Headline
RHSA-2022:6775: Red Hat Security Advisory: squid:4 security update
An update for the squid:4 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2022-41318: squid: buffer-over-read in SSPI and SMB authentication
Synopsis
Important: squid:4 security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for the squid:4 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
- squid: buffer-over-read in SSPI and SMB authentication (CVE-2022-41318)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing this update, the squid service will be restarted automatically.
Affected Products
- Red Hat Enterprise Linux for x86_64 8 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
- Red Hat Enterprise Linux Server - AUS 8.6 x86_64
- Red Hat Enterprise Linux for IBM z Systems 8 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x
- Red Hat Enterprise Linux for Power, little endian 8 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
- Red Hat Enterprise Linux Server - TUS 8.6 x86_64
- Red Hat Enterprise Linux for ARM 64 8 aarch64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
Fixes
- BZ - 2129771 - CVE-2022-41318 squid: buffer-over-read in SSPI and SMB authentication
Red Hat Enterprise Linux for x86_64 8
SRPM
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.src.rpm
SHA-256: 2f43b6316609e9a09ecea6e01089d7d886d0024c1eae28f1c31d87670992f7ff
squid-4.15-3.module+el8.6.0+16749+7b6feaf0.2.src.rpm
SHA-256: 486ce1bdd0514cb6758eaf9e77aa5082b583220424cf8dd65b883b7940743803
x86_64
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
SHA-256: d9d61e2135b220b3d61ae42ef3168afe872f28e6ba90ec1e7c12f99ee0cd09bf
libecap-debuginfo-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
SHA-256: fcf34d948d19d8ceec11c33bfbd410918882c1e2d5f98d317d47f40935a8beca
libecap-debugsource-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
SHA-256: 3a323f9bd1ce4c4fdba3eed2f8c5ab67ef86553708394d3ef6c55c579d339c60
libecap-devel-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
SHA-256: 1b13a8613f81f5551073df17797db405c70acc0e332bbc915d50459e2e7f4530
squid-4.15-3.module+el8.6.0+16749+7b6feaf0.2.x86_64.rpm
SHA-256: 6b53f16f384dddee6e7caf7cba370ed88ea2fa0c87e7a118b687947ad3df3de4
squid-debuginfo-4.15-3.module+el8.6.0+16749+7b6feaf0.2.x86_64.rpm
SHA-256: 79d942c79b28c60a16aa74f8615b6cb9077a1704ed1734de86705a2f639dfb27
squid-debugsource-4.15-3.module+el8.6.0+16749+7b6feaf0.2.x86_64.rpm
SHA-256: 1923b1bf72031a668c4934f0284aa6399112f7465325dee77562bb20210f5c41
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6
SRPM
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.src.rpm
SHA-256: 2f43b6316609e9a09ecea6e01089d7d886d0024c1eae28f1c31d87670992f7ff
squid-4.15-3.module+el8.6.0+16749+7b6feaf0.2.src.rpm
SHA-256: 486ce1bdd0514cb6758eaf9e77aa5082b583220424cf8dd65b883b7940743803
x86_64
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
SHA-256: d9d61e2135b220b3d61ae42ef3168afe872f28e6ba90ec1e7c12f99ee0cd09bf
libecap-debuginfo-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
SHA-256: fcf34d948d19d8ceec11c33bfbd410918882c1e2d5f98d317d47f40935a8beca
libecap-debugsource-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
SHA-256: 3a323f9bd1ce4c4fdba3eed2f8c5ab67ef86553708394d3ef6c55c579d339c60
libecap-devel-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
SHA-256: 1b13a8613f81f5551073df17797db405c70acc0e332bbc915d50459e2e7f4530
squid-4.15-3.module+el8.6.0+16749+7b6feaf0.2.x86_64.rpm
SHA-256: 6b53f16f384dddee6e7caf7cba370ed88ea2fa0c87e7a118b687947ad3df3de4
squid-debuginfo-4.15-3.module+el8.6.0+16749+7b6feaf0.2.x86_64.rpm
SHA-256: 79d942c79b28c60a16aa74f8615b6cb9077a1704ed1734de86705a2f639dfb27
squid-debugsource-4.15-3.module+el8.6.0+16749+7b6feaf0.2.x86_64.rpm
SHA-256: 1923b1bf72031a668c4934f0284aa6399112f7465325dee77562bb20210f5c41
Red Hat Enterprise Linux Server - AUS 8.6
SRPM
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.src.rpm
SHA-256: 2f43b6316609e9a09ecea6e01089d7d886d0024c1eae28f1c31d87670992f7ff
squid-4.15-3.module+el8.6.0+16749+7b6feaf0.2.src.rpm
SHA-256: 486ce1bdd0514cb6758eaf9e77aa5082b583220424cf8dd65b883b7940743803
x86_64
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
SHA-256: d9d61e2135b220b3d61ae42ef3168afe872f28e6ba90ec1e7c12f99ee0cd09bf
libecap-debuginfo-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
SHA-256: fcf34d948d19d8ceec11c33bfbd410918882c1e2d5f98d317d47f40935a8beca
libecap-debugsource-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
SHA-256: 3a323f9bd1ce4c4fdba3eed2f8c5ab67ef86553708394d3ef6c55c579d339c60
libecap-devel-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
SHA-256: 1b13a8613f81f5551073df17797db405c70acc0e332bbc915d50459e2e7f4530
squid-4.15-3.module+el8.6.0+16749+7b6feaf0.2.x86_64.rpm
SHA-256: 6b53f16f384dddee6e7caf7cba370ed88ea2fa0c87e7a118b687947ad3df3de4
squid-debuginfo-4.15-3.module+el8.6.0+16749+7b6feaf0.2.x86_64.rpm
SHA-256: 79d942c79b28c60a16aa74f8615b6cb9077a1704ed1734de86705a2f639dfb27
squid-debugsource-4.15-3.module+el8.6.0+16749+7b6feaf0.2.x86_64.rpm
SHA-256: 1923b1bf72031a668c4934f0284aa6399112f7465325dee77562bb20210f5c41
Red Hat Enterprise Linux for IBM z Systems 8
SRPM
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.src.rpm
SHA-256: 2f43b6316609e9a09ecea6e01089d7d886d0024c1eae28f1c31d87670992f7ff
squid-4.15-3.module+el8.6.0+16749+7b6feaf0.2.src.rpm
SHA-256: 486ce1bdd0514cb6758eaf9e77aa5082b583220424cf8dd65b883b7940743803
s390x
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.s390x.rpm
SHA-256: 11155457578ba82d131c38520ef1e704de6c8b532b17ccfcdb0feb647158d7d5
libecap-debuginfo-1.0.1-2.module+el8.1.0+4044+36416a77.s390x.rpm
SHA-256: c9809c43b34e764d8904dc2b31a213fe0dc49208feabcacd8106caef9d24b507
libecap-debugsource-1.0.1-2.module+el8.1.0+4044+36416a77.s390x.rpm
SHA-256: 4c5372dcfd4429ace80a62242882c6dfbf39a9eef2c8b84c2aa2b7292b24ce68
libecap-devel-1.0.1-2.module+el8.1.0+4044+36416a77.s390x.rpm
SHA-256: 7c3257862efc0e7f5a93f35535fb2292ca7a11342ff72e3f03d5a934a86821f3
squid-4.15-3.module+el8.6.0+16749+7b6feaf0.2.s390x.rpm
SHA-256: 6b1d6f572246d7e2b2ec8e5698adce707d0d1f8f5fe4cde7fb0937dbfa4a038b
squid-debuginfo-4.15-3.module+el8.6.0+16749+7b6feaf0.2.s390x.rpm
SHA-256: 49b44029ac2d285c5f162003143893ca63610cd1a9d9be70347f2699c0f479a9
squid-debugsource-4.15-3.module+el8.6.0+16749+7b6feaf0.2.s390x.rpm
SHA-256: ef6b3971a5a4f636ea8d8a96dd7bf9f4792dc42c1f4416c9a564efb8eb0459a3
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6
SRPM
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.src.rpm
SHA-256: 2f43b6316609e9a09ecea6e01089d7d886d0024c1eae28f1c31d87670992f7ff
squid-4.15-3.module+el8.6.0+16749+7b6feaf0.2.src.rpm
SHA-256: 486ce1bdd0514cb6758eaf9e77aa5082b583220424cf8dd65b883b7940743803
s390x
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.s390x.rpm
SHA-256: 11155457578ba82d131c38520ef1e704de6c8b532b17ccfcdb0feb647158d7d5
libecap-debuginfo-1.0.1-2.module+el8.1.0+4044+36416a77.s390x.rpm
SHA-256: c9809c43b34e764d8904dc2b31a213fe0dc49208feabcacd8106caef9d24b507
libecap-debugsource-1.0.1-2.module+el8.1.0+4044+36416a77.s390x.rpm
SHA-256: 4c5372dcfd4429ace80a62242882c6dfbf39a9eef2c8b84c2aa2b7292b24ce68
libecap-devel-1.0.1-2.module+el8.1.0+4044+36416a77.s390x.rpm
SHA-256: 7c3257862efc0e7f5a93f35535fb2292ca7a11342ff72e3f03d5a934a86821f3
squid-4.15-3.module+el8.6.0+16749+7b6feaf0.2.s390x.rpm
SHA-256: 6b1d6f572246d7e2b2ec8e5698adce707d0d1f8f5fe4cde7fb0937dbfa4a038b
squid-debuginfo-4.15-3.module+el8.6.0+16749+7b6feaf0.2.s390x.rpm
SHA-256: 49b44029ac2d285c5f162003143893ca63610cd1a9d9be70347f2699c0f479a9
squid-debugsource-4.15-3.module+el8.6.0+16749+7b6feaf0.2.s390x.rpm
SHA-256: ef6b3971a5a4f636ea8d8a96dd7bf9f4792dc42c1f4416c9a564efb8eb0459a3
Red Hat Enterprise Linux for Power, little endian 8
SRPM
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.src.rpm
SHA-256: 2f43b6316609e9a09ecea6e01089d7d886d0024c1eae28f1c31d87670992f7ff
squid-4.15-3.module+el8.6.0+16749+7b6feaf0.2.src.rpm
SHA-256: 486ce1bdd0514cb6758eaf9e77aa5082b583220424cf8dd65b883b7940743803
ppc64le
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le.rpm
SHA-256: 1ba6e6a7a7f64c91b5f49112a2d3437e5a4156c04cb2664d9f06985ffd631fac
libecap-debuginfo-1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le.rpm
SHA-256: 2ef0dadb839911f6fb556005df57f2531f2dd215e8bd7dceb39370910050c6a4
libecap-debugsource-1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le.rpm
SHA-256: 1cd7655a19f36b9eaf1cc95fd3e85d2f3cfa1a76e9206ca639fb16f14634f3dd
libecap-devel-1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le.rpm
SHA-256: 2d8756169558e12e281f18a9da93cc49c525ef908c8f2533f81e3a98b22d1e68
squid-4.15-3.module+el8.6.0+16749+7b6feaf0.2.ppc64le.rpm
SHA-256: 44c29ce7c5799409eb89f69bf715929b1437c955ecc8da22fdf89d7f2e1bfb30
squid-debuginfo-4.15-3.module+el8.6.0+16749+7b6feaf0.2.ppc64le.rpm
SHA-256: e276c5e33d7f6b3c300953798ca0bcccf436479f09f8b3e8102b6c2df1a9f41a
squid-debugsource-4.15-3.module+el8.6.0+16749+7b6feaf0.2.ppc64le.rpm
SHA-256: 5abac9a9af4cc57ba8204bae519b421286fffee0484d35eb96aceda388ab2ec7
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6
SRPM
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.src.rpm
SHA-256: 2f43b6316609e9a09ecea6e01089d7d886d0024c1eae28f1c31d87670992f7ff
squid-4.15-3.module+el8.6.0+16749+7b6feaf0.2.src.rpm
SHA-256: 486ce1bdd0514cb6758eaf9e77aa5082b583220424cf8dd65b883b7940743803
ppc64le
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le.rpm
SHA-256: 1ba6e6a7a7f64c91b5f49112a2d3437e5a4156c04cb2664d9f06985ffd631fac
libecap-debuginfo-1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le.rpm
SHA-256: 2ef0dadb839911f6fb556005df57f2531f2dd215e8bd7dceb39370910050c6a4
libecap-debugsource-1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le.rpm
SHA-256: 1cd7655a19f36b9eaf1cc95fd3e85d2f3cfa1a76e9206ca639fb16f14634f3dd
libecap-devel-1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le.rpm
SHA-256: 2d8756169558e12e281f18a9da93cc49c525ef908c8f2533f81e3a98b22d1e68
squid-4.15-3.module+el8.6.0+16749+7b6feaf0.2.ppc64le.rpm
SHA-256: 44c29ce7c5799409eb89f69bf715929b1437c955ecc8da22fdf89d7f2e1bfb30
squid-debuginfo-4.15-3.module+el8.6.0+16749+7b6feaf0.2.ppc64le.rpm
SHA-256: e276c5e33d7f6b3c300953798ca0bcccf436479f09f8b3e8102b6c2df1a9f41a
squid-debugsource-4.15-3.module+el8.6.0+16749+7b6feaf0.2.ppc64le.rpm
SHA-256: 5abac9a9af4cc57ba8204bae519b421286fffee0484d35eb96aceda388ab2ec7
Red Hat Enterprise Linux Server - TUS 8.6
SRPM
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.src.rpm
SHA-256: 2f43b6316609e9a09ecea6e01089d7d886d0024c1eae28f1c31d87670992f7ff
squid-4.15-3.module+el8.6.0+16749+7b6feaf0.2.src.rpm
SHA-256: 486ce1bdd0514cb6758eaf9e77aa5082b583220424cf8dd65b883b7940743803
x86_64
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
SHA-256: d9d61e2135b220b3d61ae42ef3168afe872f28e6ba90ec1e7c12f99ee0cd09bf
libecap-debuginfo-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
SHA-256: fcf34d948d19d8ceec11c33bfbd410918882c1e2d5f98d317d47f40935a8beca
libecap-debugsource-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
SHA-256: 3a323f9bd1ce4c4fdba3eed2f8c5ab67ef86553708394d3ef6c55c579d339c60
libecap-devel-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
SHA-256: 1b13a8613f81f5551073df17797db405c70acc0e332bbc915d50459e2e7f4530
squid-4.15-3.module+el8.6.0+16749+7b6feaf0.2.x86_64.rpm
SHA-256: 6b53f16f384dddee6e7caf7cba370ed88ea2fa0c87e7a118b687947ad3df3de4
squid-debuginfo-4.15-3.module+el8.6.0+16749+7b6feaf0.2.x86_64.rpm
SHA-256: 79d942c79b28c60a16aa74f8615b6cb9077a1704ed1734de86705a2f639dfb27
squid-debugsource-4.15-3.module+el8.6.0+16749+7b6feaf0.2.x86_64.rpm
SHA-256: 1923b1bf72031a668c4934f0284aa6399112f7465325dee77562bb20210f5c41
Red Hat Enterprise Linux for ARM 64 8
SRPM
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.src.rpm
SHA-256: 2f43b6316609e9a09ecea6e01089d7d886d0024c1eae28f1c31d87670992f7ff
squid-4.15-3.module+el8.6.0+16749+7b6feaf0.2.src.rpm
SHA-256: 486ce1bdd0514cb6758eaf9e77aa5082b583220424cf8dd65b883b7940743803
aarch64
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.aarch64.rpm
SHA-256: 31c61fd165ea82f7e30b0b4f8e9f9fd6a5eae832149c81c14fd706f902fed84a
libecap-debuginfo-1.0.1-2.module+el8.1.0+4044+36416a77.aarch64.rpm
SHA-256: 450f2a9aa696793f5c1ffb9e62a89bb182e442404b5915306060cd696dbc71e2
libecap-debugsource-1.0.1-2.module+el8.1.0+4044+36416a77.aarch64.rpm
SHA-256: 835ebb3c576f9b1c5ece2e8b3a5a44c0a87f57b3df4fe793c8d7984953397d63
libecap-devel-1.0.1-2.module+el8.1.0+4044+36416a77.aarch64.rpm
SHA-256: 3313cc4f037084e4f913b10b252a7750d6a5a282930643ad92982e3d1330893a
squid-4.15-3.module+el8.6.0+16749+7b6feaf0.2.aarch64.rpm
SHA-256: e4e0b01419ca6689431e3230e74b0021d29ce03399292bf50c323637fbe324b3
squid-debuginfo-4.15-3.module+el8.6.0+16749+7b6feaf0.2.aarch64.rpm
SHA-256: 220711346a0a4fc471ca964c081b42fdb1f983a68ddd9cffd8f376340c415934
squid-debugsource-4.15-3.module+el8.6.0+16749+7b6feaf0.2.aarch64.rpm
SHA-256: a3224d483db67172d5211b4be3deb31d57bfd2d68c413fc12530666ca1934e5d
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6
SRPM
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.src.rpm
SHA-256: 2f43b6316609e9a09ecea6e01089d7d886d0024c1eae28f1c31d87670992f7ff
squid-4.15-3.module+el8.6.0+16749+7b6feaf0.2.src.rpm
SHA-256: 486ce1bdd0514cb6758eaf9e77aa5082b583220424cf8dd65b883b7940743803
aarch64
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.aarch64.rpm
SHA-256: 31c61fd165ea82f7e30b0b4f8e9f9fd6a5eae832149c81c14fd706f902fed84a
libecap-debuginfo-1.0.1-2.module+el8.1.0+4044+36416a77.aarch64.rpm
SHA-256: 450f2a9aa696793f5c1ffb9e62a89bb182e442404b5915306060cd696dbc71e2
libecap-debugsource-1.0.1-2.module+el8.1.0+4044+36416a77.aarch64.rpm
SHA-256: 835ebb3c576f9b1c5ece2e8b3a5a44c0a87f57b3df4fe793c8d7984953397d63
libecap-devel-1.0.1-2.module+el8.1.0+4044+36416a77.aarch64.rpm
SHA-256: 3313cc4f037084e4f913b10b252a7750d6a5a282930643ad92982e3d1330893a
squid-4.15-3.module+el8.6.0+16749+7b6feaf0.2.aarch64.rpm
SHA-256: e4e0b01419ca6689431e3230e74b0021d29ce03399292bf50c323637fbe324b3
squid-debuginfo-4.15-3.module+el8.6.0+16749+7b6feaf0.2.aarch64.rpm
SHA-256: 220711346a0a4fc471ca964c081b42fdb1f983a68ddd9cffd8f376340c415934
squid-debugsource-4.15-3.module+el8.6.0+16749+7b6feaf0.2.aarch64.rpm
SHA-256: a3224d483db67172d5211b4be3deb31d57bfd2d68c413fc12530666ca1934e5d
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6
SRPM
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.src.rpm
SHA-256: 2f43b6316609e9a09ecea6e01089d7d886d0024c1eae28f1c31d87670992f7ff
squid-4.15-3.module+el8.6.0+16749+7b6feaf0.2.src.rpm
SHA-256: 486ce1bdd0514cb6758eaf9e77aa5082b583220424cf8dd65b883b7940743803
ppc64le
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le.rpm
SHA-256: 1ba6e6a7a7f64c91b5f49112a2d3437e5a4156c04cb2664d9f06985ffd631fac
libecap-debuginfo-1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le.rpm
SHA-256: 2ef0dadb839911f6fb556005df57f2531f2dd215e8bd7dceb39370910050c6a4
libecap-debugsource-1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le.rpm
SHA-256: 1cd7655a19f36b9eaf1cc95fd3e85d2f3cfa1a76e9206ca639fb16f14634f3dd
libecap-devel-1.0.1-2.module+el8.1.0+4044+36416a77.ppc64le.rpm
SHA-256: 2d8756169558e12e281f18a9da93cc49c525ef908c8f2533f81e3a98b22d1e68
squid-4.15-3.module+el8.6.0+16749+7b6feaf0.2.ppc64le.rpm
SHA-256: 44c29ce7c5799409eb89f69bf715929b1437c955ecc8da22fdf89d7f2e1bfb30
squid-debuginfo-4.15-3.module+el8.6.0+16749+7b6feaf0.2.ppc64le.rpm
SHA-256: e276c5e33d7f6b3c300953798ca0bcccf436479f09f8b3e8102b6c2df1a9f41a
squid-debugsource-4.15-3.module+el8.6.0+16749+7b6feaf0.2.ppc64le.rpm
SHA-256: 5abac9a9af4cc57ba8204bae519b421286fffee0484d35eb96aceda388ab2ec7
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6
SRPM
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.src.rpm
SHA-256: 2f43b6316609e9a09ecea6e01089d7d886d0024c1eae28f1c31d87670992f7ff
squid-4.15-3.module+el8.6.0+16749+7b6feaf0.2.src.rpm
SHA-256: 486ce1bdd0514cb6758eaf9e77aa5082b583220424cf8dd65b883b7940743803
x86_64
libecap-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
SHA-256: d9d61e2135b220b3d61ae42ef3168afe872f28e6ba90ec1e7c12f99ee0cd09bf
libecap-debuginfo-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
SHA-256: fcf34d948d19d8ceec11c33bfbd410918882c1e2d5f98d317d47f40935a8beca
libecap-debugsource-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
SHA-256: 3a323f9bd1ce4c4fdba3eed2f8c5ab67ef86553708394d3ef6c55c579d339c60
libecap-devel-1.0.1-2.module+el8.1.0+4044+36416a77.x86_64.rpm
SHA-256: 1b13a8613f81f5551073df17797db405c70acc0e332bbc915d50459e2e7f4530
squid-4.15-3.module+el8.6.0+16749+7b6feaf0.2.x86_64.rpm
SHA-256: 6b53f16f384dddee6e7caf7cba370ed88ea2fa0c87e7a118b687947ad3df3de4
squid-debuginfo-4.15-3.module+el8.6.0+16749+7b6feaf0.2.x86_64.rpm
SHA-256: 79d942c79b28c60a16aa74f8615b6cb9077a1704ed1734de86705a2f639dfb27
squid-debugsource-4.15-3.module+el8.6.0+16749+7b6feaf0.2.x86_64.rpm
SHA-256: 1923b1bf72031a668c4934f0284aa6399112f7465325dee77562bb20210f5c41
Related news
A buffer over-read was discovered in libntlmauth in Squid 2.5 through 5.6. Due to incorrect integer-overflow protection, the SSPI and SMB authentication helpers are vulnerable to reading unintended memory locations. In some configurations, cleartext credentials from these locations are sent to a client. This is fixed in 5.7.
Debian Linux Security Advisory 5258-1 - Several vulnerabilities were discovered in Squid, a fully featured web proxy cache, which could result in exposure of sensitive information in the cache manager (CVE-2022-41317), or denial of service or information disclosure if Squid is configured to negotiate authentication with the SSPI and SMB authentication helpers (CVE-2022-41318).
Red Hat Security Advisory 2022-6839-01 - Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Red Hat Security Advisory 2022-6815-01 - Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Red Hat Security Advisory 2022-6777-01 - Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Red Hat Security Advisory 2022-6776-01 - Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Red Hat Security Advisory 2022-6774-01 - Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Red Hat Security Advisory 2022-6775-01 - Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
An update for squid is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41318: squid: buffer-over-read in SSPI and SMB authentication
An update for the squid:4 module is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41318: squid: buffer-over-read in SSPI and SMB authentication
An update for the squid:4 module is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41318: squid: buffer-over-read in SSPI and SMB authentication
An update for the squid:4 module is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41318: squid: buffer-over-read in SSPI and SMB authentication
Ubuntu Security Notice 5641-1 - Mikhail Evdokimov discovered that Squid incorrectly handled cache manager ACLs. A remote attacker could possibly use this issue to obtain sensitive information. This issue only affected Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. It was discovered that Squid incorrectly handled SSPI and SMB authentication. A remote attacker could use this issue to cause Squid to crash, resulting in a denial of service, or possibly obtain sensitive information.