Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Is the Squid package affected by the current OpenSSL vulnerability (CVE-2022-3602/CVE-2022-3786)

    Cache/Proxy
    2
    3
    534
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      mr_snow
      last edited by mr_snow

      Hello,

      I'm aware of this post which says that pfSense in general is not vulnerable.

      But what about the included Squid package? Unfortunately, I lack the understanding of the underlying software stack to analyze the problem on my own. On other systems like Ubuntu, Squid seems vulnerable (source).

      Best regards,
      mr_snow

      Edit: Or is it enough to ssh on the pfSense and check the OpenSSL version?
      [2.6.0-RELEASE][admin@pfsense.***]/root: openssl version
      OpenSSL 1.1.1l-freebsd 24 Aug 2021

      1 Reply Last reply Reply Quote 0
      • jimpJ
        jimp Rebel Alliance Developer Netgate
        last edited by

        Packages* wouldn't matter for that, only the version of OpenSSL in the base system.

        We deliberately do not link packages against anything other than the base version of OpenSSL. We tried having a newer OpenSSL from ports around and it only made things more difficult to manage and keep straight.

        * Packages we build on pfSense anyhow. There might be something out there on third party servers that bundles OpenSSL we're unaware of (e.g. a web browser) but not something in the package servers run by Netgate/used by pfSense.

        Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

        Need help fast? Netgate Global Support!

        Do not Chat/PM for help!

        M 1 Reply Last reply Reply Quote 1
        • M
          mr_snow @jimp
          last edited by

          @jimp Perfect, thanks for the explaination :)

          1 Reply Last reply Reply Quote 0
          • First post
            Last post
          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.