SB2025101803 - Fedora 42 update for squid



SB2025101803 - Fedora 42 update for squid

Published: October 18, 2025 Updated: November 7, 2025

Security Bulletin ID SB2025101803
Severity
Medium
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 67% Low 33%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Buffer Over-read (CVE-ID: CVE-2025-54574)

The vulnerability allows a remote user to gain access to sensitive information.

The vulnerability exists due to a boundary error when processing URN Trivial-HTTP responses. A remote user can send a specially crafted HTTP response from the web server to the affected proxy, trigger memory corruption and force the proxy to deliver up to 4KB of Squid allocated heap memory to the client.


2) Stack-based buffer overflow (CVE-ID: CVE-2025-59362)

The vulnerability allows a remote user to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error when handling ASN.1 encoding of long SNMP OIDs within the asn_build_objid() function in lib/snmplib/asn1.c. A remote user can trigger a stack-based buffer overflow and crash the proxy server. 


3) Information exposure through externally-generated error message (CVE-ID: CVE-2025-62168)

The vulnerability allows a remote user to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application while handling error conditions. A remote authenticated user can identify security tokens or credentials used internally by a web application using Squid for backend load balancing.


Remediation

Install update from vendor's website.