Debian Patches
Status for squid/5.7-2+deb12u5
| Patch | Description | Author | Forwarded | Bugs | Origin | Last update |
|---|---|---|---|---|---|---|
| CVE-2023-46848.patch | CVE-2023-46848 | Markus Koschany <apo@debian.org> | no | debian | http://www.squid-cache.org/Versions/v5/SQUID-2023_5.patch | 2024-02-19 |
| CVE-2023-49285.patch | CVE-2023-49285 | Markus Koschany <apo@debian.org> | no | http://www.squid-cache.org/Versions/v5/SQUID-2023_7.patch | 2024-02-19 | |
| CVE-2023-49286.patch | CVE-2023-49286 | Markus Koschany <apo@debian.org> | no | http://www.squid-cache.org/Versions/v6/SQUID-2023_8.patch | 2024-02-19 | |
| CVE-2023-50269.patch | CVE-2023-50269 | Markus Koschany <apo@debian.org> | no | debian | http://www.squid-cache.org/Versions/v5/SQUID-2023_10.patch | 2024-02-19 |
| CVE-2024-23638.patch | CVE-2024-23638 | Markus Koschany <apo@debian.org> | no | http://www.squid-cache.org/Versions/v5/SQUID-2023_11.patch | 2024-02-19 | |
| CVE-2024-25111.patch | CVE-2024-25111 | Markus Koschany <apo@debian.org> | no | http://www.squid-cache.org/Versions/v6/SQUID-2024_1.patch | 2024-03-05 | |
| CVE-2024-25617.patch | CVE-2024-25617 | Markus Koschany <apo@debian.org> | no | http://www.squid-cache.org/Versions/v6/SQUID-2024_2.patch | 2024-03-05 | |
| 1f13f721263a4cc75e4b798a230022561047899c.patch | [PATCH] Bug 5162: mgr:index URL do not produce MGR_INDEX template (#1191) Satisfy mgr:index requests using * a 200 OK response with a body derived from the MGR_INDEX template (if that template file was found during (re)configuration) or * a 404 (Not Found) error response (otherwise). Broken in 2019 commit 7e6eabb, when Squid started replying using a 200 OK response with a hard-coded "mgr_index" text as a body, ignoring any configured MGR_INDEX template. |
Eduard Bagdasaryan <eduard.bagdasaryan@measurement-factory.com> | no | 2022-12-01 | ||
| edad3f150de8af0aeb2f629508be3219b83369b9.patch | [PATCH] ext_kerberos_ldap_group_acl: Support -b with -D (#1207) When both '-b' (i.e. bind DN) and '-D' (i.e. Kerberos domain) options are specified, '-b' is ignored completely. This breaks the helper when a search subtree has to be limited (e.g., when using FreeIPA). Fix it to take '-b' into account if it was specified with '-D'. |
Alexander Bokovoy <abokovoy@redhat.com> | no | 2022-12-10 | ||
| 0001-Default-configuration-file-for-debian.patch | Default configuration file for debian | Luigi Gangitano <luigi@debian.org> | no | 2016-10-29 | ||
| 0002-Change-default-file-locations-for-debian.patch | Change default file locations for debian | Luigi Gangitano <luigi@debian.org> | no | 2016-10-29 | ||
| 0003-installed-binary-for-debian-ci.patch | Use installed squid binary for Debian CI testing =================================================================== |
Amos Jeffries <amosjeffries@squid-cache.org> | no | 2018-07-21 | ||
| 0005-Use-RuntimeDirectory-to-create-run-squid.patch | Use RuntimeDirectory to create /run/squid Instead of installing the /run/squid directory, which goes against Debian Policy, we instruct systemd to automatically create it for us when the service is started. |
Sergio Durigan Junior <sergiodj@debian.org> | no | 2020-05-11 | ||
| CVE-2023-46724.patch | CVE-2023-46724 | Markus Koschany <apo@debian.org> | no | debian | http://www.squid-cache.org/Versions/v5/SQUID-2023_4.patch | 2024-02-19 |
| CVE-2023-46846.patch | CVE-2023-46846 | Markus Koschany <apo@debian.org> | no | debian | http://www.squid-cache.org/Versions/v5/SQUID-2023_1.patch | 2024-02-19 |
| CVE-2023-46847.patch | CVE-2023-46847 | Markus Koschany <apo@debian.org> | no | debian | http://www.squid-cache.org/Versions/v5/SQUID-2023_3.patch | 2024-02-19 |
| CVE-2024-37894.patch | [PATCH] Bug 5378: type mismatch in libTrie (#1830) TrieNode::add() incorrectly computed an offset of an internal data structure, resulting in out-of-bounds memory accesses that could cause corruption or crashes. This bug was discovered and detailed by Joshua Rogers at https://megamansec.github.io/Squid-Security-Audit/esi-underflow.html where it was filed as "Buffer Underflow in ESI". |
Francesco Chemolli <5175948+kinkie@users.noreply.github.com> | no | 2024-06-02 | ||
| CVE-2025-54574_CVE-2023-5824.patch | [PATCH] Bug 5318: peer_digest.cc:399: "fetch->pd && receivedData.data" (#1584) | Alex Rousskov <rousskov@measurement-factory.com> | no | 2023-11-20 | ||
| CVE-2025-62168.patch | [PATCH] Bug 3390: Proxy auth data visible to scripts (#2249) | Amos Jeffries <yadij@users.noreply.github.com> | no | 2025-10-11 | ||
| CVE-2023-46728.patch | Remove support for Gopher protocol (#1092) Gopher code quality remains too low for production use in most environments. The code is a persistent source of vulnerabilities and fixing it requires significant effort. We should not be spending scarce Project resources on improving that code, especially given the lack of strong demand for Gopher support. With this change, Gopher requests will be handled like any other request with an unknown (to Squid) protocol. For example, HTTP requests with Gopher URI scheme result in ERR_UNSUP_REQ. Default Squid configuration still considers TCP port 70 "safe". The corresponding Safe_ports ACL rule has not been removed for consistency WAIS requests: acl Safe_ports port 70 # gopher acl Safe_ports port 210 # wais |
Alex Rousskov <rousskov@measurement-factory.com> | yes | upstream | backport, https://github.com/squid-cache/squid/commit/6ea12e8fb590ac6959e9356a81aa3370576568c3 | 2022-07-26 |
| CVE-2025-59362.patch | Fix ASN.1 encoding of long SNMP OIDs (#2149) | Alex Rousskov <rousskov@measurement-factory.com> | yes | upstream | https://github.com/squid-cache/squid/commit/0d89165ee6da10e6fa50c44998b3cd16d59400e9 | 2025-08-30 |
All known versions for source package 'squid'
- 7.2-2 (forky, sid)
- 6.13-2+deb13u1 (trixie-security, trixie)
- 5.7-2+deb12u5 (bookworm-proposed-updates)
- 5.7-2+deb12u4 (bookworm-security)
- 5.7-2+deb12u3 (bookworm)
