Vulnerability from csaf_suse
Published
2022-03-14 14:17
Modified
2022-03-14 14:17
Summary
Security update for squid

Notes

Title of the patch
Security update for squid
Description of the patch
This update for squid fixes the following issues: - CVE-2020-15810: Fixed a HTTP Request Smuggling that could have resulted in cache poisoning (bsc#1175664). - CVE-2019-12523: Disabled urn parsing and parsing of unknown schemes (bsc#1156329). - CVE-2019-18676: Disabled urn parsing and parsing of unknown schemes (bsc#1156329).
Patchnames
sleposp3-squid-14908,slessp4-squid-14908
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
   document: {
      aggregate_severity: {
         namespace: "https://www.suse.com/support/security/rating/",
         text: "important",
      },
      category: "csaf_security_advisory",
      csaf_version: "2.0",
      distribution: {
         text: "Copyright 2024 SUSE LLC. All rights reserved.",
         tlp: {
            label: "WHITE",
            url: "https://www.first.org/tlp/",
         },
      },
      lang: "en",
      notes: [
         {
            category: "summary",
            text: "Security update for squid",
            title: "Title of the patch",
         },
         {
            category: "description",
            text: "This update for squid fixes the following issues:\n\n- CVE-2020-15810: Fixed a HTTP Request Smuggling that could have resulted in cache poisoning (bsc#1175664).\n- CVE-2019-12523: Disabled urn parsing and parsing of unknown schemes (bsc#1156329).\n- CVE-2019-18676: Disabled urn parsing and parsing of unknown schemes (bsc#1156329).\n",
            title: "Description of the patch",
         },
         {
            category: "details",
            text: "sleposp3-squid-14908,slessp4-squid-14908",
            title: "Patchnames",
         },
         {
            category: "legal_disclaimer",
            text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
            title: "Terms of use",
         },
      ],
      publisher: {
         category: "vendor",
         contact_details: "https://www.suse.com/support/security/contact/",
         name: "SUSE Product Security Team",
         namespace: "https://www.suse.com/",
      },
      references: [
         {
            category: "external",
            summary: "SUSE ratings",
            url: "https://www.suse.com/support/security/rating/",
         },
         {
            category: "self",
            summary: "URL of this CSAF notice",
            url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_14908-1.json",
         },
         {
            category: "self",
            summary: "URL for SUSE-SU-2022:14908-1",
            url: "https://www.suse.com/support/update/announcement/2022/suse-su-202214908-1/",
         },
         {
            category: "self",
            summary: "E-Mail link for SUSE-SU-2022:14908-1",
            url: "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010430.html",
         },
         {
            category: "self",
            summary: "SUSE Bug 1156329",
            url: "https://bugzilla.suse.com/1156329",
         },
         {
            category: "self",
            summary: "SUSE Bug 1175664",
            url: "https://bugzilla.suse.com/1175664",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-12523 page",
            url: "https://www.suse.com/security/cve/CVE-2019-12523/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-18676 page",
            url: "https://www.suse.com/security/cve/CVE-2019-18676/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2020-15810 page",
            url: "https://www.suse.com/security/cve/CVE-2020-15810/",
         },
      ],
      title: "Security update for squid",
      tracking: {
         current_release_date: "2022-03-14T14:17:16Z",
         generator: {
            date: "2022-03-14T14:17:16Z",
            engine: {
               name: "cve-database.git:bin/generate-csaf.pl",
               version: "1",
            },
         },
         id: "SUSE-SU-2022:14908-1",
         initial_release_date: "2022-03-14T14:17:16Z",
         revision_history: [
            {
               date: "2022-03-14T14:17:16Z",
               number: "1",
               summary: "Current version",
            },
         ],
         status: "final",
         version: "1",
      },
   },
   product_tree: {
      branches: [
