ELSA-2025-19167

ELSA-2025-19167 - squid security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2025-11-18

Description


[7:3.5.20-17.0.9.13]
- Fixes CVE-2025-62168, squid: Squid vulnerable to information disclosure via
- authentication credential leakage in error handling [Orabug: 38587551]

[7:3.5.20-17.0.7.13]
- Fixes CVE-2025-54574, add URN access disabling config options [Orabug: 38350105]

[7:3.5.20-17.0.5.13]
- Fixed cve 2023-46846 for http and icap request/response smuggling [Orabug: 37326730]

[7:3.5.20-17.0.5.10]
- Fix Oracle patch application [Orabug: 37326730]

[7:3.5.20-17.0.3]
- Disable ESI support [CVE-2024-45802][Orabug: 37289058]

[7:3.5.20-17.0.1]
- Mutiple CVE fixes for squid [Orabug: 33146289]
- Resolves: CVE-2021-28651 squid: Bug 5104: Memory leak in RFC 2169 response parsing (#778)
- Resolves: CVE-2021-28652 squid: Bug 5106: Broken cache manager URL parsing (#788)
- Resolves: CVE-2021-31806,31807,31808 squid: Handle more Range requests (#790)
- Resolves: CVE-2021-33620 squid: Handle more partial responses (#791)

[7:3.5.20-17.10]
- Resolves: RHEL-16779 - squid: NULL pointer dereference in the gopher protocol
code -- Remove support for Gopher protocol (CVE-2023-46728)
- Resolves: RHEL-18176 - squid: Buffer over-read in the HTTP Message processing
feature (CVE-2023-49285)
- Resolves: RHEL-18171 - squid: Incorrect Check of Function Return Value In
Helper Process management (CVE-2023-49286)
- Resolves: RHEL-16758 - squid: Denial of Service in SSL Certificate validation
(CVE-2023-46724)
- Resolves: RHEL-19557 - squid: denial of service in HTTP request parsing
(CVE-2023-50269)
- Resolves: RHEL-26082 - squid: denial of service in HTTP header parser
(CVE-2024-25617)

[7:3.5.20-17.9]
- Resolves: RHEL-14789 - squid: Denial of Service in HTTP Digest Authentication
(CVE-2023-46847)

[7:3.5.20-17.8]
- Resolves: #2130254 - CVE-2022-41318 squid: buffer-over-read in SSPI and SMB
authentication

[7:3.5.20-17.7]
- Resolves: #2100778 - CVE-2021-46784 squid: DoS when processing gopher server
responses


Related CVEs


CVE-2025-62168

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 7 (x86_64) squid-3.5.20-17.0.9.el7_9.13.src.rpm0a565e7ab10d5bb39bf8f9a193e8cfc92801b95f6a332099a37290e6ae80efc9-ol7_x86_64_latest_ELS
squid-3.5.20-17.0.9.el7_9.13.x86_64.rpmd99b1d4cff5127a23b2fa5cab556d1ae7bc4f137766d29601ecebfcf21885417-ol7_x86_64_latest_ELS
squid-migration-script-3.5.20-17.0.9.el7_9.13.x86_64.rpmd99fbddbc3e044c25a779961132ed333f62cd93ffb979233208e9e4af4cae921-ol7_x86_64_latest_ELS
squid-sysvinit-3.5.20-17.0.9.el7_9.13.x86_64.rpmc2512c4d853b108e0cdd8af3e8c89e3917d96c05f0b76c2af43bd88b49861d69-ol7_x86_64_latest_ELS



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete