Vulnerability from csaf_suse
Published
2020-09-03 07:03
Modified
2020-09-03 07:03
Summary
Security update for squid
Notes
Title of the patch
Security update for squid
Description of the patch
This update for squid fixes the following issues:
- CVE-2020-24606: Fix livelocking in peerDigestHandleReply (bsc#1175671).
- CVE-2020-15811: Improve Transfer-Encoding handling (bsc#1175665).
- CVE-2020-15810: Enforce token characters for field-name (bsc#1175664).
Patchnames
HPE-Helion-OpenStack-8-2020-2471,SUSE-2020-2471,SUSE-OpenStack-Cloud-7-2020-2471,SUSE-OpenStack-Cloud-8-2020-2471,SUSE-OpenStack-Cloud-9-2020-2471,SUSE-OpenStack-Cloud-Crowbar-8-2020-2471,SUSE-OpenStack-Cloud-Crowbar-9-2020-2471,SUSE-SLE-SAP-12-SP2-2020-2471,SUSE-SLE-SAP-12-SP3-2020-2471,SUSE-SLE-SAP-12-SP4-2020-2471,SUSE-SLE-SERVER-12-SP2-2020-2471,SUSE-SLE-SERVER-12-SP2-BCL-2020-2471,SUSE-SLE-SERVER-12-SP3-2020-2471,SUSE-SLE-SERVER-12-SP3-BCL-2020-2471,SUSE-SLE-SERVER-12-SP4-LTSS-2020-2471,SUSE-Storage-5-2020-2471
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "critical", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for squid", title: "Title of the patch", }, { category: "description", text: "This update for squid fixes the following issues:\n\n- CVE-2020-24606: Fix livelocking in peerDigestHandleReply (bsc#1175671).\n- CVE-2020-15811: Improve Transfer-Encoding handling (bsc#1175665).\n- CVE-2020-15810: Enforce token characters for field-name (bsc#1175664).\n", title: "Description of the patch", }, { category: "details", text: "HPE-Helion-OpenStack-8-2020-2471,SUSE-2020-2471,SUSE-OpenStack-Cloud-7-2020-2471,SUSE-OpenStack-Cloud-8-2020-2471,SUSE-OpenStack-Cloud-9-2020-2471,SUSE-OpenStack-Cloud-Crowbar-8-2020-2471,SUSE-OpenStack-Cloud-Crowbar-9-2020-2471,SUSE-SLE-SAP-12-SP2-2020-2471,SUSE-SLE-SAP-12-SP3-2020-2471,SUSE-SLE-SAP-12-SP4-2020-2471,SUSE-SLE-SERVER-12-SP2-2020-2471,SUSE-SLE-SERVER-12-SP2-BCL-2020-2471,SUSE-SLE-SERVER-12-SP3-2020-2471,SUSE-SLE-SERVER-12-SP3-BCL-2020-2471,SUSE-SLE-SERVER-12-SP4-LTSS-2020-2471,SUSE-Storage-5-2020-2471", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2471-1.json", }, { category: "self", summary: "URL for SUSE-SU-2020:2471-1", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20202471-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2020:2471-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2020-September/007341.html", }, { category: "self", summary: "SUSE Bug 1175664", url: "https://bugzilla.suse.com/1175664", }, { category: "self", summary: "SUSE Bug 1175665", url: "https://bugzilla.suse.com/1175665", }, { category: "self", summary: "SUSE Bug 1175671", url: "https://bugzilla.suse.com/1175671", }, { category: "self", summary: "SUSE CVE CVE-2020-15810 page", url: "https://www.suse.com/security/cve/CVE-2020-15810/", }, { category: "self", summary: "SUSE CVE CVE-2020-15811 page", url: "https://www.suse.com/security/cve/CVE-2020-15811/", }, { category: "self", summary: "SUSE CVE CVE-2020-24606 page", url: "https://www.suse.com/security/cve/CVE-2020-24606/", }, ], title: "Security update for squid", tracking: { current_release_date: "2020-09-03T07:03:15Z", generator: { date: "2020-09-03T07:03:15Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2020:2471-1", initial_release_date: "2020-09-03T07:03:15Z", revision_history: [ { date: "2020-09-03T07:03:15Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "squid-3.5.21-26.32.1.aarch64", product: { name: "squid-3.5.21-26.32.1.aarch64", product_id: "squid-3.5.21-26.32.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "squid-3.5.21-26.32.1.i586", product: { name: "squid-3.5.21-26.32.1.i586", product_id: "squid-3.5.21-26.32.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "squid-3.5.21-26.32.1.ppc64le", product: { name: "squid-3.5.21-26.32.1.ppc64le", product_id: "squid-3.5.21-26.32.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "squid-3.5.21-26.32.1.s390", product: { name: "squid-3.5.21-26.32.1.s390", product_id: "squid-3.5.21-26.32.1.s390", }, }, ], category: "architecture", name: "s390", }, { branches: [ { category: "product_version", name: "squid-3.5.21-26.32.1.s390x", product: { name: "squid-3.5.21-26.32.1.s390x", product_id: "squid-3.5.21-26.32.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "squid-3.5.21-26.32.1.x86_64", product: { name: "squid-3.5.21-26.32.1.x86_64", product_id: "squid-3.5.21-26.32.