Debian Package Tracker
Register | Log in
Subscribe

tinyproxy

Lightweight, non-caching, optionally anonymizing HTTP proxy

Choose email to subscribe with

general
  • source: tinyproxy (main)
  • version: 1.11.3-1
  • maintainer: Mike Gabriel (DMD) (LowNMU)
  • uploaders: Jordi Mallach [DMD] – Ed Boraas [DMD] – Unit 193 [DMD]
  • arch: all any
  • std-ver: 4.7.3
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 1.10.0-5
  • o-o-sec: 1.10.0-5+deb11u1
  • oldstable: 1.11.1-2.1+deb12u1
  • old-sec: 1.11.1-2.1+deb12u1
  • old-bpo: 1.11.2-1~bpo12+1
  • stable: 1.11.2-1
  • stable-bpo: 1.11.3-1~bpo13+1
  • testing: 1.11.3-1
  • unstable: 1.11.3-1
versioned links
  • 1.10.0-5: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.10.0-5+deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.11.1-2.1+deb12u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.11.2-1~bpo12+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.11.2-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.11.3-1~bpo13+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.11.3-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • tinyproxy (5 bugs: 0, 5, 0, 0)
  • tinyproxy-bin
action needed
2 security issues in trixie high

There are 2 open security issues in trixie.

1 important issue:
  • CVE-2026-3945: An integer overflow vulnerability in the HTTP chunked transfer encoding parser in tinyproxy up to and including version 1.11.3 allows an unauthenticated remote attacker to cause a denial of service (DoS). The issue occurs because chunk size values are parsed using strtol() without properly validating overflow conditions (e.g., errno == ERANGE). A crafted chunk size such as 0x7fffffffffffffff (LONG_MAX) bypasses the existing validation check (chunklen < 0), leading to a signed integer overflow during arithmetic operations (chunklen + 2). This results in incorrect size calculations, causing the proxy to attempt reading an extremely large amount of request-body data and holding worker connections open indefinitely. An attacker can exploit this behavior to exhaust all available worker slots, preventing new connections from being accepted and causing complete service unavailability. Upstream addressed this issue in commit bb7edc4; however, the latest stable release (1.11.3) remains affected at the time of publication.
1 issue left for the package maintainer to handle:
  • CVE-2025-63938: (needs triaging) Tinyproxy through 1.11.2 contains an integer overflow vulnerability in the strip_return_port() function within src/reqs.c.

You can find information about how to handle this issue in the security team's documentation.

Created: 2025-11-27 Last update: 2026-04-01 22:19
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2026-3945: An integer overflow vulnerability in the HTTP chunked transfer encoding parser in tinyproxy up to and including version 1.11.3 allows an unauthenticated remote attacker to cause a denial of service (DoS). The issue occurs because chunk size values are parsed using strtol() without properly validating overflow conditions (e.g., errno == ERANGE). A crafted chunk size such as 0x7fffffffffffffff (LONG_MAX) bypasses the existing validation check (chunklen < 0), leading to a signed integer overflow during arithmetic operations (chunklen + 2). This results in incorrect size calculations, causing the proxy to attempt reading an extremely large amount of request-body data and holding worker connections open indefinitely. An attacker can exploit this behavior to exhaust all available worker slots, preventing new connections from being accepted and causing complete service unavailability. Upstream addressed this issue in commit bb7edc4; however, the latest stable release (1.11.3) remains affected at the time of publication.
Created: 2026-03-30 Last update: 2026-04-01 22:19
1 security issue in forky high

There is 1 open security issue in forky.

