Описание
ELSA-2025-19167: squid security update (IMPORTANT)
[7:3.5.20-17.0.9.13]
- Fixes CVE-2025-62168, squid: Squid vulnerable to information disclosure via
- authentication credential leakage in error handling [Orabug: 38587551]
[7:3.5.20-17.0.7.13]
- Fixes CVE-2025-54574, add URN access disabling config options [Orabug: 38350105]
[7:3.5.20-17.0.5.13]
- Fixed cve 2023-46846 for http and icap request/response smuggling [Orabug: 37326730]
[7:3.5.20-17.0.5.10]
- Fix Oracle patch application [Orabug: 37326730]
[7:3.5.20-17.0.3]
- Disable ESI support [CVE-2024-45802][Orabug: 37289058]
[7:3.5.20-17.0.1]
- Mutiple CVE fixes for squid [Orabug: 33146289]
- Resolves: CVE-2021-28651 squid: Bug 5104: Memory leak in RFC 2169 response parsing (#778)
- Resolves: CVE-2021-28652 squid: Bug 5106: Broken cache manager URL parsing (#788)
- Resolves: CVE-2021-31806,31807,31808 squid: Handle more Range requests (#790)
- Resolves: CVE-2021-33620 squid: Handle more partial responses (#791)
[7:3.5.20-17.10]
- Resolves: RHEL-16779 - squid: NULL pointer dereference in the gopher protocol code -- Remove support for Gopher protocol (CVE-2023-46728)
- Resolves: RHEL-18176 - squid: Buffer over-read in the HTTP Message processing feature (CVE-2023-49285)
- Resolves: RHEL-18171 - squid: Incorrect Check of Function Return Value In Helper Process management (CVE-2023-49286)
- Resolves: RHEL-16758 - squid: Denial of Service in SSL Certificate validation (CVE-2023-46724)
- Resolves: RHEL-19557 - squid: denial of service in HTTP request parsing (CVE-2023-50269)
- Resolves: RHEL-26082 - squid: denial of service in HTTP header parser (CVE-2024-25617)
[7:3.5.20-17.9]
- Resolves: RHEL-14789 - squid: Denial of Service in HTTP Digest Authentication (CVE-2023-46847)
[7:3.5.20-17.8]
- Resolves: #2130254 - CVE-2022-41318 squid: buffer-over-read in SSPI and SMB authentication
[7:3.5.20-17.7]
- Resolves: #2100778 - CVE-2021-46784 squid: DoS when processing gopher server responses
Обновленные пакеты
Oracle Linux 7
Oracle Linux x86_64
squid
3.5.20-17.0.9.el7_9.13
squid-migration-script
3.5.20-17.0.9.el7_9.13
squid-sysvinit
3.5.20-17.0.9.el7_9.13
Связанные CVE
Связанные уязвимости
Squid is a caching proxy for the Web. In Squid versions prior to 7.2, a failure to redact HTTP authentication credentials in error handling allows information disclosure. The vulnerability allows a script to bypass browser security protections and learn the credentials a trusted client uses to authenticate. This potentially allows a remote client to identify security tokens or credentials used internally by a web application using Squid for backend load balancing. These attacks do not require Squid to be configured with HTTP authentication. The vulnerability is fixed in version 7.2. As a workaround, disable debug information in administrator mailto links generated by Squid by configuring squid.conf with email_err_data off.
Squid is a caching proxy for the Web. In Squid versions prior to 7.2, a failure to redact HTTP authentication credentials in error handling allows information disclosure. The vulnerability allows a script to bypass browser security protections and learn the credentials a trusted client uses to authenticate. This potentially allows a remote client to identify security tokens or credentials used internally by a web application using Squid for backend load balancing. These attacks do not require Squid to be configured with HTTP authentication. The vulnerability is fixed in version 7.2. As a workaround, disable debug information in administrator mailto links generated by Squid by configuring squid.conf with email_err_data off.
Squid vulnerable to information disclosure via authentication credential leakage in error handling
Squid is a caching proxy for the Web. In Squid versions prior to 7.2, ...