Debian Package Tracker
Register | Log in
Subscribe

squid

Choose email to subscribe with

general
  • source: squid (main)
  • version: 7.2-1
  • maintainer: Luigi Gangitano (DMD)
  • uploaders: Santiago Garcia Mantinan [DMD]
  • arch: all any
  • std-ver: 4.7.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 4.13-10+deb11u3
  • o-o-sec: 4.13-10+deb11u5
  • oldstable: 5.7-2+deb12u3
  • old-sec: 5.7-2+deb12u3
  • stable: 6.13-2
  • testing: 7.1-1
  • unstable: 7.2-1
versioned links
  • 4.13-10+deb11u3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.13-10+deb11u5: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 5.7-2+deb12u3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 6.13-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 7.1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 7.2-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • squid (31 bugs: 0, 20, 11, 0)
  • squid-common
  • squid-openssl
action needed
3 security issues in trixie high

There are 3 open security issues in trixie.

1 important issue:
  • CVE-2025-62168: Squid is a caching proxy for the Web. In Squid versions prior to 7.2, a failure to redact HTTP authentication credentials in error handling allows information disclosure. The vulnerability allows a script to bypass browser security protections and learn the credentials a trusted client uses to authenticate. This potentially allows a remote client to identify security tokens or credentials used internally by a web application using Squid for backend load balancing. These attacks do not require Squid to be configured with HTTP authentication. The vulnerability is fixed in version 7.2. As a workaround, disable debug information in administrator mailto links generated by Squid by configuring squid.conf with email_err_data off.
2 issues left for the package maintainer to handle:
  • CVE-2025-21311: (needs triaging) Windows NTLM V1 Elevation of Privilege Vulnerability
  • CVE-2025-59362: (needs triaging) Squid through 7.1 mishandles ASN.1 encoding of long SNMP OIDs. This occurs in asn_build_objid in lib/snmplib/asn1.c.

You can find information about how to handle these issues in the security team's documentation.

Created: 2025-07-14 Last update: 2025-10-23 04:02
2 security issues in forky high

There are 2 open security issues in forky.

2 important issues:
  • CVE-2025-59362: Squid through 7.1 mishandles ASN.1 encoding of long SNMP OIDs. This occurs in asn_build_objid in lib/snmplib/asn1.c.
  • CVE-2025-62168: Squid is a caching proxy for the Web. In Squid versions prior to 7.2, a failure to redact HTTP authentication credentials in error handling allows information disclosure. The vulnerability allows a script to bypass browser security protections and learn the credentials a trusted client uses to authenticate. This potentially allows a remote client to identify security tokens or credentials used internally by a web application using Squid for backend load balancing. These attacks do not require Squid to be configured with HTTP authentication. The vulnerability is fixed in version 7.2. As a workaround, disable debug information in administrator mailto links generated by Squid by configuring squid.conf with email_err_data off.
Created: 2025-09-27 Last update: 2025-10-23 04:02
4 security issues in bullseye high

There are 4 open security issues in bullseye.

1 important issue:
  • CVE-2025-62168: Squid is a caching proxy for the Web. In Squid versions prior to 7.2, a failure to redact HTTP authentication credentials in error handling allows information disclosure. The vulnerability allows a script to bypass browser security protections and learn the credentials a trusted client uses to authenticate. This potentially allows a remote client to identify security tokens or credentials used internally by a web application using Squid for backend load balancing. These attacks do not require Squid to be configured with HTTP authentication. The vulnerability is fixed in version 7.2. As a workaround, disable debug information in administrator mailto links generated by Squid by configuring squid.conf with email_err_data off.
2 issues postponed or untriaged:
  • CVE-2025-21311: (postponed; to be fixed through a stable update) Windows NTLM V1 Elevation of Privilege Vulnerability
  • CVE-2025-59362: (postponed; to be fixed through a stable update) Squid through 7.1 mishandles ASN.1 encoding of long SNMP OIDs. This occurs in asn_build_objid in lib/snmplib/asn1.c.
1 ignored issue:
  • CVE-2023-49288: Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Affected versions of squid are subject to a a Use-After-Free bug which can lead to a Denial of Service attack via collapsed forwarding. All versions of Squid from 3.5 up to and including 5.9 configured with "collapsed_forwarding on" are vulnerable. Configurations with "collapsed_forwarding off" or without a "collapsed_forwarding" directive are not vulnerable. This bug is fixed by Squid version 6.0.1. Users are advised to upgrade. Users unable to upgrade should remove all collapsed_forwarding lines from their squid.conf.
Created: 2025-10-17 Last update: 2025-10-23 04:02
6 security issues in bookworm high

There are 6 open security issues in bookworm.

1 important issue:
  • CVE-2025-62168: Squid is a caching proxy for the Web. In Squid versions prior to 7.2, a failure to redact HTTP authentication credentials in error handling allows information disclosure. The vulnerability allows a script to bypass browser security protections and learn the credentials a trusted client uses to authenticate. This potentially allows a remote client to identify security tokens or credentials used internally by a web application using Squid for backend load balancing. These attacks do not require Squid to be configured with HTTP authentication. The vulnerability is fixed in version 7.2. As a workaround, disable debug information in administrator mailto links generated by Squid by configuring squid.conf with email_err_data off.
3 issues left for the package maintainer to handle:
  • CVE-2024-45802: (needs triaging) Squid is an open source caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to Input Validation, Premature Release of Resource During Expected Lifetime, and Missing Release of Resource after Effective Lifetime bugs, Squid is vulnerable to Denial of Service attacks by a trusted server against all clients using the proxy. This bug is fixed in the default build configuration of Squid version 6.10.
  • CVE-2025-21311: (needs triaging) Windows NTLM V1 Elevation of Privilege Vulnerability
  • CVE-2025-59362: (needs triaging) Squid through 7.1 mishandles ASN.1 encoding of long SNMP OIDs. This occurs in asn_build_objid in lib/snmplib/asn1.c.

You can find information about how to handle these issues in the security team's documentation.

2 ignored issues:
  • CVE-2023-46728: Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a NULL pointer dereference bug Squid is vulnerable to a Denial of Service attack against Squid's Gopher gateway. The gopher protocol is always available and enabled in Squid prior to Squid 6.0.1. Responses triggering this bug are possible to be received from any gopher server, even those without malicious intent. Gopher support has been removed in Squid version 6.0.1. Users are advised to upgrade. Users unable to upgrade should reject all gopher URL requests.
  • CVE-2023-49288: Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Affected versions of squid are subject to a a Use-After-Free bug which can lead to a Denial of Service attack via collapsed forwarding. All versions of Squid from 3.5 up to and including 5.9 configured with "collapsed_forwarding on" are vulnerable. Configurations with "collapsed_forwarding off" or without a "collapsed_forwarding" directive are not vulnerable. This bug is fixed by Squid version 6.0.1. Users are advised to upgrade. Users unable to upgrade should remove all collapsed_forwarding lines from their squid.conf.
Created: 2023-10-22 Last update: 2025-10-23 04:02
lintian reports 1 error and 1 warning high
Lintian reports 1 error and 1 warning about this package. You should make the package lintian clean getting rid of them.
Created: 2025-07-15 Last update: 2025-07-15 09:02
7 security issues in buster high

There are 7 open security issues in buster.

