Debian Package Tracker
Register | Log in
Subscribe

tinyproxy

Lightweight, non-caching, optionally anonymizing HTTP proxy

Choose email to subscribe with

general
  • source: tinyproxy (main)
  • version: 1.11.3-1
  • maintainer: Mike Gabriel (DMD) (LowNMU)
  • uploaders: Jordi Mallach [DMD] – Ed Boraas [DMD] – Unit 193 [DMD]
  • arch: all any
  • std-ver: 4.7.3
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 1.10.0-5
  • o-o-sec: 1.10.0-5+deb11u1
  • oldstable: 1.11.1-2.1+deb12u1
  • old-sec: 1.11.1-2.1+deb12u1
  • old-bpo: 1.11.2-1~bpo12+1
  • stable: 1.11.2-1
  • stable-bpo: 1.11.3-1~bpo13+1
  • testing: 1.11.3-1
  • unstable: 1.11.3-1
versioned links
  • 1.10.0-5: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.10.0-5+deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.11.1-2.1+deb12u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.11.2-1~bpo12+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.11.2-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.11.3-1~bpo13+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.11.3-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • tinyproxy (5 bugs: 0, 5, 0, 0)
  • tinyproxy-bin
action needed
2 security issues in sid high

There are 2 open security issues in sid.

2 important issues:
  • CVE-2026-3945: An integer overflow vulnerability in the HTTP chunked transfer encoding parser in tinyproxy up to and including version 1.11.3 allows an unauthenticated remote attacker to cause a denial of service (DoS). The issue occurs because chunk size values are parsed using strtol() without properly validating overflow conditions (e.g., errno == ERANGE). A crafted chunk size such as 0x7fffffffffffffff (LONG_MAX) bypasses the existing validation check (chunklen < 0), leading to a signed integer overflow during arithmetic operations (chunklen + 2). This results in incorrect size calculations, causing the proxy to attempt reading an extremely large amount of request-body data and holding worker connections open indefinitely. An attacker can exploit this behavior to exhaust all available worker slots, preventing new connections from being accepted and causing complete service unavailability. Upstream addressed this issue in commit bb7edc4; however, the latest stable release (1.11.3) remains affected at the time of publication.
  • CVE-2026-31842: Tinyproxy through 1.11.3 is vulnerable to HTTP request parsing desynchronization due to a case-sensitive comparison of the Transfer-Encoding header in src/reqs.c. The is_chunked_transfer() function uses strcmp() to compare the header value against "chunked", even though RFC 7230 specifies that transfer-coding names are case-insensitive. By sending a request with Transfer-Encoding: Chunked, an unauthenticated remote attacker can cause Tinyproxy to misinterpret the request as having no body. In this state, Tinyproxy sets content_length.client to -1, skips pull_client_data_chunked(), forwards request headers upstream, and transitions into relay_connection() raw TCP forwarding while unread body data remains buffered. This leads to inconsistent request state between Tinyproxy and backend servers. RFC-compliant backends (e.g., Node.js, Nginx) will continue waiting for chunked body data, causing connections to hang indefinitely. This behavior enables application-level denial of service through backend worker exhaustion. Additionally, in deployments where Tinyproxy is used for request-body inspection, filtering, or security enforcement, the unread body may be forwarded without proper inspection, resulting in potential security control bypass.
Created: 2026-03-30 Last update: 2026-04-20 04:00
2 security issues in forky high

There are 2 open security issues in forky.

2 important issues:
  • CVE-2026-3945: An integer overflow vulnerability in the HTTP chunked transfer encoding parser in tinyproxy up to and including version 1.11.3 allows an unauthenticated remote attacker to cause a denial of service (DoS). The issue occurs because chunk size values are parsed using strtol() without properly validating overflow conditions (e.g., errno == ERANGE). A crafted chunk size such as 0x7fffffffffffffff (LONG_MAX) bypasses the existing validation check (chunklen < 0), leading to a signed integer overflow during arithmetic operations (chunklen + 2). This results in incorrect size calculations, causing the proxy to attempt reading an extremely large amount of request-body data and holding worker connections open indefinitely. An attacker can exploit this behavior to exhaust all available worker slots, preventing new connections from being accepted and causing complete service unavailability. Upstream addressed this issue in commit bb7edc4; however, the latest stable release (1.11.3) remains affected at the time of publication.
  • CVE-2026-31842: Tinyproxy through 1.11.3 is vulnerable to HTTP request parsing desynchronization due to a case-sensitive comparison of the Transfer-Encoding header in src/reqs.c. The is_chunked_transfer() function uses strcmp() to compare the header value against "chunked", even though RFC 7230 specifies that transfer-coding names are case-insensitive. By sending a request with Transfer-Encoding: Chunked, an unauthenticated remote attacker can cause Tinyproxy to misinterpret the request as having no body. In this state, Tinyproxy sets content_length.client to -1, skips pull_client_data_chunked(), forwards request headers upstream, and transitions into relay_connection() raw TCP forwarding while unread body data remains buffered. This leads to inconsistent request state between Tinyproxy and backend servers. RFC-compliant backends (e.g., Node.js, Nginx) will continue waiting for chunked body data, causing connections to hang indefinitely. This behavior enables application-level denial of service through backend worker exhaustion. Additionally, in deployments where Tinyproxy is used for request-body inspection, filtering, or security enforcement, the unread body may be forwarded without proper inspection, resulting in potential security control bypass.
Created: 2026-03-30 Last update: 2026-04-20 04:00
lintian reports 4 warnings high
Lintian reports 4 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2022-10-01 Last update: 2026-03-18 23:02
1 bug tagged patch in the BTS normal
The BTS contains patches fixing 1 bug, consider including or untagging them.
Created: 2026-04-06 Last update: 2026-04-23 06:30
3 low-priority security issues in trixie low

There are 3 open security issues in trixie.

3 issues left for the package maintainer to handle:
  • CVE-2026-3945: (needs triaging) An integer overflow vulnerability in the HTTP chunked transfer encoding parser in tinyproxy up to and including version 1.11.3 allows an unauthenticated remote attacker to cause a denial of service (DoS). The issue occurs because chunk size values are parsed using strtol() without properly validating overflow conditions (e.g., errno == ERANGE). A crafted chunk size such as 0x7fffffffffffffff (LONG_MAX) bypasses the existing validation check (chunklen < 0), leading to a signed integer overflow during arithmetic operations (chunklen + 2). This results in incorrect size calculations, causing the proxy to attempt reading an extremely large amount of request-body data and holding worker connections open indefinitely. An attacker can exploit this behavior to exhaust all available worker slots, preventing new connections from being accepted and causing complete service unavailability. Upstream addressed this issue in commit bb7edc4; however, the latest stable release (1.11.3) remains affected at the time of publication.
  • CVE-2025-63938: (needs triaging) Tinyproxy through 1.11.2 contains an integer overflow vulnerability in the strip_return_port() function within src/reqs.c.
  • CVE-2026-31842: (needs triaging) Tinyproxy through 1.11.3 is vulnerable to HTTP request parsing desynchronization due to a case-sensitive comparison of the Transfer-Encoding header in src/reqs.c. The is_chunked_transfer() function uses strcmp() to compare the header value against "chunked", even though RFC 7230 specifies that transfer-coding names are case-insensitive. By sending a request with Transfer-Encoding: Chunked, an unauthenticated remote attacker can cause Tinyproxy to misinterpret the request as having no body. In this state, Tinyproxy sets content_length.client to -1, skips pull_client_data_chunked(), forwards request headers upstream, and transitions into relay_connection() raw TCP forwarding while unread body data remains buffered. This leads to inconsistent request state between Tinyproxy and backend servers. RFC-compliant backends (e.g., Node.js, Nginx) will continue waiting for chunked body data, causing connections to hang indefinitely. This behavior enables application-level denial of service through backend worker exhaustion. Additionally, in deployments where Tinyproxy is used for request-body inspection, filtering, or security enforcement, the unread body may be forwarded without proper inspection, resulting in potential security control bypass.

You can find information about how to handle these issues in the security team's documentation.

Created: 2025-11-27 Last update: 2026-04-20 04:00
3 low-priority security issues in bookworm low

There are 3 open security issues in bookworm.

3 issues left for the package maintainer to handle:
  • CVE-2026-3945: (needs triaging) An integer overflow vulnerability in the HTTP chunked transfer encoding parser in tinyproxy up to and including version 1.11.3 allows an unauthenticated remote attacker to cause a denial of service (DoS). The issue occurs because chunk size values are parsed using strtol() without properly validating overflow conditions (e.g., errno == ERANGE). A crafted chunk size such as 0x7fffffffffffffff (LONG_MAX) bypasses the existing validation check (chunklen < 0), leading to a signed integer overflow during arithmetic operations (chunklen + 2). This results in incorrect size calculations, causing the proxy to attempt reading an extremely large amount of request-body data and holding worker connections open indefinitely. An attacker can exploit this behavior to exhaust all available worker slots, preventing new connections from being accepted and causing complete service unavailability. Upstream addressed this issue in commit bb7edc4; however, the latest stable release (1.11.3) remains affected at the time of publication.
  • CVE-2025-63938: (needs triaging) Tinyproxy through 1.11.2 contains an integer overflow vulnerability in the strip_return_port() function within src/reqs.c.
  • CVE-2026-31842: (needs triaging) Tinyproxy through 1.11.3 is vulnerable to HTTP request parsing desynchronization due to a case-sensitive comparison of the Transfer-Encoding header in src/reqs.c. The is_chunked_transfer() function uses strcmp() to compare the header value against "chunked", even though RFC 7230 specifies that transfer-coding names are case-insensitive. By sending a request with Transfer-Encoding: Chunked, an unauthenticated remote attacker can cause Tinyproxy to misinterpret the request as having no body. In this state, Tinyproxy sets content_length.client to -1, skips pull_client_data_chunked(), forwards request headers upstream, and transitions into relay_connection() raw TCP forwarding while unread body data remains buffered. This leads to inconsistent request state between Tinyproxy and backend servers. RFC-compliant backends (e.g., Node.js, Nginx) will continue waiting for chunked body data, causing connections to hang indefinitely. This behavior enables application-level denial of service through backend worker exhaustion. Additionally, in deployments where Tinyproxy is used for request-body inspection, filtering, or security enforcement, the unread body may be forwarded without proper inspection, resulting in potential security control bypass.

