Package "squid"
Name: |
squid
|
Description: |
Full featured Web Proxy cache (HTTP proxy GnuTLS flavour)
|
Latest version: |
5.9-0ubuntu0.22.04.2 |
Release: |
jammy (22.04) |
Level: |
updates |
Repository: |
main |
Homepage: |
http://www.squid-cache.org |
Links
Download "squid"
Other versions of "squid" in Jammy
Packages in group
Deleted packages are displayed in grey.
Changelog
squid (5.7-0ubuntu0.22.04.1) jammy; urgency=medium
* New upstream version. (LP: #2013423):
- Fix FATAL FwdState::noteDestinationsEnd exception. (LP: #1975399)
- Fix regression that made the default value for the esi_parser
configuration directive behave differently from its documented behavior.
It now correctly uses libxml2 if available and falls back to libexpat
otherwise.
- Fix unexpected dispatch of client CA certificates to https_port clients
when OpenSSL SSL_MODE_NO_AUTO_CHAIN mode is on.
- Add OpenSSL 3.0 support for features that were already supported by
squid. No new OpenSSL 3.0 feature support added at this time.
- The configuration directive ssl_engine is no longer recognized. Since
this option is not implemented for the OpenSSL 3 used in Ubuntu 22.04
LTS, this is not a functional regression. Now, instead of failing with
"FATAL: Your OpenSSL has no SSL engine support", it fails with "FATAL:
bad configuration: Cannot use ssl_engine in Squid built with OpenSSL 3.0
or newer".
- For a comprehensive list of changes, please see
http://www.squid-cache.org/Versions/v5/ChangeLog.html.
* d/p/close-tunnel-if-to-server-conn-closes-after-client.patch: remove
upstreamed patch.
[ Fixed in 5.4 ]
* d/p/0004-Change-default-Makefiles-for-debian.patch: remove upstreamed
patch.
[ Fixed in 5.5 ]
* d/p/CVE-2021-46784.patch: remove upstreamed patch.
[ Fixed in 5.6 ]
* d/p/CVE-2022-41317.patch: drop patch to fix typo in manager ACL.
[ Fixed in 5.7 ]
* d/p/CVE-2022-41318.patch: drop patch to fix NTLM decoder truncated strings.
[ Fixed in 5.7 ]
* d/p/openssl3-*.patch: drop downstream OpenSSL 3 support patch.
[ Fixed in 5.7 ]
* d/p/99-ubuntu-ssl-cert-snakeoil.patch: refresh patch.
|
Source diff to previous version |
2013423 |
Upstream microrelease 5.7 |
1975399 |
FATAL FwdState::noteDestinationsEnd exception: opening() |
CVE-2021-46784 |
In Squid 3.x through 3.5.28, 4.x through 4.17, and 5.x before 5.6, due to improper buffer management, a Denial of Service can occur when processing l |
CVE-2022-41317 |
Exposure of Sensitive Information in Cache Manager |
CVE-2022-41318 |
Buffer Over Read in SSPI and SMB Authentication |
|
squid (5.2-1ubuntu4.3) jammy; urgency=medium
* d/p/close-tunnel-if-to-server-conn-closes-after-client.patch:
Close tunnel "job" after to-server client connection closes,
fixing memory leak. (LP: #1989380)
-- Sergio Durigan Junior <email address hidden> Thu, 05 Jan 2023 15:50:48 -0500
|
Source diff to previous version |
1989380 |
Memory leak when a blind CONNECT tunnel job is closed |
|
squid (5.2-1ubuntu4.2) jammy-security; urgency=medium
* SECURITY UPDATE: Exposure of Sensitive Information in Cache Manager
- debian/patches/CVE-2022-41317.patch: fix typo in ACL in
src/cf.data.pre.
- CVE-2022-41317
* SECURITY UPDATE: Buffer Over Read in SSPI and SMB Authentication
- debian/patches/CVE-2022-41318.patch: improve checks in
lib/ntlmauth/ntlmauth.cc.
- CVE-2022-41318
-- Marc Deslauriers <email address hidden> Fri, 23 Sep 2022 08:06:42 -0400
|
Source diff to previous version |
|
squid (5.2-1ubuntu4.1) jammy-security; urgency=medium
* SECURITY UPDATE: Denial of Service in Gopher Processing
- debian/patches/CVE-2021-46784.patch: improve handling of Gopher
responses in src/gopher.cc.
- CVE-2021-46784
-- Marc Deslauriers <email address hidden> Tue, 21 Jun 2022 13:38:17 -0400
|
About
-
Send Feedback to @ubuntu_updates