{"id":"MGASA-2019-0382","summary":"Updated squid packages fix security vulnerabilities","details":"Potential remote code execution during URN processing (CVE-2019-12526).\n\nMultiple improper validations in URI processing (CVE-2019-12523,\nCVE-2019-18676).\n\nCross-Site Request Forgery in HTTP Request processing (CVE-2019-18677).\n\nIncorrect message parsing which could have led to HTTP request splitting\nissue (CVE-2019-18678).\n\nInformation disclosure when processing HTTP Digest Authentication\n(CVE-2019-18679).\n","modified":"2026-01-31T13:32:17.210448Z","published":"2019-12-13T18:25:24Z","related":["CVE-2019-12523","CVE-2019-12526","CVE-2019-18676","CVE-2019-18677","CVE-2019-18678","CVE-2019-18679"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2019-0382.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=25812"},{"type":"REPORT","url":"http://www.squid-cache.org/Advisories/SQUID-2019_7.txt"},{"type":"REPORT","url":"http://www.squid-cache.org/Advisories/SQUID-2019_8.txt"},{"type":"REPORT","url":"http://www.squid-cache.org/Advisories/SQUID-2019_9.txt"},{"type":"REPORT","url":"http://www.squid-cache.org/Advisories/SQUID-2019_10.txt"},{"type":"REPORT","url":"http://www.squid-cache.org/Advisories/SQUID-2019_11.txt"},{"type":"REPORT","url":"https://lists.opensuse.org/opensuse-updates/2019-11/msg00119.html"}],"affected":[{"package":{"name":"squid","ecosystem":"Mageia:7","purl":"pkg:rpm/mageia/squid?arch=source&distro=mageia-7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.9-1.mga7"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2019-0382.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}