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "HPE Helion OpenStack 8", product: { name: "HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8", product_identification_helper: { cpe: "cpe:/o:suse:hpe-helion-openstack:8", }, }, }, { category: "product_name", name: "SUSE OpenStack Cloud 7", product: { name: "SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud:7", }, }, }, { category: "product_name", name: "SUSE OpenStack Cloud 8", product: { name: "SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud:8", }, }, }, { category: "product_name", name: "SUSE OpenStack Cloud 9", product: { name: "SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud:9", }, }, }, { category: "product_name", name: "SUSE OpenStack Cloud Crowbar 8", product: { name: "SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud-crowbar:8", }, }, }, { category: "product_name", name: "SUSE OpenStack Cloud Crowbar 9", product: { name: "SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud-crowbar:9", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP2-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP2-BCL", product: { name: "SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles-bcl:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP3-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP3-BCL", product: { name: "SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles-bcl:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP4-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp4", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 5", product: { name: "SUSE Enterprise Storage 5", product_id: "SUSE Enterprise Storage 5", product_identification_helper: { cpe: "cpe:/o:suse:ses:5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "squid-3.5.21-26.32.1.x86_64 as component of HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8:squid-3.5.21-26.32.1.x86_64", }, product_reference: "squid-3.5.21-26.32.1.x86_64", relates_to_product_reference: "HPE Helion OpenStack 8", }, { category: "default_component_of", full_product_name: { name: "squid-3.5.21-26.32.1.s390x as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:squid-3.5.21-26.32.1.s390x", }, product_reference: "squid-3.5.21-26.32.1.s390x", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "squid-3.5.21-26.32.1.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:squid-3.5.21-26.32.1.x86_64", }, product_reference: "squid-3.5.21-26.32.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "squid-3.5.21-26.32.1.x86_64 as component of SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8:squid-3.5.21-26.32.1.x86_64", }, product_reference: "squid-3.5.21-26.32.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 8", }, { category: "default_component_of", full_product_name: { name: "squid-3.5.21-26.32.1.x86_64 as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:squid-3.5.21-26.32.1.x86_64", }, product_reference: "squid-3.5.21-26.32.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "squid-3.5.21-26.32.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8:squid-3.5.21-26.32.1.x86_64", }, product_reference: "squid-3.5.21-26.32.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 8", }, { category: "default_component_of", full_product_name: { name: "squid-3.5.21-26.32.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:squid-3.5.21-26.32.1.x86_64", }, product_reference: "squid-3.5.21-26.32.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "squid-3.5.21-26.32.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:squid-3.5.21-26.32.1.ppc64le", }, product_reference: "squid-3.5.21-26.32.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "squid-3.5.21-26.32.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:squid-3.5.21-26.32.1.x86_64", }, product_reference: "squid-3.5.21-26.32.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "squid-3.5.21-26.32.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:squid-3.5.21-26.32.1.ppc64le", }, product_reference: "squid-3.5.21-26.32.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "squid-3.5.21-26.32.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:squid-3.5.21-26.32.1.x86_64", }, product_reference: "squid-3.5.21-26.32.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "squid-3.5.21-26.32.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:squid-3.5.21-26.32.1.ppc64le", }, product_reference: "squid-3.5.21-26.32.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "squid-3.5.21-26.32.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:squid-3.5.21-26.32.1.x86_64", }, product_reference: "squid-3.5.21-26.32.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "squid-3.5.21-26.32.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:squid-3.5.21-26.32.1.ppc64le", }, product_reference: "squid-3.5.21-26.32.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "squid-3.5.21-26.32.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:squid-3.5.21-26.32.1.s390x", }, product_reference: "squid-3.5.21-26.32.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "squid-3.5.21-26.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:squid-3.5.21-26.32.1.x86_64", }, product_reference: "squid-3.5.21-26.32.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "squid-3.5.21-26.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:squid-3.5.21-26.32.1.x86_64", }, product_reference: "squid-3.5.21-26.32.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "squid-3.5.21-26.32.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:squid-3.5.21-26.32.1.aarch64", }, product_reference: "squid-3.5.21-26.32.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "squid-3.5.21-26.32.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:squid-3.5.21-26.32.1.ppc64le", }, product_reference: "squid-3.5.21-26.32.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "squid-3.5.21-26.32.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:squid-3.5.21-26.32.1.s390x", }, product_reference: "squid-3.5.21-26.32.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "squid-3.5.21-26.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:squid-3.5.21-26.32.1.x86_64", }, product_reference: "squid-3.5.21-26.32.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "squid-3.5.21-26.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:squid-3.5.21-26.32.1.x86_64", }, product_reference: "squid-3.5.21-26.32.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "squid-3.5.21-26.32.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:squid-3.5.21-26.32.1.aarch64", }, product_reference: "squid-3.5.21-26.32.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "squid-3.5.21-26.32.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:squid-3.5.21-26.32.1.ppc64le", }, product_reference: "squid-3.5.21-26.32.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "squid-3.5.21-26.32.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:squid-3.5.21-26.32.1.s390x", }, product_reference: "squid-3.5.21-26.32.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "squid-3.5.21-26.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:squid-3.5.21-26.32.1.x86_64", }, product_reference: "squid-3.5.21-26.32.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "squid-3.5.21-26.32.1.aarch64 as component of SUSE Enterprise Storage 5", product_id: "SUSE Enterprise Storage 5:squid-3.5.21-26.32.1.aarch64", }, product_reference: "squid-3.5.21-26.32.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 5", }, { category: "default_component_of", full_product_name: { name: "squid-3.5.21-26.32.1.x86_64 as component of SUSE Enterprise Storage 5", product_id: "SUSE Enterprise Storage 5:squid-3.5.21-26.32.1.x86_64", }, product_reference: "squid-3.5.21-26.32.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 5", }, ], }, vulnerabilities: [ { cve: "CVE-2020-15810", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-15810", }, ], notes: [ { category: "general", text: "An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Smuggling attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the proxy cache and any downstream caches with content from an arbitrary source. When configured for relaxed header parsing (the default), Squid relays headers containing whitespace characters to upstream servers. When this occurs as a prefix to a Content-Length header, the frame length specified will be ignored by Squid (allowing for a conflicting length to be used from another Content-Length header) but relayed upstream.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:squid-3.5.21-26.32.1.x86_64", "SUSE Enterprise Storage 5:squid-3.5.21-26.32.1.aarch64", "SUSE Enterprise Storage 5:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:squid-3.5.21-26.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:squid-3.5.21-26.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:squid-3.5.21-26.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:squid-3.5.21-26.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:squid-3.5.21-26.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:squid-3.5.21-26.32.1.x86_64", "SUSE OpenStack Cloud 7:squid-3.5.21-26.32.1.s390x", "SUSE OpenStack Cloud 7:squid-3.5.21-26.32.1.x86_64", "SUSE OpenStack Cloud 8:squid-3.5.21-26.32.1.x86_64", "SUSE OpenStack Cloud 9:squid-3.5.21-26.32.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:squid-3.5.21-26.32.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:squid-3.5.21-26.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-15810", url: "https://www.suse.com/security/cve/CVE-2020-15810", }, { category: "external", summary: "SUSE Bug 1175664 for CVE-2020-15810", url: "https://bugzilla.suse.com/1175664", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:squid-3.5.21-26.32.1.x86_64", "SUSE Enterprise Storage 5:squid-3.5.21-26.32.1.aarch64", "SUSE Enterprise Storage 5:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:squid-3.5.21-26.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:squid-3.5.21-26.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:squid-3.5.21-26.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:squid-3.5.21-26.