Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 719046 (CVE-2019-12519, CVE-2019-12521, CVE-2020-11945) - <net-proxy/squid-4.11: Multiple vulnerabilities (CVE-2019-{12519,12521}, CVE-2020-11945)
Summary: <net-proxy/squid-4.11: Multiple vulnerabilities (CVE-2019-{12519,12521}, CVE-...
Status: RESOLVED FIXED
Alias: CVE-2019-12519, CVE-2019-12521, CVE-2020-11945
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal
Assignee: Gentoo Security
URL: http://lists.squid-cache.org/pipermai...
Whiteboard: B2 [glsa+ cve]
Keywords:
Depends on: 719662
Blocks:
  Show dependency tree
 
Reported: 2020-04-23 13:24 UTC by Sam James
Modified: 2020-05-20 12:21 UTC (History)
2 users (show)

See Also:
Package list:
net-proxy/squid-4.11 amd64 arm ppc ppc64 x86
Runtime testing required: ---
nattka: sanity-check+


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-04-23 13:24:11 UTC
1) CVE-2019-12519 / CVE-2019-12521

Description:
"These problems allow a remote server delivering certain ESI
response syntax to trigger a buffer overflow.

....

The CVE-2019-12519 issue also overwrites arbitrary attacker
controlled information onto the process stack. Allowing remote
code execution with certain crafted ESI payloads.

These problems are restricted to ESI responses received from an
upstream server. Attackers have to compromise the server or
transmission channel to utilize these vulnerabilities."

Advisory: http://lists.squid-cache.org/pipermail/squid-announce/2020-April/000115.html

2) CVE-2019-18679

See bug 699854.

Description:
"The initial patch for this vulnerability significantly hardened
against attacks. However it was still possible for an attacker
to gain information over time about a Squid instance.

This release completely removes that possibility."


3) CVE-2020-11945

Description:
"Due to an integer overflow bug Squid is vulnerable to credential
replay and remote code execution attacks against HTTP Digest
Authentication tokens."

Advisory: http://lists.squid-cache.org/pipermail/squid-announce/2020-April/000114.html

----
Announce: http://lists.squid-cache.org/pipermail/squid-announce/2020-April/000112.html
Comment 1 Tomáš Mózes 2020-04-24 04:27:51 UTC
A copy of 4.10 builds and runs fine.
Comment 2 NATTkA bot gentoo-dev 2020-04-24 10:56:25 UTC
Unable to check for sanity:

> no match for package: net-proxy/squid-4.12
Comment 3 NATTkA bot gentoo-dev 2020-04-24 11:00:28 UTC
All sanity-check issues have been resolved
Comment 4 Agostino Sarubbo gentoo-dev 2020-04-26 14:17:46 UTC
x86 stable
Comment 5 Agostino Sarubbo gentoo-dev 2020-04-26 14:19:24 UTC
arm stable
Comment 6 Agostino Sarubbo gentoo-dev 2020-04-26 15:29:46 UTC
amd64 stable
Comment 7 Agostino Sarubbo gentoo-dev 2020-04-26 15:31:57 UTC
ppc64 stable
Comment 8 GLSAMaker/CVETool Bot gentoo-dev 2020-05-12 23:41:45 UTC
This issue was resolved and addressed in
 GLSA 202005-05 at https://security.gentoo.org/glsa/202005-05
by GLSA coordinator Thomas Deutschmann (whissi).
Comment 9 Thomas Deutschmann (RETIRED) gentoo-dev 2020-05-12 23:42:16 UTC
Re-opening for remaining architectures.
Comment 10 Agostino Sarubbo gentoo-dev 2020-05-20 06:25:01 UTC
ppc stable.

Maintainer(s), please cleanup.