         {
            branches: [
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "squid-2.7.STABLE5-2.12.30.6.1.i586",
                        product: {
                           name: "squid-2.7.STABLE5-2.12.30.6.1.i586",
                           product_id: "squid-2.7.STABLE5-2.12.30.6.1.i586",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "i586",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "squid-2.7.STABLE5-2.12.30.6.1.ppc64",
                        product: {
                           name: "squid-2.7.STABLE5-2.12.30.6.1.ppc64",
                           product_id: "squid-2.7.STABLE5-2.12.30.6.1.ppc64",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "ppc64",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "squid-2.7.STABLE5-2.12.30.6.1.s390x",
                        product: {
                           name: "squid-2.7.STABLE5-2.12.30.6.1.s390x",
                           product_id: "squid-2.7.STABLE5-2.12.30.6.1.s390x",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "s390x",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "squid-2.7.STABLE5-2.12.30.6.1.x86_64",
                        product: {
                           name: "squid-2.7.STABLE5-2.12.30.6.1.x86_64",
                           product_id: "squid-2.7.STABLE5-2.12.30.6.1.x86_64",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "x86_64",
               },
               {
                  branches: [
                     {
                        category: "product_name",
                        name: "SUSE Linux Enterprise Point of Sale 11 SP3",
                        product: {
                           name: "SUSE Linux Enterprise Point of Sale 11 SP3",
                           product_id: "SUSE Linux Enterprise Point of Sale 11 SP3",
                           product_identification_helper: {
                              cpe: "cpe:/o:suse:sle-pos:11:sp3",
                           },
                        },
                     },
                     {
                        category: "product_name",
                        name: "SUSE Linux Enterprise Server 11 SP4-LTSS",
                        product: {
                           name: "SUSE Linux Enterprise Server 11 SP4-LTSS",
                           product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS",
                           product_identification_helper: {
                              cpe: "cpe:/o:suse:suse_sles:11:sp4",
                           },
                        },
                     },
                  ],
                  category: "product_family",
                  name: "SUSE Linux Enterprise",
               },
            ],
            category: "vendor",
            name: "SUSE",
         },
      ],
      relationships: [
         {
            category: "default_component_of",
            full_product_name: {
               name: "squid-2.7.STABLE5-2.12.30.6.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
               product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:squid-2.7.STABLE5-2.12.30.6.1.i586",
            },
            product_reference: "squid-2.7.STABLE5-2.12.30.6.1.i586",
            relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "squid-2.7.STABLE5-2.12.30.6.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
               product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:squid-2.7.STABLE5-2.12.30.6.1.i586",
            },
            product_reference: "squid-2.7.STABLE5-2.12.30.6.1.i586",
            relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "squid-2.7.STABLE5-2.12.30.6.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
               product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:squid-2.7.STABLE5-2.12.30.6.1.ppc64",
            },
            product_reference: "squid-2.7.STABLE5-2.12.30.6.1.ppc64",
            relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "squid-2.7.STABLE5-2.12.30.6.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
               product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:squid-2.7.STABLE5-2.12.30.6.1.s390x",
            },
            product_reference: "squid-2.7.STABLE5-2.12.30.6.1.s390x",
            relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "squid-2.7.STABLE5-2.12.30.6.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
               product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:squid-2.7.STABLE5-2.12.30.6.1.x86_64",
            },
            product_reference: "squid-2.7.STABLE5-2.12.30.6.1.x86_64",
            relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS",
         },
      ],
   },
   vulnerabilities: [
      {
         cve: "CVE-2019-12523",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-12523",
            },
         ],
         notes: [
            {
               category: "general",
               text: "An issue was discovered in Squid before 4.9. When handling a URN request, a corresponding HTTP request is made. This HTTP request doesn't go through the access checks that incoming HTTP requests go through. This causes all access checks to be bypassed and allows access to restricted HTTP servers, e.g., an attacker can connect to HTTP servers that only listen on localhost.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Point of Sale 11 SP3:squid-2.7.STABLE5-2.12.30.6.1.i586",
               "SUSE Linux Enterprise Server 11 SP4-LTSS:squid-2.7.STABLE5-2.12.30.6.1.i586",
               "SUSE Linux Enterprise Server 11 SP4-LTSS:squid-2.7.STABLE5-2.12.30.6.1.ppc64",
               "SUSE Linux Enterprise Server 11 SP4-LTSS:squid-2.7.STABLE5-2.12.30.6.1.s390x",
               "SUSE Linux Enterprise Server 11 SP4-LTSS:squid-2.7.STABLE5-2.12.30.6.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-12523",
               url: "https://www.suse.com/security/cve/CVE-2019-12523",
            },
            {
               category: "external",
               summary: "SUSE Bug 1156329 for CVE-2019-12523",
               url: "https://bugzilla.suse.com/1156329",
            },
            {
               category: "external",
               summary: "SUSE Bug 1165586 for CVE-2019-12523",
               url: "https://bugzilla.suse.com/1165586",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Point of Sale 11 SP3:squid-2.7.STABLE5-2.12.30.6.1.i586",
                  "SUSE Linux Enterprise Server 11 SP4-LTSS:squid-2.7.STABLE5-2.12.30.6.1.i586",
                  "SUSE Linux Enterprise Server 11 SP4-LTSS:squid-2.7.STABLE5-2.12.30.6.1.ppc64",
                  "SUSE Linux Enterprise Server 11 SP4-LTSS:squid-2.7.STABLE5-2.12.30.6.1.s390x",
                  "SUSE Linux Enterprise Server 11 SP4-LTSS:squid-2.7.STABLE5-2.12.30.6.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.4,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Point of Sale 11 SP3:squid-2.7.STABLE5-2.12.30.6.1.i586",
                  "SUSE Linux Enterprise Server 11 SP4-LTSS:squid-2.7.STABLE5-2.12.30.6.1.i586",
                  "SUSE Linux Enterprise Server 11 SP4-LTSS:squid-2.7.STABLE5-2.12.30.6.1.ppc64",
                  "SUSE Linux Enterprise Server 11 SP4-LTSS:squid-2.7.STABLE5-2.12.30.6.1.s390x",
                  "SUSE Linux Enterprise Server 11 SP4-LTSS:squid-2.7.STABLE5-2.12.30.6.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2022-03-14T14:17:16Z",
               details: "important",
            },
         ],
         title: "CVE-2019-12523",
      },
      {
         cve: "CVE-2019-18676",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-18676",
            },
         ],
         notes: [
            {
               category: "general",
               text: "An issue was discovered in Squid 3.x and 4.x through 4.8. Due to incorrect input validation, there is a heap-based buffer overflow that can result in Denial of Service to all clients using the proxy. Severity is high due to this vulnerability occurring before normal security checks; any remote client that can reach the proxy port can trivially perform the attack via a crafted URI scheme.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Point of Sale 11 SP3:squid-2.7.STABLE5-2.12.30.6.1.i586",
               "SUSE Linux Enterprise Server 11 SP4-LTSS:squid-2.7.STABLE5-2.12.30.6.1.i586",
               "SUSE Linux Enterprise Server 11 SP4-LTSS:squid-2.7.STABLE5-2.12.30.6.1.ppc64",
               "SUSE Linux Enterprise Server 11 SP4-LTSS:squid-2.7.STABLE5-2.12.30.6.1.s390x",
               "SUSE Linux Enterprise Server 11 SP4-LTSS:squid-2.7.STABLE5-2.12.30.6.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-18676",
               url: "https://www.suse.com/security/cve/CVE-2019-18676",
            },
            {
               category: "external",