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:squid-3.5.21-26.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:squid-3.5.21-26.32.1.x86_64", "SUSE OpenStack Cloud 7:squid-3.5.21-26.32.1.s390x", "SUSE OpenStack Cloud 7:squid-3.5.21-26.32.1.x86_64", "SUSE OpenStack Cloud 8:squid-3.5.21-26.32.1.x86_64", "SUSE OpenStack Cloud 9:squid-3.5.21-26.32.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:squid-3.5.21-26.32.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:squid-3.5.21-26.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.6, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N", version: "3.1", }, products: [ "HPE Helion OpenStack 8:squid-3.5.21-26.32.1.x86_64", "SUSE Enterprise Storage 5:squid-3.5.21-26.32.1.aarch64", "SUSE Enterprise Storage 5:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:squid-3.5.21-26.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:squid-3.5.21-26.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:squid-3.5.21-26.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:squid-3.5.21-26.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:squid-3.5.21-26.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:squid-3.5.21-26.32.1.x86_64", "SUSE OpenStack Cloud 7:squid-3.5.21-26.32.1.s390x", "SUSE OpenStack Cloud 7:squid-3.5.21-26.32.1.x86_64", "SUSE OpenStack Cloud 8:squid-3.5.21-26.32.1.x86_64", "SUSE OpenStack Cloud 9:squid-3.5.21-26.32.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:squid-3.5.21-26.32.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:squid-3.5.21-26.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-09-03T07:03:15Z", details: "critical", }, ], title: "CVE-2020-15810", }, { cve: "CVE-2020-15811", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-15811", }, ], notes: [ { category: "general", text: "An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Splitting attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the browser cache and any downstream caches with content from an arbitrary source. Squid uses a string search instead of parsing the Transfer-Encoding header to find chunked encoding. This allows an attacker to hide a second request inside Transfer-Encoding: it is interpreted by Squid as chunked and split out into a second request delivered upstream. Squid will then deliver two distinct responses to the client, corrupting any downstream caches.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:squid-3.5.21-26.32.1.x86_64", "SUSE Enterprise Storage 5:squid-3.5.21-26.32.1.aarch64", "SUSE Enterprise Storage 5:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:squid-3.5.21-26.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:squid-3.5.21-26.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:squid-3.5.21-26.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:squid-3.5.21-26.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:squid-3.5.21-26.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:squid-3.5.21-26.32.1.x86_64", "SUSE OpenStack Cloud 7:squid-3.5.21-26.32.1.s390x", "SUSE OpenStack Cloud 7:squid-3.5.21-26.32.1.x86_64", "SUSE OpenStack Cloud 8:squid-3.5.21-26.32.1.x86_64", "SUSE OpenStack Cloud 9:squid-3.5.21-26.32.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:squid-3.5.21-26.32.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:squid-3.5.21-26.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-15811", url: "https://www.suse.com/security/cve/CVE-2020-15811", }, { category: "external", summary: "SUSE Bug 1175665 for CVE-2020-15811", url: "https://bugzilla.suse.com/1175665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:squid-3.5.21-26.32.1.x86_64", "SUSE Enterprise Storage 5:squid-3.5.21-26.32.1.aarch64", "SUSE Enterprise Storage 5:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:squid-3.5.21-26.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:squid-3.5.21-26.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:squid-3.5.21-26.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:squid-3.5.21-26.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:squid-3.5.21-26.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:squid-3.5.21-26.32.1.x86_64", "SUSE OpenStack Cloud 7:squid-3.5.21-26.32.1.s390x", "SUSE OpenStack Cloud 7:squid-3.5.21-26.32.1.x86_64", "SUSE OpenStack Cloud 8:squid-3.5.21-26.32.1.x86_64", "SUSE OpenStack Cloud 9:squid-3.5.21-26.32.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:squid-3.5.21-26.32.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:squid-3.5.21-26.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.6, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N", version: "3.1", }, products: [ "HPE Helion OpenStack 8:squid-3.5.21-26.32.1.x86_64", "SUSE Enterprise Storage 5:squid-3.5.21-26.32.1.aarch64", "SUSE Enterprise Storage 5:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:squid-3.5.21-26.