Package: squid / 5.7-2+deb12u3
Metadata
| Package | Version | Patches format |
|---|---|---|
| squid | 5.7-2+deb12u3 | 3.0 (quilt) |
Patch series
view the series file| Patch | File delta | Description |
|---|---|---|
| 1f13f721263a4cc75e4b798a230022561047899c.patch | (download) |
src/errorpage.cc |
5 1 + 4 - 0 ! |
[patch] bug 5162: mgr:index url do not produce mgr_index template (#1191) Satisfy mgr:index requests using * a 200 OK response with a body derived from the MGR_INDEX template (if that template file was found during (re)configuration) or * a 404 (Not Found) error response (otherwise). Broken in 2019 commit 7e6eabb, when Squid started replying using a 200 OK response with a hard-coded "mgr_index" text as a body, ignoring any configured MGR_INDEX template. |
| edad3f150de8af0aeb2f629508be3219b83369b9.patch | (download) |
src/acl/external/kerberos_ldap_group/support_ldap.cc |
6 5 + 1 - 0 ! |
[patch] ext_kerberos_ldap_group_acl: support -b with -d (#1207) When both '-b' (i.e. bind DN) and '-D' (i.e. Kerberos domain) options are specified, '-b' is ignored completely. This breaks the helper when a search subtree has to be limited (e.g., when using FreeIPA). Fix it to take '-b' into account if it was specified with '-D'. |
| 0001 Default configuration file for debian.patch | (download) |
src/cf.data.pre |
7 5 + 2 - 0 ! |
default configuration file for debian |
| 0002 Change default file locations for debian.patch | (download) |
src/Common.am |
2 1 + 1 - 0 ! |
change default file locations for debian |
| 0003 installed binary for debian ci.patch | (download) |
test-suite/Makefile.am |
2 1 + 1 - 0 ! |
use installed squid binary for debian ci testing |
| 0005 Use RuntimeDirectory to create run squid.patch | (download) |
tools/systemd/squid.service |
5 4 + 1 - 0 ! |
use runtimedirectory to create /run/squid Instead of installing the /run/squid directory, which goes against Debian Policy, we instruct systemd to automatically create it for us when the service is started. |
| CVE 2023 46724.patch | (download) |
src/anyp/Uri.cc |
6 6 + 0 - 0 ! |
cve-2023-46724 Bug-Debian: https://bugs.debian.org/1055252 |
| CVE 2023 46846.patch | (download) |
src/http/one/Parser.cc |
8 1 + 7 - 0 ! |
cve-2023-46846 Bug-Debian: https://bugs.debian.org/1054537 |
| CVE 2023 46847.patch | (download) |
src/auth/digest/Config.cc |
10 7 + 3 - 0 ! |
cve-2023-46847 Bug-Debian: https://bugs.debian.org/1055250 |
| CVE 2023 46848.patch | (download) |
src/acl/external/eDirectory_userip/ext_edirectory_userip_acl.cc |
2 1 + 1 - 0 ! |
cve-2023-46848 Bug-Debian: https://bugs.debian.org/1055251 |
| CVE 2023 49285.patch | (download) |
lib/rfc1123.c |
6 6 + 0 - 0 ! |
cve-2023-49285 |
| CVE 2023 49286.patch | (download) |
src/ipc.cc |
33 27 + 6 - 0 ! |
cve-2023-49286 |
| CVE 2023 50269.patch | (download) |
src/ClientRequestContext.h |
4 4 + 0 - 0 ! |
cve-2023-50269 Bug-Debian: https://bugs.debian.org/1058721 |
| CVE 2024 23638.patch | (download) |
src/cache_manager.cc |
1 0 + 1 - 0 ! |
cve-2024-23638 |
| CVE 2024 25111.patch | (download) |
src/SquidMath.h |
175 171 + 4 - 0 ! |
cve-2024-25111 |
| CVE 2024 25617.patch | (download) |
src/SquidString.h |
11 10 + 1 - 0 ! |
cve-2024-25617 |
| CVE 2024 37894.patch | (download) |
lib/libTrie/TrieNode.cc |
2 1 + 1 - 0 ! |
[patch] bug 5378: type mismatch in libtrie (#1830) TrieNode::add() incorrectly computed an offset of an internal data structure, resulting in out-of-bounds memory accesses that could cause corruption or crashes. This bug was discovered and detailed by Joshua Rogers at https://megamansec.github.io/Squid-Security-Audit/esi-underflow.html where it was filed as "Buffer Underflow in ESI". |
| CVE 2025 54574_CVE 2023 5824.patch | (download) |
src/HttpReply.cc |
34 34 + 0 - 0 ! |
[patch] bug 5318: peer_digest.cc:399: "fetch->pd && receivedData.data" (#1584) |
