Debian Patches

Status for squid/5.7-2+deb12u5

Patch Description Author Forwarded Bugs Origin Last update
CVE-2023-46848.patch CVE-2023-46848 Markus Koschany <apo@debian.org> no debian http://www.squid-cache.org/Versions/v5/SQUID-2023_5.patch 2024-02-19
CVE-2023-49285.patch CVE-2023-49285 Markus Koschany <apo@debian.org> no http://www.squid-cache.org/Versions/v5/SQUID-2023_7.patch 2024-02-19
CVE-2023-49286.patch CVE-2023-49286 Markus Koschany <apo@debian.org> no http://www.squid-cache.org/Versions/v6/SQUID-2023_8.patch 2024-02-19
CVE-2023-50269.patch CVE-2023-50269 Markus Koschany <apo@debian.org> no debian http://www.squid-cache.org/Versions/v5/SQUID-2023_10.patch 2024-02-19
CVE-2024-23638.patch CVE-2024-23638 Markus Koschany <apo@debian.org> no http://www.squid-cache.org/Versions/v5/SQUID-2023_11.patch 2024-02-19
CVE-2024-25111.patch CVE-2024-25111 Markus Koschany <apo@debian.org> no http://www.squid-cache.org/Versions/v6/SQUID-2024_1.patch 2024-03-05
CVE-2024-25617.patch CVE-2024-25617 Markus Koschany <apo@debian.org> no http://www.squid-cache.org/Versions/v6/SQUID-2024_2.patch 2024-03-05
1f13f721263a4cc75e4b798a230022561047899c.patch [PATCH] Bug 5162: mgr:index URL do not produce MGR_INDEX template (#1191)

Satisfy mgr:index requests using

* a 200 OK response with a body derived from the MGR_INDEX template (if
that template file was found during (re)configuration) or
* a 404 (Not Found) error response (otherwise).

Broken in 2019 commit 7e6eabb, when Squid started replying using a 200
OK response with a hard-coded "mgr_index" text as a body, ignoring any
configured MGR_INDEX template.
Eduard Bagdasaryan <eduard.bagdasaryan@measurement-factory.com> no 2022-12-01
edad3f150de8af0aeb2f629508be3219b83369b9.patch [PATCH] ext_kerberos_ldap_group_acl: Support -b with -D (#1207)
When both '-b' (i.e. bind DN) and '-D' (i.e. Kerberos domain) options
are specified, '-b' is ignored completely. This breaks the helper when a
search subtree has to be limited (e.g., when using FreeIPA).

Fix it to take '-b' into account if it was specified with '-D'.
Alexander Bokovoy <abokovoy@redhat.com> no 2022-12-10
0001-Default-configuration-file-for-debian.patch Default configuration file for debian Luigi Gangitano <luigi@debian.org> no 2016-10-29
0002-Change-default-file-locations-for-debian.patch Change default file locations for debian Luigi Gangitano <luigi@debian.org> no 2016-10-29
0003-installed-binary-for-debian-ci.patch Use installed squid binary for Debian CI testing
===================================================================
Amos Jeffries <amosjeffries@squid-cache.org> no 2018-07-21
0005-Use-RuntimeDirectory-to-create-run-squid.patch Use RuntimeDirectory to create /run/squid
Instead of installing the /run/squid directory, which goes against
Debian Policy, we instruct systemd to automatically create it for us
when the service is started.
Sergio Durigan Junior <sergiodj@debian.org> no 2020-05-11
CVE-2023-46724.patch CVE-2023-46724 Markus Koschany <apo@debian.org> no debian http://www.squid-cache.org/Versions/v5/SQUID-2023_4.patch 2024-02-19
CVE-2023-46846.patch CVE-2023-46846 Markus Koschany <apo@debian.org> no debian http://www.squid-cache.org/Versions/v5/SQUID-2023_1.patch 2024-02-19
CVE-2023-46847.patch CVE-2023-46847 Markus Koschany <apo@debian.org> no debian http://www.squid-cache.org/Versions/v5/SQUID-2023_3.patch 2024-02-19
CVE-2024-37894.patch [PATCH] Bug 5378: type mismatch in libTrie (#1830)
TrieNode::add() incorrectly computed an offset of an internal data
structure, resulting in out-of-bounds memory accesses that could cause
corruption or crashes.

This bug was discovered and detailed by Joshua Rogers at
https://megamansec.github.io/Squid-Security-Audit/esi-underflow.html
where it was filed as "Buffer Underflow in ESI".
Francesco Chemolli <5175948+kinkie@users.noreply.github.com> no 2024-06-02
CVE-2025-54574_CVE-2023-5824.patch [PATCH] Bug 5318: peer_digest.cc:399: "fetch->pd && receivedData.data" (#1584) Alex Rousskov <rousskov@measurement-factory.com> no 2023-11-20
CVE-2025-62168.patch [PATCH] Bug 3390: Proxy auth data visible to scripts (#2249) Amos Jeffries <yadij@users.noreply.github.com> no 2025-10-11
CVE-2023-46728.patch Remove support for Gopher protocol (#1092)
Gopher code quality remains too low for production use in most
environments. The code is a persistent source of vulnerabilities and
fixing it requires significant effort. We should not be spending scarce
Project resources on improving that code, especially given the lack of
strong demand for Gopher support.

With this change, Gopher requests will be handled like any other request
with an unknown (to Squid) protocol. For example, HTTP requests with
Gopher URI scheme result in ERR_UNSUP_REQ.

Default Squid configuration still considers TCP port 70 "safe". The
corresponding Safe_ports ACL rule has not been removed for consistency
WAIS requests:

acl Safe_ports port 70 # gopher
acl Safe_ports port 210 # wais
Alex Rousskov <rousskov@measurement-factory.com> yes upstream backport, https://github.com/squid-cache/squid/commit/6ea12e8fb590ac6959e9356a81aa3370576568c3 2022-07-26
CVE-2025-59362.patch Fix ASN.1 encoding of long SNMP OIDs (#2149) Alex Rousskov <rousskov@measurement-factory.com> yes upstream https://github.com/squid-cache/squid/commit/0d89165ee6da10e6fa50c44998b3cd16d59400e9 2025-08-30

All known versions for source package 'squid'

Links