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:squid-3.5.21-26.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:squid-3.5.21-26.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:squid-3.5.21-26.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:squid-3.5.21-26.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:squid-3.5.21-26.32.1.x86_64", "SUSE OpenStack Cloud 7:squid-3.5.21-26.32.1.s390x", "SUSE OpenStack Cloud 7:squid-3.5.21-26.32.1.x86_64", "SUSE OpenStack Cloud 8:squid-3.5.21-26.32.1.x86_64", "SUSE OpenStack Cloud 9:squid-3.5.21-26.32.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:squid-3.5.21-26.32.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:squid-3.5.21-26.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-09-03T07:03:15Z", details: "critical", }, ], title: "CVE-2020-15811", }, { cve: "CVE-2020-24606", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-24606", }, ], notes: [ { category: "general", text: "Squid before 4.13 and 5.x before 5.0.4 allows a trusted peer to perform Denial of Service by consuming all available CPU cycles during handling of a crafted Cache Digest response message. This only occurs when cache_peer is used with the cache digests feature. The problem exists because peerDigestHandleReply() livelocking in peer_digest.cc mishandles EOF.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:squid-3.5.21-26.32.1.x86_64", "SUSE Enterprise Storage 5:squid-3.5.21-26.32.1.aarch64", "SUSE Enterprise Storage 5:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:squid-3.5.21-26.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:squid-3.5.21-26.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:squid-3.5.21-26.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:squid-3.5.21-26.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:squid-3.5.21-26.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:squid-3.5.21-26.32.1.x86_64", "SUSE OpenStack Cloud 7:squid-3.5.21-26.32.1.s390x", "SUSE OpenStack Cloud 7:squid-3.5.21-26.32.1.x86_64", "SUSE OpenStack Cloud 8:squid-3.5.21-26.32.1.x86_64", "SUSE OpenStack Cloud 9:squid-3.5.21-26.32.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:squid-3.5.21-26.32.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:squid-3.5.21-26.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-24606", url: "https://www.suse.com/security/cve/CVE-2020-24606", }, { category: "external", summary: "SUSE Bug 1175671 for CVE-2020-24606", url: "https://bugzilla.suse.com/1175671", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:squid-3.5.21-26.32.1.x86_64", "SUSE Enterprise Storage 5:squid-3.5.21-26.32.1.aarch64", "SUSE Enterprise Storage 5:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:squid-3.5.21-26.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:squid-3.5.21-26.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:squid-3.5.21-26.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:squid-3.5.21-26.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:squid-3.5.21-26.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:squid-3.5.21-26.32.1.x86_64", "SUSE OpenStack Cloud 7:squid-3.5.21-26.32.1.s390x", "SUSE OpenStack Cloud 7:squid-3.5.21-26.32.1.x86_64", "SUSE OpenStack Cloud 8:squid-3.5.21-26.32.1.x86_64", "SUSE OpenStack Cloud 9:squid-3.5.21-26.32.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:squid-3.5.21-26.32.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:squid-3.5.21-26.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "HPE Helion OpenStack 8:squid-3.5.21-26.32.1.x86_64", "SUSE Enterprise Storage 5:squid-3.5.21-26.32.1.aarch64", "SUSE Enterprise Storage 5:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:squid-3.5.21-26.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:squid-3.5.21-26.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:squid-3.5.21-26.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:squid-3.5.21-26.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:squid-3.5.21-26.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:squid-3.5.21-26.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:squid-3.5.21-26.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:squid-3.5.21-26.32.1.x86_64", "SUSE OpenStack Cloud 7:squid-3.5.21-26.32.1.s390x", "SUSE OpenStack Cloud 7:squid-3.5.21-26.32.1.x86_64", "SUSE OpenStack Cloud 8:squid-3.5.21-26.32.1.x86_64", "SUSE OpenStack Cloud 9:squid-3.5.21-26.32.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:squid-3.5.21-26.32.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:squid-3.5.21-26.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-09-03T07:03:15Z", details: "important", }, ], title: "CVE-2020-24606", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.