6 important issues:
  • CVE-2023-5824: Squid is vulnerable to Denial of Service attack against HTTP and HTTPS clients due to an Improper Handling of Structural Elements bug.
  • CVE-2023-49288: Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Affected versions of squid are subject to a a Use-After-Free bug which can lead to a Denial of Service attack via collapsed forwarding. All versions of Squid from 3.5 up to and including 5.9 configured with "collapsed_forwarding on" are vulnerable. Configurations with "collapsed_forwarding off" or without a "collapsed_forwarding" directive are not vulnerable. This bug is fixed by Squid version 6.0.1. Users are advised to upgrade. Users unable to upgrade should remove all collapsed_forwarding lines from their squid.conf.
  • CVE-2024-23638: Squid is a caching proxy for the Web. Due to an expired pointer reference bug, Squid prior to version 6.6 is vulnerable to a Denial of Service attack against Cache Manager error responses. This problem allows a trusted client to perform Denial of Service when generating error pages for Client Manager reports. Squid older than 5.0.5 have not been tested and should be assumed to be vulnerable. All Squid-5.x up to and including 5.9 are vulnerable. All Squid-6.x up to and including 6.5 are vulnerable. This bug is fixed by Squid version 6.6. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives. As a workaround, prevent access to Cache Manager using Squid's main access control: `http_access deny manager`.
  • CVE-2024-25111: Squid is a web proxy cache. Starting in version 3.5.27 and prior to version 6.8, Squid may be vulnerable to a Denial of Service attack against HTTP Chunked decoder due to an uncontrolled recursion bug. This problem allows a remote attacker to cause Denial of Service when sending a crafted, chunked, encoded HTTP Message. This bug is fixed in Squid version 6.8. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives. There is no workaround for this issue.
  • CVE-2024-25617: Squid is an open source caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a Collapse of Data into Unsafe Value bug ,Squid may be vulnerable to a Denial of Service attack against HTTP header parsing. This problem allows a remote client or a remote server to perform Denial of Service when sending oversized headers in HTTP messages. In versions of Squid prior to 6.5 this can be achieved if the request_header_max_size or reply_header_max_size settings are unchanged from the default. In Squid version 6.5 and later, the default setting of these parameters is safe. Squid will emit a critical warning in cache.log if the administrator is setting these parameters to unsafe values. Squid will not at this time prevent these settings from being changed to unsafe values. Users are advised to upgrade to version 6.5. There are no known workarounds for this vulnerability. This issue is also tracked as SQUID-2024:2
  • CVE-2024-37894: Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to an Out-of-bounds Write error when assigning ESI variables, Squid is susceptible to a Memory Corruption error. This error can lead to a Denial of Service attack.
1 ignored issue:
  • CVE-2023-46728: Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a NULL pointer dereference bug Squid is vulnerable to a Denial of Service attack against Squid's Gopher gateway. The gopher protocol is always available and enabled in Squid prior to Squid 6.0.1. Responses triggering this bug are possible to be received from any gopher server, even those without malicious intent. Gopher support has been removed in Squid version 6.0.1. Users are advised to upgrade. Users unable to upgrade should reject all gopher URL requests.
Created: 2023-10-22 Last update: 2024-06-29 13:15
7 new commits since last upload, is it time to release? normal
vcswatch reports that this package seems to have new commits in its VCS but has not yet updated debian/changelog. You should consider updating the Debian changelog and uploading this new version into the archive.

Here are the relevant commit logs:
commit ab311427225582c92ca8783299997c5ad822f0bc
Author: Amos Jeffries <amosjeffries@squid-cache.org>
Date:   Sat Oct 18 22:06:12 2025 +1300

    add bug reference for latest CVE

commit 6974900c70542b79d5c336751c9447f2af94ec9d
Author: Amos Jeffries <amosjeffries@squid-cache.org>
Date:   Fri Oct 17 19:57:51 2025 +1300

    support libkrb5 provided by krb5-multidev package

commit 54057db268b04941f98df93a79fd062c7c906b24
Author: Amos Jeffries <amosjeffries@squid-cache.org>
Date:   Fri Oct 17 19:48:38 2025 +1300

    Update watch for v7 release files

commit 9c53fc59d051b090713e19591e699f24cff75d28
Author: Amos Jeffries <amosjeffries@squid-cache.org>
Date:   Fri Oct 17 16:11:23 2025 +1300

    Update changelog for new version

commit 78abd69cedba914e197108bf91169f81f6f9f184
Merge: f93f791 77dc015
Author: Amos Jeffries <amosjeffries@squid-cache.org>
Date:   Fri Oct 17 15:45:30 2025 +1300

    Update upstream source from tag 'upstream/7.2'
    
    Update to upstream version '7.2'
    with Debian dir 3f33612a0e6934b7f69e39d0bc05219c3fc6303f

commit 77dc015b88a7835fbaa2ae6b26c08cf9926182af
Author: Amos Jeffries <amosjeffries@squid-cache.org>
Date:   Fri Oct 17 15:45:30 2025 +1300

    New upstream version 7.2
Created: 2025-10-17 Last update: 2025-10-23 04:02
2 bugs tagged patch in the BTS normal
The BTS contains patches fixing 2 bugs, consider including or untagging them.
Created: 2025-07-28 Last update: 2025-10-23 03:48
4 open merge requests in Salsa normal
There are 4 open merge requests for this package on Salsa. You should consider reviewing and/or merging these merge requests.
Created: 2025-09-22 Last update: 2025-09-22 16:04
debian/patches: 1 patch to forward upstream low

Among the 4 debian patches available in version 7.1-1 of the package, we noticed the following issues:

  • 1 patch where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2025-07-15 01:03
testing migrations
  • excuses:
    • Migration status for squid (7.1-1 to 7.2-1): BLOCKED: Maybe temporary, maybe blocked but Britney is missing information (check below)
    • Issues preventing migration:
    • ∙ ∙ missing build on amd64
    • ∙ ∙ missing build on ppc64el
    • ∙ ∙ missing build on riscv64
    • ∙ ∙ missing build on s390x
    • ∙ ∙ arch:amd64 not built yet, autopkgtest delayed there
    • ∙ ∙ arch:ppc64el not built yet, autopkgtest delayed there
    • ∙ ∙ arch:riscv64 not built yet, autopkgtest delayed there
    • ∙ ∙ arch:s390x not built yet, autopkgtest delayed there
    • ∙ ∙ autopkgtest for squid: arm64: Test triggered, i386: Test triggered
    • ∙ ∙ Waiting for lintian test results (stalls migration) - info
    • ∙ ∙ Too young, only 0 of 2 days old
    • Additional info:
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/s/squid.html
    • ∙ ∙ Waiting for reproducibility test results on amd64 - info ♻
    • ∙ ∙ Waiting for reproducibility test results on arm64 - info ♻
    • Not considered
news
[rss feed]
  • [2025-10-22] Accepted squid 7.2-1 (source) into unstable (Luigi Gangitano)
  • [2025-09-27] Accepted squid 4.13-10+deb11u5 (source) into oldoldstable-security (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • [2025-08-22] Accepted squid 5.7-2+deb12u3 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Moritz Mühlenhoff)
  • [2025-08-21] Accepted squid 5.7-2+deb12u3 (source) into oldstable-security (Debian FTP Masters) (signed by: Moritz Mühlenhoff)
  • [2025-08-13] squid 7.1-1 MIGRATED to testing (Debian testing watch)
  • [2025-07-14] Accepted squid 7.1-1 (source) into unstable (Luigi Gangitano)
  • [2025-06-29] squid 6.13-2 MIGRATED to testing (Debian testing watch)
  • [2025-06-09] Accepted squid 6.13-2 (source) into unstable (Luigi Gangitano)
  • [2025-03-11] Accepted squid 4.13-10+deb11u4 (source) into oldstable-security (Jochen Sprickerhof)
  • [2025-02-13] squid 6.13-1 MIGRATED to testing (Debian testing watch)
  • [2025-02-11] Accepted squid 6.13-1 (source) into unstable (Luigi Gangitano)
  • [2024-10-31] squid 6.12-1 MIGRATED to testing (Debian testing watch)
  • [2024-10-28] Accepted squid 6.12-1 (source) into unstable (Luigi Gangitano)
  • [2024-08-21] Accepted squid 5.7-2+deb12u2 (source) into proposed-updates (Debian FTP Masters) (signed by: Moritz Mühlenhoff)
  • [2024-08-19] Accepted squid 5.7-2+deb12u2 (source) into stable-security (Debian FTP Masters) (signed by: Moritz Mühlenhoff)
  • [2024-07-03] squid 6.10-1 MIGRATED to testing (Debian testing watch)
  • [2024-07-01] Accepted squid 6.10-1 (source) into unstable (Luigi Gangitano)
  • [2024-05-03] squid 6.9-1 MIGRATED to testing (Debian testing watch)
  • [2024-04-09] Accepted squid 6.9-1 (source) into unstable (Luigi Gangitano)
  • [2024-03-18] Accepted squid 4.13-10+deb11u3 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Markus Koschany)
  • [2024-03-17] Accepted squid 5.7-2+deb12u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Markus Koschany)
  • [2024-03-08] Accepted squid 5.7-2+deb12u1 (source) into stable-security (Debian FTP Masters) (signed by: Markus Koschany)
  • [2024-03-08] Accepted squid 4.13-10+deb11u3 (source) into oldstable-security (Debian FTP Masters) (signed by: Markus Koschany)
  • [2024-03-04] Accepted squid 6.8-1 (source) into unstable (Luigi Gangitano)
  • [2024-01-22] Accepted squid 4.6-1+deb10u10 (source) into oldoldstable (Markus Koschany)
  • [2024-01-20] squid 6.6-1 MIGRATED to testing (Debian testing watch)
  • [2024-01-18] Accepted squid 6.6-1 (source) into unstable (Luigi Gangitano)
  • [2024-01-08] Accepted squid 4.6-1+deb10u9 (source) into oldoldstable (Markus Koschany)
  • [2023-11-13] squid 6.5-1 MIGRATED to testing (Debian testing watch)
  • [2023-11-09] Accepted squid 6.5-1 (source) into unstable (Luigi Gangitano)
  • 1
  • 2
bugs [bug history graph]
  • all: 29 31
  • RC: 0
  • I&N: 19 20
  • M&W: 10 11
  • F&P: 0
  • patch: 2
links
  • homepage
  • lintian (1, 1)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 6.13-1ubuntu4
  • 10 bugs

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing