|
|
Subscribe / Log in / New account

Mageia alert MGASA-2020-0187 (squid)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2020-0187: Updated squid packages fix security vulnerability
Date:  Tue, 5 May 2020 14:21:48 +0200
Message-ID:  <20200505122148.0D03A9F640@duvel.mageia.org>

MGASA-2020-0187 - Updated squid packages fix security vulnerability Publication date: 05 May 2020 URL: https://advisories.mageia.org/MGASA-2020-0187.html Type: security Affected Mageia releases: 7 CVE: CVE-2020-11945 Description: Updated squid packages fix security vulnerability: Due to an integer overflow bug Squid is vulnerable to credential replay and remote code execution attacks against HTTP Digest Authentication tokens. When memory pooling is used this problem allows a remote client to replay a sniffed Digest Authentication nonce to gain access to resources that are otherwise forbidden. When memory pooling is disabled this problem allows a remote client to perform remote code execution through the free'd nonce credentials (CVE-2020-11945). References: - https://bugs.mageia.org/show_bug.cgi?id=26532 - http://www.squid-cache.org/Advisories/SQUID-2020_4.txt - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1... SRPMS: - 7/core/squid-4.11-1.mga7


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds