Package "squidclient"
  
    
    
        | Name: | 
        squidclient
            
         | 
    
    
         Description: | 
        
             Full featured Web Proxy cache (HTTP proxy) - HTTP(S) message utility 
         | 
    
    
        | Latest version: | 
        5.9-0ubuntu0.22.04.4 | 
    
    
        | Release: | 
        jammy (22.04) | 
    
    
        | Level: | 
        security | 
    
    
        | Repository: | 
        universe | 
    
         
            | Head package: | 
            squid | 
         
        
            | Homepage: | 
            http://www.squid-cache.org | 
        
    
   
  
  
 
Links
    Download "squidclient"
    
Other versions of "squidclient" in Jammy
    
Changelog
    
    
    
        
        
    
    
        | 
               squid (5.9-0ubuntu0.22.04.4) jammy-security; urgency=medium 
  * SECURITY UPDATE: HTTP Authentication credential leak
     - debian/patches/CVE-2025-62168.patch: Add maskSensitiveInfo parameter to
       pack and pass it to packInto in src/HttpRequest.cc. Add maskSensitiveInfo
       to pack in src/HttpRequest.h. Adapt code with new parameter in
       src/client_side_reply.cc, and src/errorpage.cc. Remove request_hdr NULL
       assign in src/errorpage.h.
     - CVE-2025-62168 
 -- Hlib Korzhynskyy <email address hidden>  Mon, 27 Oct 2025 12:58:52 -0230 
         | 
    
    | Source diff to previous version | 
        
        
            
            
                
                | CVE-2025-62168 | 
                Squid is a caching proxy for the Web. In Squid versions prior to 7.2, a failure to redact HTTP authentication credentials in error handling allows in | 
                 
             
         | 
        
    
    
    
    
    
        
        
    
    
        | 
               squid (5.9-0ubuntu0.22.04.3) jammy-security; urgency=medium 
  * SECURITY UPDATE: ASN.1 encoding mishandling
     - debian/patches/CVE-2025-59362.patch: fix ASN.1 encoding of long SNMP
       OIDs in lib/snmplib/asn1.c.
     - CVE-2025-59362 
 -- Marc Deslauriers <email address hidden>  Fri, 03 Oct 2025 09:35:24 -0400 
         | 
    
    | Source diff to previous version | 
        
        
            
            
                
                | CVE-2025-59362 | 
                Squid through 7.1 mishandles ASN.1 encoding of long SNMP OIDs. This occurs in asn_build_objid in lib/snmplib/asn1.c. | 
                 
             
         | 
        
    
    
    
    
    
        
        
    
    
        | 
               squid (5.9-0ubuntu0.22.04.2) jammy-security; urgency=medium 
  * SECURITY UPDATE: DoS in ESI processing using multi-byte characters
     - debian/patches/CVE-2024-37894.patch: fix variable datatype to handle
       variables names outside standard ASCII characters
     - CVE-2024-37894 
 -- Vyom Yadav <email address hidden>  Tue, 09 Jul 2024 15:49:37 +0530 
         | 
    
    | Source diff to previous version | 
        
        
            
            
                
                | CVE-2024-37894 | 
                Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to an Out-of-bounds Write error when assigning ESI variables, Squid i | 
                 
             
         | 
        
    
    
    
    
    
        
        
    
    
        | 
               squid (5.7-0ubuntu0.22.04.4) jammy-security; urgency=medium 
  * SECURITY UPDATE: DoS via Cache Manager error responses
     - debian/patches/CVE-2024-23638.patch: just close after a write(2)
       response sending error in src/servers/Server.cc.
     - CVE-2024-23638
   * SECURITY UPDATE: DoS in HTTP header parsing
     - debian/patches/CVE-2024-25617.patch: improve handling of expanding
       HTTP header values in src/SquidString.h, src/cache_cf.cc,
       src/cf.data.pre, src/http.cc.
     - CVE-2024-25617
   * SECURITY UPDATE: DoS via chunked decoder uncontrolled recursion bug
     - debian/patches/CVE-2024-25111.patch: fix infinite recursion in
       src/SquidMath.h, src/http.cc, src/http.h.
     - CVE-2024-25111
   * SECURITY UPDATE: DoS via Improper Handling of Structural Elements bug
     - debian/patches/CVE-2023-5824-pre1.patch: break long store_client call
       chains with async calls.
     - debian/patches/CVE-2023-5824-pre2.patch: add Assure() as a
       replacement for problematic Must().
     - debian/patches/CVE-2023-5824-pre3.patch: fix compiler errors.
     - debian/patches/CVE-2023-5824-1.patch: remove serialized HTTP headers
       from storeClientCopy().
     - debian/patches/CVE-2023-5824-2.patch: fix frequent assertion.
     - debian/patches/CVE-2023-5824-3.patch: remove mem_hdr::freeDataUpto()
       assertion.
     - debian/patches/CVE-2023-5824-4.patch: fix Bug 5318.
     - CVE-2023-5824 
 -- Marc Deslauriers <email address hidden>  Thu, 14 Mar 2024 10:47:38 -0400 
         | 
    
    | Source diff to previous version | 
        
        
            
            
                
                | CVE-2024-23638 | 
                Squid is a caching proxy for the Web. Due to an expired pointer reference bug, Squid prior to version 6.6 is vulnerable to a Denial of Service attack | 
                 
                
                | CVE-2024-25617 | 
                Squid is an open source caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a Collapse of Data into Unsafe Value bug ,Squid may b | 
                 
                
                | CVE-2024-25111 | 
                Squid is a web proxy cache. Starting in version 3.5.27 and prior to version 6.8, Squid may be vulnerable to a Denial of Service attack against HTTP C | 
                 
                
                | CVE-2023-5824 | 
                Squid is vulnerable to Denial of Service attack against HTTP and HTTPS clients due to an Improper Handling of Structural Elements bug. | 
                 
             
         | 
        
    
    
    
    
    
        
        
    
    
        | 
               squid (5.7-0ubuntu0.22.04.3) jammy-security; urgency=medium 
  * SECURITY UPDATE: denial of service in HTTP message processing
     - debian/patches/CVE-2023-49285.patch: additional parsing checks added to
       fix buffer overread in lib/rfc1123.c.
     - CVE-2023-49285
   * SECURITY UPDATE: denial of service in helper process management
     - debian/patches/CVE-2023-49286.patch: improved error handling included
       for helper process initialisation in src/ipc.cc.
     - CVE-2023-49286
   * SECURITY UPDATE: denial of service in HTTP request parsing
     - debian/patches/CVE-2023-50269.patch: limit x-forwarded-for hops and log
       limit as error when exceeded in src/ClientRequestContext.h,
       src/client_side_request.cc.
     - CVE-2023-50269 
 -- Evan Caville <email address hidden>  Wed, 17 Jan 2024 14:01:57 +1000 
         | 
    
    
        
        
            
            
                
                | CVE-2023-49285 | 
                Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a Buffer Overread bug Squid is vulnerable to a Denial of Service a | 
                 
                
                | CVE-2023-49286 | 
                Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to an Incorrect Check of Function Return Value bug Squid is vulnerabl | 
                 
                
                | CVE-2023-50269 | 
                Squid is a caching proxy for the Web. Due to an Uncontrolled Recursion bug in versions 2.6 through 2.7.STABLE9, versions 3.1 through 5.9, and version | 
                 
             
         | 
        
    
    
        
        
        
            About
              -  
            Send Feedback to @ubuntu_updates