1 important issue:
  • CVE-2026-3945: An integer overflow vulnerability in the HTTP chunked transfer encoding parser in tinyproxy up to and including version 1.11.3 allows an unauthenticated remote attacker to cause a denial of service (DoS). The issue occurs because chunk size values are parsed using strtol() without properly validating overflow conditions (e.g., errno == ERANGE). A crafted chunk size such as 0x7fffffffffffffff (LONG_MAX) bypasses the existing validation check (chunklen < 0), leading to a signed integer overflow during arithmetic operations (chunklen + 2). This results in incorrect size calculations, causing the proxy to attempt reading an extremely large amount of request-body data and holding worker connections open indefinitely. An attacker can exploit this behavior to exhaust all available worker slots, preventing new connections from being accepted and causing complete service unavailability. Upstream addressed this issue in commit bb7edc4; however, the latest stable release (1.11.3) remains affected at the time of publication.
Created: 2026-03-30 Last update: 2026-04-01 22:19
2 security issues in bullseye high

There are 2 open security issues in bullseye.

1 important issue:
  • CVE-2026-3945: An integer overflow vulnerability in the HTTP chunked transfer encoding parser in tinyproxy up to and including version 1.11.3 allows an unauthenticated remote attacker to cause a denial of service (DoS). The issue occurs because chunk size values are parsed using strtol() without properly validating overflow conditions (e.g., errno == ERANGE). A crafted chunk size such as 0x7fffffffffffffff (LONG_MAX) bypasses the existing validation check (chunklen < 0), leading to a signed integer overflow during arithmetic operations (chunklen + 2). This results in incorrect size calculations, causing the proxy to attempt reading an extremely large amount of request-body data and holding worker connections open indefinitely. An attacker can exploit this behavior to exhaust all available worker slots, preventing new connections from being accepted and causing complete service unavailability. Upstream addressed this issue in commit bb7edc4; however, the latest stable release (1.11.3) remains affected at the time of publication.
1 issue postponed or untriaged:
  • CVE-2025-63938: (postponed; to be fixed through a stable update) Tinyproxy through 1.11.2 contains an integer overflow vulnerability in the strip_return_port() function within src/reqs.c.
Created: 2026-03-30 Last update: 2026-04-01 22:19
2 security issues in bookworm high

There are 2 open security issues in bookworm.

1 important issue:
  • CVE-2026-3945: An integer overflow vulnerability in the HTTP chunked transfer encoding parser in tinyproxy up to and including version 1.11.3 allows an unauthenticated remote attacker to cause a denial of service (DoS). The issue occurs because chunk size values are parsed using strtol() without properly validating overflow conditions (e.g., errno == ERANGE). A crafted chunk size such as 0x7fffffffffffffff (LONG_MAX) bypasses the existing validation check (chunklen < 0), leading to a signed integer overflow during arithmetic operations (chunklen + 2). This results in incorrect size calculations, causing the proxy to attempt reading an extremely large amount of request-body data and holding worker connections open indefinitely. An attacker can exploit this behavior to exhaust all available worker slots, preventing new connections from being accepted and causing complete service unavailability. Upstream addressed this issue in commit bb7edc4; however, the latest stable release (1.11.3) remains affected at the time of publication.
1 issue left for the package maintainer to handle:
  • CVE-2025-63938: (needs triaging) Tinyproxy through 1.11.2 contains an integer overflow vulnerability in the strip_return_port() function within src/reqs.c.

You can find information about how to handle this issue in the security team's documentation.

