SB2025101803 - Fedora 42 update for squid
Published: October 18, 2025 Updated: November 7, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Buffer Over-read (CVE-ID: CVE-2025-54574)
The vulnerability allows a remote user to gain access to sensitive information.
The vulnerability exists due to a boundary error when processing URN Trivial-HTTP responses. A remote user can send a specially crafted HTTP response from the web server to the affected proxy, trigger memory corruption and force the proxy to deliver up to 4KB of Squid allocated heap memory to the client.
2) Stack-based buffer overflow (CVE-ID: CVE-2025-59362)
The vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error when handling ASN.1 encoding of long SNMP OIDs within the asn_build_objid() function in lib/snmplib/asn1.c. A remote user can trigger a stack-based buffer overflow and crash the proxy server.
3) Information exposure through externally-generated error message (CVE-ID: CVE-2025-62168)
The vulnerability allows a remote user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application while handling error conditions. A remote authenticated user can identify security tokens or credentials used internally by a web application using Squid for backend load balancing.
Remediation
Install update from vendor's website.