Release date:
2026-04-30 08:56:49 UTC
Description:
- CVE-2019-12525: fix heap buffer over-read in Digest auth parameter parsing
- CVE-2018-1000027: fix NULL pointer dereference in X-Forwarded-For logging for internal transactions
- CVE-2018-19131: escape certificate field injection via %D in ERR_SECURE_CONNECT_FAIL page
- CVE-2018-19132: fix memory leak when parsing denied or malformed SNMP packets
- CVE-2019-13345: escape user_name and pub_auth parameters in cachemgr.cgi to prevent reflected XSS
- CVE-2019-18860: validate hostname parameter in cachemgr.cgi to prevent reflected XSS
- CVE-2019-18677: prevent hostname truncation when append_domain expands origin-relative domains
- CVE-2019-18679: remove in-memory pointer from Digest nonce hash input (ASLR bypass)
- CVE-2019-18678: reject HTTP requests with BWS between header field-name and colon (RFC 7230 3.2.4)
- CVE-2019-12523: validate URN NID per RFC 8141 to prevent SSRF via crafted urn: requests
- CVE-2019-12528: track FTP listing token positions to avoid strstr-based over-read into adjacent heap
- CVE-2019-12529: replace uudecode with base64_decode in Basic auth to bound input-buffer reads
Updated packages:
-
squid34-3.4.14-16.el6.tuxcare.els13.x86_64.rpm
sha:65a5f34a93157143855cafcad871dfb6895fc77a80d876dca9873037d54bfc6a
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.