File _patchinfo of Package patchinfo.14943
<patchinfo incident="14943">
<issue tracker="cve" id="2019-12521"/>
<issue tracker="cve" id="2019-12519"/>
<issue tracker="cve" id="2019-12524"/>
<issue tracker="cve" id="2019-12520"/>
<issue tracker="cve" id="2020-11945"/>
<issue tracker="bnc" id="1170423">VUL-0: CVE-2019-12520, CVE-2019-12524: squid: Proxy Cache Security Update (SQUID-2019:4)</issue>
<issue tracker="bnc" id="1169659">VUL-0: CVE-2019-12519,CVE-2019-12521: squid: stack buffer overflow when handling the tag esi:when</issue>
<issue tracker="bnc" id="1170313">VUL-0: CVE-2020-11945: squid: integer overflow bug allows credential replay and remote code execution attacks against HTTP Digest Authentication tokens</issue>
<packager>adamm</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for squid</summary>
<description>This update for squid fixes the following issues:
- CVE-2019-12519, CVE-2019-12521: fixes incorrect buffer handling that can
result in cache poisoning, remote execution, and denial of service attacks
when processing ESI responses (bsc#1169659).
- CVE-2020-11945: fixes a potential remote execution vulnerability
when using HTTP Digest Authentication (bsc#1170313).
- CVE-2019-12520, CVE-2019-12524: fixes a potential ACL bypass, cache-bypass
and cross-site scripting attack when processing invalid HTTP
Request messages (bsc#1170423).
</description>
</patchinfo>