Debian Package Tracker
Register | Log in
Subscribe

squid

Full featured Web Proxy cache (HTTP proxy GnuTLS flavour)

Choose email to subscribe with

general
  • source: squid (main)
  • version: 6.13-1
  • maintainer: Luigi Gangitano (DMD)
  • uploaders: Santiago Garcia Mantinan [DMD]
  • arch: all any
  • std-ver: 4.7.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 4.6-1+deb10u7
  • o-o-sec: 4.6-1+deb10u10
  • oldstable: 4.13-10+deb11u3
  • old-sec: 4.13-10+deb11u4
  • stable: 5.7-2+deb12u2
  • stable-sec: 5.7-2+deb12u2
  • testing: 6.13-1
  • unstable: 6.13-1
versioned links
  • 4.6-1+deb10u7: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.6-1+deb10u10: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.13-10+deb11u3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.13-10+deb11u4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 5.7-2+deb12u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 6.13-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • squid (14 bugs: 0, 11, 3, 0)
  • squid-cgi
  • squid-common
  • squid-openssl
  • squid-purge
  • squidclient
action needed
A new upstream version is available: 7.0.1 high
A new upstream version 7.0.1 is available, you should consider packaging it.
Created: 2025-02-15 Last update: 2025-05-22 06:00
7 security issues in buster high

There are 7 open security issues in buster.

6 important issues:
  • CVE-2023-5824: Squid is vulnerable to Denial of Service attack against HTTP and HTTPS clients due to an Improper Handling of Structural Elements bug.
  • CVE-2023-49288: Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Affected versions of squid are subject to a a Use-After-Free bug which can lead to a Denial of Service attack via collapsed forwarding. All versions of Squid from 3.5 up to and including 5.9 configured with "collapsed_forwarding on" are vulnerable. Configurations with "collapsed_forwarding off" or without a "collapsed_forwarding" directive are not vulnerable. This bug is fixed by Squid version 6.0.1. Users are advised to upgrade. Users unable to upgrade should remove all collapsed_forwarding lines from their squid.conf.
  • CVE-2024-23638: Squid is a caching proxy for the Web. Due to an expired pointer reference bug, Squid prior to version 6.6 is vulnerable to a Denial of Service attack against Cache Manager error responses. This problem allows a trusted client to perform Denial of Service when generating error pages for Client Manager reports. Squid older than 5.0.5 have not been tested and should be assumed to be vulnerable. All Squid-5.x up to and including 5.9 are vulnerable. All Squid-6.x up to and including 6.5 are vulnerable. This bug is fixed by Squid version 6.6. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives. As a workaround, prevent access to Cache Manager using Squid's main access control: `http_access deny manager`.
  • CVE-2024-25111: Squid is a web proxy cache. Starting in version 3.5.27 and prior to version 6.8, Squid may be vulnerable to a Denial of Service attack against HTTP Chunked decoder due to an uncontrolled recursion bug. This problem allows a remote attacker to cause Denial of Service when sending a crafted, chunked, encoded HTTP Message. This bug is fixed in Squid version 6.8. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives. There is no workaround for this issue.
  • CVE-2024-25617: Squid is an open source caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a Collapse of Data into Unsafe Value bug ,Squid may be vulnerable to a Denial of Service attack against HTTP header parsing. This problem allows a remote client or a remote server to perform Denial of Service when sending oversized headers in HTTP messages. In versions of Squid prior to 6.5 this can be achieved if the request_header_max_size or reply_header_max_size settings are unchanged from the default. In Squid version 6.5 and later, the default setting of these parameters is safe. Squid will emit a critical warning in cache.log if the administrator is setting these parameters to unsafe values. Squid will not at this time prevent these settings from being changed to unsafe values. Users are advised to upgrade to version 6.5. There are no known workarounds for this vulnerability. This issue is also tracked as SQUID-2024:2
  • CVE-2024-37894: Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to an Out-of-bounds Write error when assigning ESI variables, Squid is susceptible to a Memory Corruption error. This error can lead to a Denial of Service attack.
1 ignored issue:
  • CVE-2023-46728: Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a NULL pointer dereference bug Squid is vulnerable to a Denial of Service attack against Squid's Gopher gateway. The gopher protocol is always available and enabled in Squid prior to Squid 6.0.1. Responses triggering this bug are possible to be received from any gopher server, even those without malicious intent. Gopher support has been removed in Squid version 6.0.1. Users are advised to upgrade. Users unable to upgrade should reject all gopher URL requests.
Created: 2023-10-22 Last update: 2024-06-29 13:15
2 bugs tagged patch in the BTS normal
The BTS contains patches fixing 2 bugs, consider including or untagging them.
Created: 2025-01-06 Last update: 2025-05-22 08:01
version in VCS is newer than in repository, is it time to upload? normal
vcswatch reports that this package seems to have a new changelog entry (version 6.13-2, distribution UNRELEASED) and new commits in its VCS. You should consider whether it's time to make an upload.

Here are the relevant commit messages:
commit bb9e3651163578a7f710443728e60267d9349df3
Author: Amos Jeffries <amosjeffries@squid-cache.org>
Date:   Sat Mar 1 22:04:55 2025 +1300

    Bump Standard Versio to 4.7.2, no changes needed

commit 50a52a28bf2b61380c3c1e31f64db0682d66e10f
Author: Amos Jeffries <amosjeffries@squid-cache.org>
Date:   Sun Feb 23 16:19:17 2025 +1300

    Remove no longer necessary workaround for bug 984897

commit 092bede6802d877daf2d1bee11a554ef6eb5ba96
Author: Amos Jeffries <amosjeffries@squid-cache.org>
Date:   Sun Feb 23 16:07:33 2025 +1300

    Add symlink squid-openssl.8 to make lintian happy

commit 3bbfcb41bc510577e9ded651b42e2d7075d347e5
Author: Amos Jeffries <amosjeffries@squid-cache.org>
Date:   Sun Feb 23 15:59:26 2025 +1300

    Fix changelog typo to make lintian a bit happier

commit 837024929cfc0a4e8e35fc848979efad649a6762
Author: Amos Jeffries <amosjeffries@squid-cache.org>
Date:   Sun Feb 23 14:07:52 2025 +1300

    Bumped Standards-Version to 4.7.1, no change needed
Created: 2025-02-23 Last update: 2025-05-17 13:07
lintian reports 9 warnings normal
Lintian reports 9 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2025-02-11 Last update: 2025-04-11 03:32
4 low-priority security issues in bookworm low

There are 4 open security issues in bookworm.

1 issue left for the package maintainer to handle:
  • CVE-2024-45802: (needs triaging) Squid is an open source caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to Input Validation, Premature Release of Resource During Expected Lifetime, and Missing Release of Resource after Effective Lifetime bugs, Squid is vulnerable to Denial of Service attacks by a trusted server against all clients using the proxy. This bug is fixed in the default build configuration of Squid version 6.10.

You can find information about how to handle this issue in the security team's documentation.

3 ignored issues:
  • CVE-2023-5824: A flaw was found in Squid. The limits applied for validation of HTTP response headers are applied before caching. However, Squid may grow a cached HTTP response header beyond the configured maximum size, causing a stall or crash of the worker process when a large header is retrieved from the disk cache, resulting in a denial of service.
  • CVE-2023-46728: Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a NULL pointer dereference bug Squid is vulnerable to a Denial of Service attack against Squid's Gopher gateway. The gopher protocol is always available and enabled in Squid prior to Squid 6.0.1. Responses triggering this bug are possible to be received from any gopher server, even those without malicious intent. Gopher support has been removed in Squid version 6.0.1. Users are advised to upgrade. Users unable to upgrade should reject all gopher URL requests.
  • CVE-2023-49288: Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Affected versions of squid are subject to a a Use-After-Free bug which can lead to a Denial of Service attack via collapsed forwarding. All versions of Squid from 3.5 up to and including 5.9 configured with "collapsed_forwarding on" are vulnerable. Configurations with "collapsed_forwarding off" or without a "collapsed_forwarding" directive are not vulnerable. This bug is fixed by Squid version 6.0.1. Users are advised to upgrade. Users unable to upgrade should remove all collapsed_forwarding lines from their squid.conf.
Created: 2023-10-22 Last update: 2025-03-11 14:02
debian/patches: 1 patch to forward upstream low

Among the 4 debian patches available in version 6.13-1 of the package, we noticed the following issues:

  • 1 patch where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2025-02-11 21:32
Build log checks report 1 warning low
Build log checks report 1 warning
Created: 2025-01-16 Last update: 2025-01-16 16:33
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.2 instead of 4.7.0).
Created: 2025-02-21 Last update: 2025-02-27 13:25
news
[rss feed]
  • [2025-03-11] Accepted squid 4.13-10+deb11u4 (source) into oldstable-security (Jochen Sprickerhof)
  • [2025-02-13] squid 6.13-1 MIGRATED to testing (Debian testing watch)
  • [2025-02-11] Accepted squid 6.13-1 (source) into unstable (Luigi Gangitano)
  • [2024-10-31] squid 6.12-1 MIGRATED to testing (Debian testing watch)
  • [2024-10-28] Accepted squid 6.12-1 (source) into unstable (Luigi Gangitano)
  • [2024-08-21] Accepted squid 5.7-2+deb12u2 (source) into proposed-updates (Debian FTP Masters) (signed by: Moritz Mühlenhoff)
  • [2024-08-19] Accepted squid 5.7-2+deb12u2 (source) into stable-security (Debian FTP Masters) (signed by: Moritz Mühlenhoff)
  • [2024-07-03] squid 6.10-1 MIGRATED to testing (Debian testing watch)
  • [2024-07-01] Accepted squid 6.10-1 (source) into unstable (Luigi Gangitano)
  • [2024-05-03] squid 6.9-1 MIGRATED to testing (Debian testing watch)
  • [2024-04-09] Accepted squid 6.9-1 (source) into unstable (Luigi Gangitano)
  • [2024-03-18] Accepted squid 4.13-10+deb11u3 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Markus Koschany)
  • [2024-03-17] Accepted squid 5.7-2+deb12u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Markus Koschany)
  • [2024-03-08] Accepted squid 5.7-2+deb12u1 (source) into stable-security (Debian FTP Masters) (signed by: Markus Koschany)
  • [2024-03-08] Accepted squid 4.13-10+deb11u3 (source) into oldstable-security (Debian FTP Masters) (signed by: Markus Koschany)
  • [2024-03-04] Accepted squid 6.8-1 (source) into unstable (Luigi Gangitano)
  • [2024-01-22] Accepted squid 4.6-1+deb10u10 (source) into oldoldstable (Markus Koschany)
  • [2024-01-20] squid 6.6-1 MIGRATED to testing (Debian testing watch)
  • [2024-01-18] Accepted squid 6.6-1 (source) into unstable (Luigi Gangitano)
  • [2024-01-08] Accepted squid 4.6-1+deb10u9 (source) into oldoldstable (Markus Koschany)
  • [2023-11-13] squid 6.5-1 MIGRATED to testing (Debian testing watch)
  • [2023-11-09] Accepted squid 6.5-1 (source) into unstable (Luigi Gangitano)
  • [2023-09-28] Accepted squid 6.3-1 (source) into unstable (Luigi Gangitano)
  • [2023-09-26] squid REMOVED from testing (Debian testing watch)
  • [2023-07-13] Accepted squid 6.1-2 (source) into unstable (Luigi Gangitano)
  • [2023-07-10] Accepted squid 6.1-1 (source) into unstable (Luigi Gangitano)
  • [2023-05-17] squid 5.7-2 MIGRATED to testing (Debian testing watch)
  • [2023-04-29] Accepted squid 5.7-2 (source) into unstable (Santiago Garcia Mantinan)
  • [2022-11-05] Accepted squid 4.13-10+deb11u2 (source) into proposed-updates (Debian FTP Masters) (signed by: Salvatore Bonaccorso)
  • [2022-10-19] Accepted squid 4.13-10+deb11u2 (source) into stable-security (Debian FTP Masters) (signed by: Salvatore Bonaccorso)
  • 1
  • 2
bugs [bug history graph]
  • all: 31 33
  • RC: 0
  • I&N: 20 21
  • M&W: 11 12
  • F&P: 0
  • patch: 2
links
  • homepage
  • lintian (0, 9)
  • buildd: logs, checks, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 6.13-1ubuntu1
  • 8 bugs

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing