo>
openSUSE Build Service is sponsored by