You can find information about how to handle these issues in the security team's documentation.

Created: 2025-11-27 Last update: 2026-04-20 04:00
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.4 instead of 4.7.3).
Created: 2026-03-31 Last update: 2026-03-31 15:01
news
[rss feed]
  • [2026-03-23] Accepted tinyproxy 1.11.3-1~bpo13+1 (source amd64 all) into stable-backports (Debian FTP Masters) (signed by: Unit 193)
  • [2026-03-14] tinyproxy 1.11.3-1 MIGRATED to testing (Debian testing watch)
  • [2026-03-09] Accepted tinyproxy 1.11.3-1 (source) into unstable (Unit 193)
  • [2024-09-18] Accepted tinyproxy 1.10.0-5+deb11u1 (source) into oldstable-security (Thorsten Alteholz)
  • [2024-06-05] Accepted tinyproxy 1.11.1-2.1+deb12u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Moritz Mühlenhoff)
  • [2024-06-05] Accepted tinyproxy 1.11.1-2.1+deb12u1 (source) into stable-security (Debian FTP Masters) (signed by: Moritz Mühlenhoff)
  • [2024-05-15] Accepted tinyproxy 1.11.2-1~bpo12+1 (source amd64 all) into stable-backports (Debian FTP Masters) (signed by: Unit 193)
  • [2024-05-15] tinyproxy 1.11.2-1 MIGRATED to testing (Debian testing watch)
  • [2024-05-10] Accepted tinyproxy 1.11.2-1 (source) into unstable (Unit 193)
  • [2024-05-10] tinyproxy 1.11.1-4 MIGRATED to testing (Debian testing watch)
  • [2024-05-08] Accepted tinyproxy 1.11.1-4 (source) into unstable (Unit 193)
  • [2023-08-23] tinyproxy 1.11.1-3 MIGRATED to testing (Debian testing watch)
  • [2023-08-18] Accepted tinyproxy 1.11.1-3 (source) into unstable (Unit 193)
  • [2022-11-24] Accepted tinyproxy 1.11.1-2~bpo11+1 (source) into bullseye-backports (Unit 193)
  • [2022-10-20] tinyproxy 1.11.1-2.1 MIGRATED to testing (Debian testing watch)
  • [2022-10-15] Accepted tinyproxy 1.11.1-2.1 (source) into unstable (Michael Biebl)
  • [2022-10-06] tinyproxy 1.11.1-2 MIGRATED to testing (Debian testing watch)
  • [2022-10-01] Accepted tinyproxy 1.11.1-2 (source) into unstable (Unit 193)
  • [2022-06-05] Accepted tinyproxy 1.11.1-1~bpo11+1 (source) into bullseye-backports (Unit 193)
  • [2022-06-03] tinyproxy 1.11.1-1 MIGRATED to testing (Debian testing watch)
  • [2022-05-29] Accepted tinyproxy 1.11.1-1 (source) into unstable (Unit 193)
  • [2021-11-22] Accepted tinyproxy 1.11.0-1~bpo11+1 (source amd64 all) into bullseye-backports, bullseye-backports (Debian FTP Masters) (signed by: Unit 193)
  • [2021-11-14] tinyproxy 1.11.0-1 MIGRATED to testing (Debian testing watch)
  • [2021-11-08] Accepted tinyproxy 1.11.0-1 (source) into unstable (Unit 193)
  • [2021-07-09] tinyproxy 1.10.0-5 MIGRATED to testing (Debian testing watch)
  • [2021-07-02] Accepted tinyproxy 1.10.0-5 (source) into unstable (Mike Gabriel)
  • [2020-04-09] Accepted tinyproxy 1.8.4-3~deb9u2 (source amd64) into oldstable-proposed-updates->oldstable-new, oldstable-proposed-updates (Debian FTP Masters) (signed by: Utkarsh Gupta)
  • [2020-04-09] Accepted tinyproxy 1.10.0-2+deb10u1 (source amd64 all) into proposed-updates->stable-new, proposed-updates (Debian FTP Masters) (signed by: Utkarsh Gupta)
  • [2020-03-31] Accepted tinyproxy 1.8.3-3+deb8u1 (source amd64) into oldoldstable (Mike Gabriel) (signed by: Utkarsh Gupta)
  • [2020-01-26] tinyproxy 1.10.0-4 MIGRATED to testing (Debian testing watch)
  • 1
  • 2
bugs [bug history graph]
  • all: 7
  • RC: 0
  • I&N: 7
  • M&W: 0
  • F&P: 0
  • patch: 1
links
  • homepage
  • lintian (0, 4)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • other distros
  • security tracker
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1.11.3-1
  • 2 bugs

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing