ALT-PU-2016-2277-1
Closed vulnerabilities
BDU:2015-11546
Уязвимость прокси-сервера Squid, позволяющая нарушителю обойти существующие ограничения и получить доступ к серверу
BDU:2016-00731
Уязвимость прокси-сервера Squid, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2016-00732
Уязвимость прокси-сервера Squid, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2016-00733
Уязвимость прокси-сервера Squid, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2016-01050
Уязвимость прокси-сервера Squid, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-04-12
CVE-2015-3455
Squid 3.2.x before 3.2.14, 3.3.x before 3.3.14, 3.4.x before 3.4.13, and 3.5.x before 3.5.4, when configured with client-first SSL-bump, do not properly validate the domain or hostname fields of X.509 certificates, which allows man-in-the-middle attackers to spoof SSL servers via a valid certificate.
- http://advisories.mageia.org/MGASA-2015-0191.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183598.html
- http://lists.opensuse.org/opensuse-updates/2015-09/msg00016.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html
- http://rhn.redhat.com/errata/RHSA-2015-2378.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:230
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/74438
- http://www.securitytracker.com/id/1032221
- http://www.squid-cache.org/Advisories/SQUID-2015_1.txt
- http://advisories.mageia.org/MGASA-2015-0191.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183598.html
- http://lists.opensuse.org/opensuse-updates/2015-09/msg00016.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html
- http://rhn.redhat.com/errata/RHSA-2015-2378.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:230
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/74438
- http://www.securitytracker.com/id/1032221
- http://www.squid-cache.org/Advisories/SQUID-2015_1.txt
Modified: 2025-04-12
CVE-2015-5400
Squid before 3.5.6 does not properly handle CONNECT method peer responses when configured with cache_peer, which allows remote attackers to bypass intended restrictions and gain access to a backend proxy via a CONNECT request.
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183598.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html
- http://www.debian.org/security/2015/dsa-3327
- http://www.openwall.com/lists/oss-security/2015/07/06/8
- http://www.openwall.com/lists/oss-security/2015/07/09/12
- http://www.openwall.com/lists/oss-security/2015/07/10/2
- http://www.openwall.com/lists/oss-security/2015/07/17/14
- http://www.securityfocus.com/bid/75553
- http://www.securitytracker.com/id/1032873
- http://www.squid-cache.org/Advisories/SQUID-2015_2.txt
- http://www.squid-cache.org/Versions/v3/3.1/changesets/squid-3.1-10494.patch
- http://www.squid-cache.org/Versions/v3/3.4/changesets/squid-3.4-13225.patch
- http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-13856.patch
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183598.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html
- http://www.debian.org/security/2015/dsa-3327
- http://www.openwall.com/lists/oss-security/2015/07/06/8
- http://www.openwall.com/lists/oss-security/2015/07/09/12
- http://www.openwall.com/lists/oss-security/2015/07/10/2
- http://www.openwall.com/lists/oss-security/2015/07/17/14
- http://www.securityfocus.com/bid/75553
- http://www.securitytracker.com/id/1032873
- http://www.squid-cache.org/Advisories/SQUID-2015_2.txt
- http://www.squid-cache.org/Versions/v3/3.1/changesets/squid-3.1-10494.patch
- http://www.squid-cache.org/Versions/v3/3.4/changesets/squid-3.4-13225.patch
- http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-13856.patch
Modified: 2025-04-12
CVE-2016-2390
The FwdState::connectedToPeer method in FwdState.cc in Squid before 3.5.14 and 4.0.x before 4.0.6 does not properly handle SSL handshake errors when built with the --with-openssl option, which allows remote attackers to cause a denial of service (application crash) via a plaintext HTTP message.
- http://bugs.squid-cache.org/show_bug.cgi?id=4437
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html
- http://lists.squid-cache.org/pipermail/squid-announce/2016-February/000037.html
- http://lists.squid-cache.org/pipermail/squid-announce/2016-February/000038.html
- http://www.securitytracker.com/id/1035045
- http://www.squid-cache.org/Advisories/SQUID-2016_1.txt
- http://bugs.squid-cache.org/show_bug.cgi?id=4437
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html
- http://lists.squid-cache.org/pipermail/squid-announce/2016-February/000037.html
- http://lists.squid-cache.org/pipermail/squid-announce/2016-February/000038.html
- http://www.securitytracker.com/id/1035045
- http://www.squid-cache.org/Advisories/SQUID-2016_1.txt
Modified: 2025-04-12
CVE-2016-2569
Squid 3.x before 3.5.15 and 4.x before 4.0.7 does not properly append data to String objects, which allows remote servers to cause a denial of service (assertion failure and daemon exit) via a long string, as demonstrated by a crafted HTTP Vary header.
