Headline
RHSA-2022:6777: Red Hat Security Advisory: squid:4 security update
An update for the squid:4 module is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2022-41318: squid: buffer-over-read in SSPI and SMB authentication
Synopsis
Important: squid:4 security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for the squid:4 module is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
- squid: buffer-over-read in SSPI and SMB authentication (CVE-2022-41318)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing this update, the squid service will be restarted automatically.
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2 x86_64
- Red Hat Enterprise Linux Server - AUS 8.2 x86_64
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2 s390x
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2 ppc64le
- Red Hat Enterprise Linux Server - TUS 8.2 x86_64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2 aarch64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2 x86_64
Fixes
- BZ - 2129771 - CVE-2022-41318 squid: buffer-over-read in SSPI and SMB authentication
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2
SRPM
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.src.rpm
SHA-256: 2f43b6316609e9a09ecea6e01089d7d886d0024c1eae28f1c31d87670992f7ff
squid-4.4-8.module+el8.2.0+16757+26d6b59c.5.src.rpm
SHA-256: b57c94756f20f71fb3fd5785e88c230c157218f4c7f436b42ffd39b1abbbbb31
x86_64
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
SHA-256: d9d61e2135b220b3d61ae42ef3168afe872f28e6ba90ec1e7c12f99ee0cd09bf
libecap-debuginfo-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
SHA-256: fcf34d948d19d8ceec11c33bfbd410918882c1e2d5f98d317d47f40935a8beca
libecap-debugsource-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
SHA-256: 3a323f9bd1ce4c4fdba3eed2f8c5ab67ef86553708394d3ef6c55c579d339c60
libecap-devel-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
SHA-256: 1b13a8613f81f5551073df17797db405c70acc0e332bbc915d50459e2e7f4530
squid-4.4-8.module+el8.2.0+16757+26d6b59c.5.x86_64.rpm
SHA-256: 47cc8a935eb2e9c2b977804ec7e4ce41df4b769ff1dac727bf27856b55568bd4
squid-debuginfo-4.4-8.module+el8.2.0+16757+26d6b59c.5.x86_64.rpm
SHA-256: c36f2ade4f59d703d79437a56a52edc50f9af34eaacd9ce09bb805f0a274283b
squid-debugsource-4.4-8.module+el8.2.0+16757+26d6b59c.5.x86_64.rpm
SHA-256: eac672c162db60642597047b4981b2fd27e1abb31386d6681eebd8f3625b743e
Red Hat Enterprise Linux Server - AUS 8.2
SRPM
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.src.rpm
SHA-256: 2f43b6316609e9a09ecea6e01089d7d886d0024c1eae28f1c31d87670992f7ff
squid-4.4-8.module+el8.2.0+16757+26d6b59c.5.src.rpm
SHA-256: b57c94756f20f71fb3fd5785e88c230c157218f4c7f436b42ffd39b1abbbbb31
x86_64
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
SHA-256: d9d61e2135b220b3d61ae42ef3168afe872f28e6ba90ec1e7c12f99ee0cd09bf
libecap-debuginfo-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
SHA-256: fcf34d948d19d8ceec11c33bfbd410918882c1e2d5f98d317d47f40935a8beca
libecap-debugsource-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
SHA-256: 3a323f9bd1ce4c4fdba3eed2f8c5ab67ef86553708394d3ef6c55c579d339c60
libecap-devel-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
SHA-256: 1b13a8613f81f5551073df17797db405c70acc0e332bbc915d50459e2e7f4530
squid-4.4-8.module+el8.2.0+16757+26d6b59c.5.x86_64.rpm
SHA-256: 47cc8a935eb2e9c2b977804ec7e4ce41df4b769ff1dac727bf27856b55568bd4
squid-debuginfo-4.4-8.module+el8.2.0+16757+26d6b59c.5.x86_64.rpm