Created: 2025-11-27 Last update: 2026-04-01 22:19
lintian reports 4 warnings high
Lintian reports 4 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2022-10-01 Last update: 2026-03-18 23:02
1 bug tagged patch in the BTS normal
The BTS contains patches fixing 1 bug, consider including or untagging them.
Created: 2026-03-31 Last update: 2026-04-02 14:30
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.4 instead of 4.7.3).
Created: 2026-03-31 Last update: 2026-03-31 15:01
news
[rss feed]
  • [2026-03-23] Accepted tinyproxy 1.11.3-1~bpo13+1 (source amd64 all) into stable-backports (Debian FTP Masters) (signed by: Unit 193)
  • [2026-03-14] tinyproxy 1.11.3-1 MIGRATED to testing (Debian testing watch)
  • [2026-03-09] Accepted tinyproxy 1.11.3-1 (source) into unstable (Unit 193)
  • [2024-09-18] Accepted tinyproxy 1.10.0-5+deb11u1 (source) into oldstable-security (Thorsten Alteholz)
  • [2024-06-05] Accepted tinyproxy 1.11.1-2.1+deb12u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Moritz Mühlenhoff)
  • [2024-06-05] Accepted tinyproxy 1.11.1-2.1+deb12u1 (source) into stable-security (Debian FTP Masters) (signed by: Moritz Mühlenhoff)
  • [2024-05-15] Accepted tinyproxy 1.11.2-1~bpo12+1 (source amd64 all) into stable-backports (Debian FTP Masters) (signed by: Unit 193)
  • [2024-05-15] tinyproxy 1.11.2-1 MIGRATED to testing (Debian testing watch)
  • [2024-05-10] Accepted tinyproxy 1.11.2-1 (source) into unstable (Unit 193)
  • [2024-05-10] tinyproxy 1.11.1-4 MIGRATED to testing (Debian testing watch)
  • [2024-05-08] Accepted tinyproxy 1.11.1-4 (source) into unstable (Unit 193)
  • [2023-08-23] tinyproxy 1.11.1-3 MIGRATED to testing (Debian testing watch)
  • [2023-08-18] Accepted tinyproxy 1.11.1-3 (source) into unstable (Unit 193)
  • [2022-11-24] Accepted tinyproxy 1.11.1-2~bpo11+1 (source) into bullseye-backports (Unit 193)
  • [2022-10-20] tinyproxy 1.11.1-2.1 MIGRATED to testing (Debian testing watch)
  • [2022-10-15] Accepted tinyproxy 1.11.1-2.1 (source) into unstable (Michael Biebl)
  • [2022-10-06] tinyproxy 1.11.1-2 MIGRATED to testing (Debian testing watch)
  • [2022-10-01] Accepted tinyproxy 1.11.1-2 (source) into unstable (Unit 193)
  • [2022-06-05] Accepted tinyproxy 1.11.1-1~bpo11+1 (source) into bullseye-backports (Unit 193)
  • [2022-06-03] tinyproxy 1.11.1-1 MIGRATED to testing (Debian testing watch)
  • [2022-05-29] Accepted tinyproxy 1.11.1-1 (source) into unstable (Unit 193)
  • [2021-11-22] Accepted tinyproxy 1.11.0-1~bpo11+1 (source amd64 all) into bullseye-backports, bullseye-backports (Debian FTP Masters) (signed by: Unit 193)
  • [2021-11-14] tinyproxy 1.11.0-1 MIGRATED to testing (Debian testing watch)
  • [2021-11-08] Accepted tinyproxy 1.11.0-1 (source) into unstable (Unit 193)
  • [2021-07-09] tinyproxy 1.10.0-5 MIGRATED to testing (Debian testing watch)
  • [2021-07-02] Accepted tinyproxy 1.10.0-5 (source) into unstable (Mike Gabriel)
  • [2020-04-09] Accepted tinyproxy 1.8.4-3~deb9u2 (source amd64) into oldstable-proposed-updates->oldstable-new, oldstable-proposed-updates (Debian FTP Masters) (signed by: Utkarsh Gupta)
  • [2020-04-09] Accepted tinyproxy 1.10.0-2+deb10u1 (source amd64 all) into proposed-updates->stable-new, proposed-updates (Debian FTP Masters) (signed by: Utkarsh Gupta)
  • [2020-03-31] Accepted tinyproxy 1.8.3-3+deb8u1 (source amd64) into oldoldstable (Mike Gabriel) (signed by: Utkarsh Gupta)
  • [2020-01-26] tinyproxy 1.10.0-4 MIGRATED to testing (Debian testing watch)
  • 1
  • 2
bugs [bug history graph]
  • all: 6
  • RC: 0
  • I&N: 6
  • M&W: 0
  • F&P: 0
  • patch: 1
links
  • homepage
  • lintian (0, 4)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1.11.3-1
  • 2 bugs

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing