squid-3.5.20-17.0.5.99.0.2.el7.AXS7
エラータID: AXSA:2025-11536:06
Squid is a high-performance proxy caching server for Web clients,
supporting FTP, and HTTP data objects. Unlike traditional
caching software, Squid handles all requests in a single,
non-blocking, I/O-driven process. Squid keeps meta data and especially
hot objects cached in RAM, caches DNS lookups, supports non-blocking
DNS lookups, and implements negative caching of failed requests.
Squid consists of a main server program squid, a Domain Name System
lookup program (dnsserver), a program for retrieving FTP data
(ftpget), and some management and client tools.
Security Fix(es):
* CVE-2025-62168: fix failure to redact HTTP authentication credentials in error
handling to prevent information disclosure
* email_err_data directive now defaults to 'off' for security (previously 'on')
CVE(s):
CVE-2025-62168
Squid is a caching proxy for the Web. In Squid versions prior to 7.2, a failure to redact HTTP authentication credentials in error handling allows information disclosure. The vulnerability allows a script to bypass browser security protections and learn the credentials a trusted client uses to authenticate. This potentially allows a remote client to identify security tokens or credentials used internally by a web application using Squid for backend load balancing. These attacks do not require Squid to be configured with HTTP authentication. The vulnerability is fixed in version 7.2. As a workaround, disable debug information in administrator mailto links generated by Squid by configuring squid.conf with email_err_data off.
Update packages.
Squid is a caching proxy for the Web. In Squid versions prior to 7.2, a failure to redact HTTP authentication credentials in error handling allows information disclosure. The vulnerability allows a script to bypass browser security protections and learn the credentials a trusted client uses to authenticate. This potentially allows a remote client to identify security tokens or credentials used internally by a web application using Squid for backend load balancing. These attacks do not require Squid to be configured with HTTP authentication. The vulnerability is fixed in version 7.2. As a workaround, disable debug information in administrator mailto links generated by Squid by configuring squid.conf with email_err_data off.
N/A
Asianux Server 7 for x86_64
- squid-3.5.20-17.0.5.99.0.2.el7.AXS7.x86_64.rpm
MD5: 75e82c3faad21a4588a0db31c7dfb76a
SHA-256: 8e6e253efb9192e5b50c555131e5891805ae82f4bccf2f0e36af11338f82bc6a
Size: 3.04 MB - squid-migration-script-3.5.20-17.0.5.99.0.2.el7.AXS7.x86_64.rpm
MD5: 94c78998d3d52514eef003238343fdbb
SHA-256: a447fe8f3aec4cf9498aaf62d0d94ffb347e63a9eceacf8f3893a7cea6169aa0
Size: 52.46 kB