[Git][security-tracker-team/security-tracker][master] squid fixed
Moritz Muehlenhoff
jmm at debian.org
Sun Nov 10 21:29:46 GMT 2019
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
c161a8de by Moritz Muehlenhoff at 2019-11-10T21:29:25Z
squid fixed
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -2536,26 +2536,26 @@ CVE-2019-18680 (An issue was discovered in the Linux kernel 4.4.x before 4.4.195
NOTE: https://lkml.org/lkml/2019/9/18/337
CVE-2019-18679 [Information Disclosure issue in HTTP Digest Authentication]
RESERVED
- - squid <unfixed>
+ - squid 4.9-1
- squid3 <removed>
NOTE: Squid 4: http://www.squid-cache.org/Versions/v4/changesets/squid-4-671ba97abe929156dc4c717ee52ad22fba0f7443.patch
NOTE: http://www.squid-cache.org/Advisories/SQUID-2019_11.txt
CVE-2019-18678 [HTTP Request Splitting issue in HTTP message processing]
RESERVED
- - squid <unfixed>
+ - squid 4.9-1
- squid3 <removed>
NOTE: Squid 4: http://www.squid-cache.org/Versions/v4/changesets/squid-4-671ba97abe929156dc4c717ee52ad22fba0f7443.patch
NOTE: http://www.squid-cache.org/Advisories/SQUID-2019_10.txt
CVE-2019-18677 [Cross-Site Request Forgery issue in HTTP Request processing]
RESERVED
- - squid <unfixed>
+ - squid 4.9-1
- squid3 <removed>
NOTE: Squid 4: http://www.squid-cache.org/Versions/v4/changesets/squid-4-36492033ea4097821a4f7ff3ddcb971fbd1e8ba0.patch
NOTE: Squid 3.5: http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-e5f1813a674848dde570f7920873e1071f96e0b4.patch
NOTE: http://www.squid-cache.org/Advisories/SQUID-2019_9.txt
CVE-2019-18676 [Multiple issues in URI processing]
RESERVED
- - squid <unfixed>
+ - squid 4.9-1
- squid3 <removed>
NOTE: http://www.squid-cache.org/Advisories/SQUID-2019_8.txt
NOTE: Squid 4: http://www.squid-cache.org/Versions/v4/changesets/squid-4-fbbdf75efd7a5cc244b4886a9d42ea458c5a3a73.patch
@@ -21740,7 +21740,7 @@ CVE-2019-12527 (An issue was discovered in Squid 4.0.23 through 4.7. When checki
NOTE: without regard for the size of the target buffer.
CVE-2019-12526 [Heap Overflow issue in URN processing]
RESERVED
- - squid <unfixed>
+ - squid 4.9-1
- squid3 <removed>
NOTE: Squid 4: http://www.squid-cache.org/Versions/v4/changesets/squid-4-7aa0184a720fd216191474e079f4fe87de7c4f5a.patch
NOTE: http://www.squid-cache.org/Advisories/SQUID-2019_7.txt
@@ -21755,7 +21755,7 @@ CVE-2019-12524
RESERVED
CVE-2019-12523 [Multiple issues in URI processing]
RESERVED
- - squid <unfixed>
+ - squid 4.9-1
- squid3 <removed>
NOTE: http://www.squid-cache.org/Advisories/SQUID-2019_8.txt
NOTE: Squid 4: http://www.squid-cache.org/Versions/v4/changesets/squid-4-fbbdf75efd7a5cc244b4886a9d42ea458c5a3a73.patch
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/c161a8de1303a3dbdf606dfc90beda60d51c6cac
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/c161a8de1303a3dbdf606dfc90beda60d51c6cac
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20191110/0a25844c/attachment.html>
More information about the debian-security-tracker-commits
mailing list