[CLSA-2026:1777539404] squid34: Fix of 12 CVEs
Type:
security
Severity:
Critical
Release date:
2026-04-30 08:56:49 UTC
Description:
- CVE-2019-12525: fix heap buffer over-read in Digest auth parameter parsing - CVE-2018-1000027: fix NULL pointer dereference in X-Forwarded-For logging for internal transactions - CVE-2018-19131: escape certificate field injection via %D in ERR_SECURE_CONNECT_FAIL page - CVE-2018-19132: fix memory leak when parsing denied or malformed SNMP packets - CVE-2019-13345: escape user_name and pub_auth parameters in cachemgr.cgi to prevent reflected XSS - CVE-2019-18860: validate hostname parameter in cachemgr.cgi to prevent reflected XSS - CVE-2019-18677: prevent hostname truncation when append_domain expands origin-relative domains - CVE-2019-18679: remove in-memory pointer from Digest nonce hash input (ASLR bypass) - CVE-2019-18678: reject HTTP requests with BWS between header field-name and colon (RFC 7230 3.2.4) - CVE-2019-12523: validate URN NID per RFC 8141 to prevent SSRF via crafted urn: requests - CVE-2019-12528: track FTP listing token positions to avoid strstr-based over-read into adjacent heap - CVE-2019-12529: replace uudecode with base64_decode in Basic auth to bound input-buffer reads
Updated packages:
  • squid34-3.4.14-16.el6.tuxcare.els13.x86_64.rpm
    sha:65a5f34a93157143855cafcad871dfb6895fc77a80d876dca9873037d54bfc6a
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.