Mageia alert MGASA-2020-0187 (squid)
From: | Mageia Updates <buildsystem-daemon@mageia.org> | |
To: | updates-announce@ml.mageia.org | |
Subject: | [updates-announce] MGASA-2020-0187: Updated squid packages fix security vulnerability | |
Date: | Tue, 5 May 2020 14:21:48 +0200 | |
Message-ID: | <20200505122148.0D03A9F640@duvel.mageia.org> |
MGASA-2020-0187 - Updated squid packages fix security vulnerability Publication date: 05 May 2020 URL: https://advisories.mageia.org/MGASA-2020-0187.html Type: security Affected Mageia releases: 7 CVE: CVE-2020-11945 Description: Updated squid packages fix security vulnerability: Due to an integer overflow bug Squid is vulnerable to credential replay and remote code execution attacks against HTTP Digest Authentication tokens. When memory pooling is used this problem allows a remote client to replay a sniffed Digest Authentication nonce to gain access to resources that are otherwise forbidden. When memory pooling is disabled this problem allows a remote client to perform remote code execution through the free'd nonce credentials (CVE-2020-11945). References: - https://bugs.mageia.org/show_bug.cgi?id=26532 - http://www.squid-cache.org/Advisories/SQUID-2020_4.txt - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1... SRPMS: - 7/core/squid-4.11-1.mga7