Security update for squid

SUSE Security Update: Security update for squid
Announcement ID: SUSE-SU-2020:0487-1
Rating: moderate
References: #1162687 #1162689 #1162691
Cross-References:CVE-2019-12528 CVE-2020-8449 CVE-2020-8450 CVE-2020-8517
Affected Products:
  • SUSE Linux Enterprise Server 12-SP5

An update that fixes four vulnerabilities is now available.


This update for squid to version 4.10 fixes the following issues:
Security issues fixed:

  • CVE-2019-12528: Fixed an information disclosure flaw in the FTP gateway (bsc#1162689).
  • CVE-2020-8449: Fixed a buffer overflow when squid is acting as reverse-proxy (bsc#1162687).
  • CVE-2020-8450: Fixed a buffer overflow when squid is acting as reverse-proxy (bsc#1162687).
  • CVE-2020-8517: Fixed a buffer overflow in ext_lm_group_acl when processing NTLM Authentication credentials (bsc#1162691).

Non-security issue fixed:
  • Improved cache handling with chunked responses.

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Linux Enterprise Server 12-SP5:
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2020-487=1

Package List:

  • SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64):
    • squid-4.10-4.6.1
    • squid-debuginfo-4.10-4.6.1
    • squid-debugsource-4.10-4.6.1