Package "squidclient"
Name: |
squidclient
|
Description: |
Full featured Web Proxy cache (HTTP proxy) - HTTP(S) message utility
|
Latest version: |
5.9-0ubuntu0.22.04.3 |
Release: |
jammy (22.04) |
Level: |
updates |
Repository: |
universe |
Head package: |
squid |
Homepage: |
http://www.squid-cache.org |
Links
Download "squidclient"
Other versions of "squidclient" in Jammy
Changelog
squid (5.9-0ubuntu0.22.04.3) jammy-security; urgency=medium
* SECURITY UPDATE: ASN.1 encoding mishandling
- debian/patches/CVE-2025-59362.patch: fix ASN.1 encoding of long SNMP
OIDs in lib/snmplib/asn1.c.
- CVE-2025-59362
-- Marc Deslauriers <email address hidden> Fri, 03 Oct 2025 09:35:24 -0400
|
Source diff to previous version |
CVE-2025-59362 |
Squid through 7.1 mishandles ASN.1 encoding of long SNMP OIDs. This occurs in asn_build_objid in lib/snmplib/asn1.c. |
|
squid (5.9-0ubuntu0.22.04.2) jammy-security; urgency=medium
* SECURITY UPDATE: DoS in ESI processing using multi-byte characters
- debian/patches/CVE-2024-37894.patch: fix variable datatype to handle
variables names outside standard ASCII characters
- CVE-2024-37894
-- Vyom Yadav <email address hidden> Tue, 09 Jul 2024 15:49:37 +0530
|
Source diff to previous version |
CVE-2024-37894 |
Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to an Out-of-bounds Write error when assigning ESI variables, Squid i |
|
squid (5.9-0ubuntu0.22.04.1) jammy; urgency=medium
* New upstream version 5.9 (LP: #2040470):
- mgr:index URL do not produce MGR_INDEX template
- Block all non-localhost requests by default
- Block to-localhost, to-link-local requests by default
- ext_kerberos_ldap_group_acl: Support -b with -D
- For a comprehensive list of changes, please see
http://www.squid-cache.org/Versions/v5/ChangeLog.html.
* Refresh patches:
- d/p/0001-Default-configuration-file-for-debian.patch
- d/p/CVE-{2023-5824-1,2024-25111}.patch
* d/p/0001-Default-configuration-file-for-debian.patch: Comment
disruptive upstream changes introduced because of upstream bug
#5241.
* d/NEWS: Write news entry regarding the decision to comment out the
more strict defaults for connection to localhost and link-local
networks.
-- Sergio Durigan Junior <email address hidden> Wed, 03 Apr 2024 12:31:46 -0400
|
Source diff to previous version |
2040470 |
Upstream microrelease of squid 5.9 |
|
squid (5.7-0ubuntu0.22.04.4) jammy-security; urgency=medium
* SECURITY UPDATE: DoS via Cache Manager error responses
- debian/patches/CVE-2024-23638.patch: just close after a write(2)
response sending error in src/servers/Server.cc.
- CVE-2024-23638
* SECURITY UPDATE: DoS in HTTP header parsing
- debian/patches/CVE-2024-25617.patch: improve handling of expanding
HTTP header values in src/SquidString.h, src/cache_cf.cc,
src/cf.data.pre, src/http.cc.
- CVE-2024-25617
* SECURITY UPDATE: DoS via chunked decoder uncontrolled recursion bug
- debian/patches/CVE-2024-25111.patch: fix infinite recursion in
src/SquidMath.h, src/http.cc, src/http.h.
- CVE-2024-25111
* SECURITY UPDATE: DoS via Improper Handling of Structural Elements bug
- debian/patches/CVE-2023-5824-pre1.patch: break long store_client call
chains with async calls.
- debian/patches/CVE-2023-5824-pre2.patch: add Assure() as a
replacement for problematic Must().
- debian/patches/CVE-2023-5824-pre3.patch: fix compiler errors.
- debian/patches/CVE-2023-5824-1.patch: remove serialized HTTP headers
from storeClientCopy().
- debian/patches/CVE-2023-5824-2.patch: fix frequent assertion.
- debian/patches/CVE-2023-5824-3.patch: remove mem_hdr::freeDataUpto()
assertion.
- debian/patches/CVE-2023-5824-4.patch: fix Bug 5318.
- CVE-2023-5824
-- Marc Deslauriers <email address hidden> Thu, 14 Mar 2024 10:47:38 -0400
|
Source diff to previous version |
CVE-2024-23638 |
Squid is a caching proxy for the Web. Due to an expired pointer reference bug, Squid prior to version 6.6 is vulnerable to a Denial of Service attack |
CVE-2024-25617 |
Squid is an open source caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a Collapse of Data into Unsafe Value bug ,Squid may b |
CVE-2024-25111 |
Squid is a web proxy cache. Starting in version 3.5.27 and prior to version 6.8, Squid may be vulnerable to a Denial of Service attack against HTTP C |
CVE-2023-5824 |
Squid is vulnerable to Denial of Service attack against HTTP and HTTPS clients due to an Improper Handling of Structural Elements bug. |
|
squid (5.7-0ubuntu0.22.04.3) jammy-security; urgency=medium
* SECURITY UPDATE: denial of service in HTTP message processing
- debian/patches/CVE-2023-49285.patch: additional parsing checks added to
fix buffer overread in lib/rfc1123.c.
- CVE-2023-49285
* SECURITY UPDATE: denial of service in helper process management
- debian/patches/CVE-2023-49286.patch: improved error handling included
for helper process initialisation in src/ipc.cc.
- CVE-2023-49286
* SECURITY UPDATE: denial of service in HTTP request parsing
- debian/patches/CVE-2023-50269.patch: limit x-forwarded-for hops and log
limit as error when exceeded in src/ClientRequestContext.h,
src/client_side_request.cc.
- CVE-2023-50269
-- Evan Caville <email address hidden> Wed, 17 Jan 2024 14:01:57 +1000
|
CVE-2023-49285 |
Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a Buffer Overread bug Squid is vulnerable to a Denial of Service a |
CVE-2023-49286 |
Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to an Incorrect Check of Function Return Value bug Squid is vulnerabl |
CVE-2023-50269 |
Squid is a caching proxy for the Web. Due to an Uncontrolled Recursion bug in versions 2.6 through 2.7.STABLE9, versions 3.1 through 5.9, and version |
|
About
-
Send Feedback to @ubuntu_updates