SHA-256: c36f2ade4f59d703d79437a56a52edc50f9af34eaacd9ce09bb805f0a274283b
squid-debugsource-4.4-8.module+el8.2.0+16757+26d6b59c.5.x86_64.rpm
SHA-256: eac672c162db60642597047b4981b2fd27e1abb31386d6681eebd8f3625b743e
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2
SRPM
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.src.rpm
SHA-256: 2f43b6316609e9a09ecea6e01089d7d886d0024c1eae28f1c31d87670992f7ff
squid-4.4-8.module+el8.2.0+16757+26d6b59c.5.src.rpm
SHA-256: b57c94756f20f71fb3fd5785e88c230c157218f4c7f436b42ffd39b1abbbbb31
s390x
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.s390x.rpm
SHA-256: 11155457578ba82d131c38520ef1e704de6c8b532b17ccfcdb0feb647158d7d5
libecap-debuginfo-1.0.1-2.module+el8.1.0+4044+36416a77.s390x.rpm
SHA-256: c9809c43b34e764d8904dc2b31a213fe0dc49208feabcacd8106caef9d24b507
libecap-debugsource-1.0.1-2.module+el8.1.0+4044+36416a77.s390x.rpm
SHA-256: 4c5372dcfd4429ace80a62242882c6dfbf39a9eef2c8b84c2aa2b7292b24ce68
libecap-devel-1.0.1-2.module+el8.1.0+4044+36416a77.s390x.rpm
SHA-256: 7c3257862efc0e7f5a93f35535fb2292ca7a11342ff72e3f03d5a934a86821f3
squid-4.4-8.module+el8.2.0+16757+26d6b59c.5.s390x.rpm
SHA-256: 27ce0b0b4ec70e4e14f9069485baf48123b8a4ac465ad4d799318a4b18fbcced
squid-debuginfo-4.4-8.module+el8.2.0+16757+26d6b59c.5.s390x.rpm
SHA-256: bcea9f71929e57c8568b5f02238e917779be9b3275cdf67f47af487990e31d9d
squid-debugsource-4.4-8.module+el8.2.0+16757+26d6b59c.5.s390x.rpm
SHA-256: 38497cde79c6ab4a945c83563248bd251151cd34a432195945af8088e2630c95
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2
SRPM
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.src.rpm
SHA-256: 2f43b6316609e9a09ecea6e01089d7d886d0024c1eae28f1c31d87670992f7ff
squid-4.4-8.module+el8.2.0+16757+26d6b59c.5.src.rpm
SHA-256: b57c94756f20f71fb3fd5785e88c230c157218f4c7f436b42ffd39b1abbbbb31
ppc64le
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le.rpm
SHA-256: 1ba6e6a7a7f64c91b5f49112a2d3437e5a4156c04cb2664d9f06985ffd631fac
libecap-debuginfo-1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le.rpm
SHA-256: 2ef0dadb839911f6fb556005df57f2531f2dd215e8bd7dceb39370910050c6a4
libecap-debugsource-1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le.rpm
SHA-256: 1cd7655a19f36b9eaf1cc95fd3e85d2f3cfa1a76e9206ca639fb16f14634f3dd
libecap-devel-1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le.rpm
SHA-256: 2d8756169558e12e281f18a9da93cc49c525ef908c8f2533f81e3a98b22d1e68
squid-4.4-8.module+el8.2.0+16757+26d6b59c.5.ppc64le.rpm
SHA-256: b287f51f861fa581a14e4c3d9fc8d334667c9f6b1e624959996c02be958999d0
squid-debuginfo-4.4-8.module+el8.2.0+16757+26d6b59c.5.ppc64le.rpm
SHA-256: 32729da9ccf7b177a5e62b76640803bf6822bc923d155e973ba3c995a7459767
squid-debugsource-4.4-8.module+el8.2.0+16757+26d6b59c.5.ppc64le.rpm
SHA-256: cf30d103979ceb292d7ff44c0fb93b0e5d085ffd59a1a2c43bdf381c376fbfed
Red Hat Enterprise Linux Server - TUS 8.2
SRPM
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.src.rpm
SHA-256: 2f43b6316609e9a09ecea6e01089d7d886d0024c1eae28f1c31d87670992f7ff
squid-4.4-8.module+el8.2.0+16757+26d6b59c.5.src.rpm
SHA-256: b57c94756f20f71fb3fd5785e88c230c157218f4c7f436b42ffd39b1abbbbb31
x86_64
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
SHA-256: d9d61e2135b220b3d61ae42ef3168afe872f28e6ba90ec1e7c12f99ee0cd09bf
libecap-debuginfo-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
SHA-256: fcf34d948d19d8ceec11c33bfbd410918882c1e2d5f98d317d47f40935a8beca
libecap-debugsource-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
SHA-256: 3a323f9bd1ce4c4fdba3eed2f8c5ab67ef86553708394d3ef6c55c579d339c60
libecap-devel-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
SHA-256: 1b13a8613f81f5551073df17797db405c70acc0e332bbc915d50459e2e7f4530
squid-4.4-8.module+el8.2.0+16757+26d6b59c.5.x86_64.rpm
SHA-256: 47cc8a935eb2e9c2b977804ec7e4ce41df4b769ff1dac727bf27856b55568bd4
squid-debuginfo-4.4-8.module+el8.2.0+16757+26d6b59c.5.x86_64.rpm
SHA-256: c36f2ade4f59d703d79437a56a52edc50f9af34eaacd9ce09bb805f0a274283b
squid-debugsource-4.4-8.module+el8.2.0+16757+26d6b59c.5.x86_64.rpm
SHA-256: eac672c162db60642597047b4981b2fd27e1abb31386d6681eebd8f3625b743e
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2
SRPM
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.src.rpm
SHA-256: 2f43b6316609e9a09ecea6e01089d7d886d0024c1eae28f1c31d87670992f7ff
squid-4.4-8.module+el8.2.0+16757+26d6b59c.5.src.rpm
SHA-256: b57c94756f20f71fb3fd5785e88c230c157218f4c7f436b42ffd39b1abbbbb31
aarch64
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.aarch64.rpm
SHA-256: 31c61fd165ea82f7e30b0b4f8e9f9fd6a5eae832149c81c14fd706f902fed84a
libecap-debuginfo-1.0.1-2.module+el8.1.0+4044+36416a77.aarch64.rpm
SHA-256: 450f2a9aa696793f5c1ffb9e62a89bb182e442404b5915306060cd696dbc71e2
libecap-debugsource-1.0.1-2.module+el8.1.0+4044+36416a77.aarch64.rpm
SHA-256: 835ebb3c576f9b1c5ece2e8b3a5a44c0a87f57b3df4fe793c8d7984953397d63
libecap-devel-1.0.1-2.module+el8.1.0+4044+36416a77.aarch64.rpm
SHA-256: 3313cc4f037084e4f913b10b252a7750d6a5a282930643ad92982e3d1330893a
squid-4.4-8.module+el8.2.0+16757+26d6b59c.5.aarch64.rpm
SHA-256: bf6c3de0d46f6dcb3644d7683f21f6bb6ab0eff5c57c1e85cf781304e6a20bef
squid-debuginfo-4.4-8.module+el8.2.0+16757+26d6b59c.5.aarch64.rpm
SHA-256: 4848e1deb679d8b7451c6c630d3024beff4cfd28d5e3527dd3eee7245d451e2b
squid-debugsource-4.4-8.module+el8.2.0+16757+26d6b59c.5.aarch64.rpm
SHA-256: 1c630af18dc913e64c26708b1937c843be31d5047923edc45fdcc2337019e0a1
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2
SRPM
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.src.rpm
SHA-256: 2f43b6316609e9a09ecea6e01089d7d886d0024c1eae28f1c31d87670992f7ff
squid-4.4-8.module+el8.2.0+16757+26d6b59c.5.src.rpm
SHA-256: b57c94756f20f71fb3fd5785e88c230c157218f4c7f436b42ffd39b1abbbbb31
ppc64le
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le.rpm
SHA-256: 1ba6e6a7a7f64c91b5f49112a2d3437e5a4156c04cb2664d9f06985ffd631fac
libecap-debuginfo-1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le.rpm
SHA-256: 2ef0dadb839911f6fb556005df57f2531f2dd215e8bd7dceb39370910050c6a4
libecap-debugsource-1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le.rpm
SHA-256: 1cd7655a19f36b9eaf1cc95fd3e85d2f3cfa1a76e9206ca639fb16f14634f3dd
libecap-devel-1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le.rpm
SHA-256: 2d8756169558e12e281f18a9da93cc49c525ef908c8f2533f81e3a98b22d1e68
squid-4.4-8.module+el8.2.0+16757+26d6b59c.5.ppc64le.rpm
SHA-256: b287f51f861fa581a14e4c3d9fc8d334667c9f6b1e624959996c02be958999d0
squid-debuginfo-4.4-8.module+el8.2.0+16757+26d6b59c.5.ppc64le.rpm
SHA-256: 32729da9ccf7b177a5e62b76640803bf6822bc923d155e973ba3c995a7459767
squid-debugsource-4.4-8.module+el8.2.0+16757+26d6b59c.5.ppc64le.rpm
SHA-256: cf30d103979ceb292d7ff44c0fb93b0e5d085ffd59a1a2c43bdf381c376fbfed
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2
SRPM
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.src.rpm
SHA-256: 2f43b6316609e9a09ecea6e01089d7d886d0024c1eae28f1c31d87670992f7ff
squid-4.4-8.module+el8.2.0+16757+26d6b59c.5.src.rpm
SHA-256: b57c94756f20f71fb3fd5785e88c230c157218f4c7f436b42ffd39b1abbbbb31
x86_64
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
SHA-256: d9d61e2135b220b3d61ae42ef3168afe872f28e6ba90ec1e7c12f99ee0cd09bf
libecap-debuginfo-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
SHA-256: fcf34d948d19d8ceec11c33bfbd410918882c1e2d5f98d317d47f40935a8beca
libecap-debugsource-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
SHA-256: 3a323f9bd1ce4c4fdba3eed2f8c5ab67ef86553708394d3ef6c55c579d339c60
libecap-devel-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
SHA-256: 1b13a8613f81f5551073df17797db405c70acc0e332bbc915d50459e2e7f4530
squid-4.4-8.module+el8.2.0+16757+26d6b59c.5.x86_64.rpm
SHA-256: 47cc8a935eb2e9c2b977804ec7e4ce41df4b769ff1dac727bf27856b55568bd4
squid-debuginfo-4.4-8.module+el8.2.0+16757+26d6b59c.5.x86_64.rpm
SHA-256: c36f2ade4f59d703d79437a56a52edc50f9af34eaacd9ce09bb805f0a274283b
squid-debugsource-4.4-8.module+el8.2.0+16757+26d6b59c.5.x86_64.rpm
SHA-256: eac672c162db60642597047b4981b2fd27e1abb31386d6681eebd8f3625b743e
Related news
A buffer over-read was discovered in libntlmauth in Squid 2.5 through 5.6. Due to incorrect integer-overflow protection, the SSPI and SMB authentication helpers are vulnerable to reading unintended memory locations. In some configurations, cleartext credentials from these locations are sent to a client. This is fixed in 5.7.
Debian Linux Security Advisory 5258-1 - Several vulnerabilities were discovered in Squid, a fully featured web proxy cache, which could result in exposure of sensitive information in the cache manager (CVE-2022-41317), or denial of service or information disclosure if Squid is configured to negotiate authentication with the SSPI and SMB authentication helpers (CVE-2022-41318).
An update for squid is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41318: squid: buffer-over-read in SSPI and SMB authentication
Red Hat Security Advisory 2022-6815-01 - Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Red Hat Security Advisory 2022-6777-01 - Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Red Hat Security Advisory 2022-6776-01 - Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Red Hat Security Advisory 2022-6774-01 - Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Red Hat Security Advisory 2022-6775-01 - Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
An update for squid is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41318: squid: buffer-over-read in SSPI and SMB authentication
An update for the squid:4 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41318: squid: buffer-over-read in SSPI and SMB authentication
An update for the squid:4 module is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41318: squid: buffer-over-read in SSPI and SMB authentication
Ubuntu Security Notice 5641-1 - Mikhail Evdokimov discovered that Squid incorrectly handled cache manager ACLs. A remote attacker could possibly use this issue to obtain sensitive information. This issue only affected Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. It was discovered that Squid incorrectly handled SSPI and SMB authentication. A remote attacker could use this issue to cause Squid to crash, resulting in a denial of service, or possibly obtain sensitive information.