               summary: "SUSE Bug 1156329 for CVE-2019-18676",
               url: "https://bugzilla.suse.com/1156329",
            },
            {
               category: "external",
               summary: "SUSE Bug 1165586 for CVE-2019-18676",
               url: "https://bugzilla.suse.com/1165586",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Point of Sale 11 SP3:squid-2.7.STABLE5-2.12.30.6.1.i586",
                  "SUSE Linux Enterprise Server 11 SP4-LTSS:squid-2.7.STABLE5-2.12.30.6.1.i586",
                  "SUSE Linux Enterprise Server 11 SP4-LTSS:squid-2.7.STABLE5-2.12.30.6.1.ppc64",
                  "SUSE Linux Enterprise Server 11 SP4-LTSS:squid-2.7.STABLE5-2.12.30.6.1.s390x",
                  "SUSE Linux Enterprise Server 11 SP4-LTSS:squid-2.7.STABLE5-2.12.30.6.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.9,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Point of Sale 11 SP3:squid-2.7.STABLE5-2.12.30.6.1.i586",
                  "SUSE Linux Enterprise Server 11 SP4-LTSS:squid-2.7.STABLE5-2.12.30.6.1.i586",
                  "SUSE Linux Enterprise Server 11 SP4-LTSS:squid-2.7.STABLE5-2.12.30.6.1.ppc64",
                  "SUSE Linux Enterprise Server 11 SP4-LTSS:squid-2.7.STABLE5-2.12.30.6.1.s390x",
                  "SUSE Linux Enterprise Server 11 SP4-LTSS:squid-2.7.STABLE5-2.12.30.6.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2022-03-14T14:17:16Z",
               details: "important",
            },
         ],
         title: "CVE-2019-18676",
      },
      {
         cve: "CVE-2020-15810",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2020-15810",
            },
         ],
         notes: [
            {
               category: "general",
               text: "An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Smuggling attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the proxy cache and any downstream caches with content from an arbitrary source. When configured for relaxed header parsing (the default), Squid relays headers containing whitespace characters to upstream servers. When this occurs as a prefix to a Content-Length header, the frame length specified will be ignored by Squid (allowing for a conflicting length to be used from another Content-Length header) but relayed upstream.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Point of Sale 11 SP3:squid-2.7.STABLE5-2.12.30.6.1.i586",
               "SUSE Linux Enterprise Server 11 SP4-LTSS:squid-2.7.STABLE5-2.12.30.6.1.i586",
               "SUSE Linux Enterprise Server 11 SP4-LTSS:squid-2.7.STABLE5-2.12.30.6.1.ppc64",
               "SUSE Linux Enterprise Server 11 SP4-LTSS:squid-2.7.STABLE5-2.12.30.6.1.s390x",
               "SUSE Linux Enterprise Server 11 SP4-LTSS:squid-2.7.STABLE5-2.12.30.6.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2020-15810",
               url: "https://www.suse.com/security/cve/CVE-2020-15810",
            },
            {
               category: "external",
               summary: "SUSE Bug 1175664 for CVE-2020-15810",
               url: "https://bugzilla.suse.com/1175664",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Point of Sale 11 SP3:squid-2.7.STABLE5-2.12.30.6.1.i586",
                  "SUSE Linux Enterprise Server 11 SP4-LTSS:squid-2.7.STABLE5-2.12.30.6.1.i586",
                  "SUSE Linux Enterprise Server 11 SP4-LTSS:squid-2.7.STABLE5-2.12.30.6.1.ppc64",
                  "SUSE Linux Enterprise Server 11 SP4-LTSS:squid-2.7.STABLE5-2.12.30.6.1.s390x",
                  "SUSE Linux Enterprise Server 11 SP4-LTSS:squid-2.7.STABLE5-2.12.30.6.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 9.6,
                  baseSeverity: "CRITICAL",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Point of Sale 11 SP3:squid-2.7.STABLE5-2.12.30.6.1.i586",
                  "SUSE Linux Enterprise Server 11 SP4-LTSS:squid-2.7.STABLE5-2.12.30.6.1.i586",
                  "SUSE Linux Enterprise Server 11 SP4-LTSS:squid-2.7.STABLE5-2.12.30.6.1.ppc64",
                  "SUSE Linux Enterprise Server 11 SP4-LTSS:squid-2.7.STABLE5-2.12.30.6.1.s390x",
                  "SUSE Linux Enterprise Server 11 SP4-LTSS:squid-2.7.STABLE5-2.12.30.6.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2022-03-14T14:17:16Z",
               details: "critical",
            },
         ],
         title: "CVE-2020-15810",
      },
   ],
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.