First published: Wed Apr 15 2020(Updated: )
An issue was discovered in Squid through 4.7. When handling the tag esi:when when ESI is enabled, Squid calls ESIExpression::Evaluate. This function uses a fixed stack buffer to hold the expression while it's being evaluated. When processing the expression, it could either evaluate the top of the stack, or add a new member to the stack. When adding a new member, there is no check to ensure that the stack won't overflow.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Squid-Cache Squid | >=3.0<=3.5.28 | |
Squid-Cache Squid | >=4.0<=4.10 | |
Squid-Cache Squid | >=5.0<=5.0.1 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.10 | |
Canonical Ubuntu Linux | =20.04 | |
openSUSE Leap | =15.1 | |
debian/squid | 4.13-10+deb11u3 5.7-2+deb12u2 6.10-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12519 is a vulnerability discovered in Squid through version 4.7.
CVE-2019-12519 has a severity rating of 9.8 out of 10.
CVE-2019-12519 affects Squid when handling the esi:when tag and ESI is enabled.
To fix CVE-2019-12519, upgrade Squid to version 4.8-1ubuntu2.3 (for Ubuntu) or 4.13-10+deb11u2 (for Debian) depending on your operating system.
More information about CVE-2019-12519 can be found at the following links: [Link1](https://gitlab.com/jeriko.one/security/-/blob/master/squid/CVEs/CVE-2019-12519.txt), [Link2](http://www.openwall.com/lists/oss-security/2020/04/23/1), [Link3](https://www.debian.org/security/2020/dsa-4682).