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html
- http://rhn.redhat.com/errata/RHSA-2016-2600.html
- http://www.openwall.com/lists/oss-security/2016/02/26/2
- http://www.securitytracker.com/id/1035101
- http://www.squid-cache.org/Advisories/SQUID-2016_2.txt
- http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-13991.patch
- http://www.squid-cache.org/Versions/v4/changesets/squid-4-14552.patch
- https://security.gentoo.org/glsa/201607-01
- https://usn.ubuntu.com/3557-1/
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html
- http://rhn.redhat.com/errata/RHSA-2016-2600.html
- http://www.openwall.com/lists/oss-security/2016/02/26/2
- http://www.securitytracker.com/id/1035101
- http://www.squid-cache.org/Advisories/SQUID-2016_2.txt
- http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-13991.patch
- http://www.squid-cache.org/Versions/v4/changesets/squid-4-14552.patch
- https://security.gentoo.org/glsa/201607-01
- https://usn.ubuntu.com/3557-1/
Modified: 2025-04-12
CVE-2016-2570
The Edge Side Includes (ESI) parser in Squid 3.x before 3.5.15 and 4.x before 4.0.7 does not check buffer limits during XML parsing, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a crafted XML document, related to esi/CustomParser.cc and esi/CustomParser.h.
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html
- http://rhn.redhat.com/errata/RHSA-2016-2600.html
- http://www.openwall.com/lists/oss-security/2016/02/26/2
- http://www.securitytracker.com/id/1035101
- http://www.squid-cache.org/Advisories/SQUID-2016_2.txt
- http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-13993.patch
- http://www.squid-cache.org/Versions/v4/changesets/squid-4-14549.patch
- https://security.gentoo.org/glsa/201607-01
- https://usn.ubuntu.com/3557-1/
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html
- http://rhn.redhat.com/errata/RHSA-2016-2600.html
- http://www.openwall.com/lists/oss-security/2016/02/26/2
- http://www.securitytracker.com/id/1035101
- http://www.squid-cache.org/Advisories/SQUID-2016_2.txt
- http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-13993.patch
- http://www.squid-cache.org/Versions/v4/changesets/squid-4-14549.patch
- https://security.gentoo.org/glsa/201607-01
- https://usn.ubuntu.com/3557-1/
Modified: 2025-04-12
CVE-2016-2571
http.cc in Squid 3.x before 3.5.15 and 4.x before 4.0.7 proceeds with the storage of certain data after a response-parsing failure, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a malformed response.
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html
- http://rhn.redhat.com/errata/RHSA-2016-2600.html
- http://www.debian.org/security/2016/dsa-3522
- http://www.openwall.com/lists/oss-security/2016/02/26/2
- http://www.securitytracker.com/id/1035101
- http://www.squid-cache.org/Advisories/SQUID-2016_2.txt
- http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-13990.patch
- http://www.squid-cache.org/Versions/v4/changesets/squid-4-14548.patch
- http://www.ubuntu.com/usn/USN-2921-1
- https://security.gentoo.org/glsa/201607-01
- https://usn.ubuntu.com/3557-1/
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html
- http://rhn.redhat.com/errata/RHSA-2016-2600.html
- http://www.debian.org/security/2016/dsa-3522
- http://www.openwall.com/lists/oss-security/2016/02/26/2
- http://www.securitytracker.com/id/1035101
- http://www.squid-cache.org/Advisories/SQUID-2016_2.txt
- http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-13990.patch
- http://www.squid-cache.org/Versions/v4/changesets/squid-4-14548.patch
- http://www.ubuntu.com/usn/USN-2921-1
- https://security.gentoo.org/glsa/201607-01
- https://usn.ubuntu.com/3557-1/
Modified: 2025-04-12
CVE-2016-3947
Heap-based buffer overflow in the Icmp6::Recv function in icmp/Icmp6.cc in the pinger utility in Squid before 3.5.16 and 4.x before 4.0.8 allows remote servers to cause a denial of service (performance degradation or transition failures) or write sensitive information to log files via an ICMPv6 packet.
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html
- http://www.securitytracker.com/id/1035457
- http://www.squid-cache.org/Advisories/SQUID-2016_3.txt
- http://www.squid-cache.org/Versions/v3/3.1/changesets/squid-3.1-10495.patch
- http://www.squid-cache.org/Versions/v3/3.2/changesets/squid-3.2-11839.patch
- http://www.squid-cache.org/Versions/v3/3.3/changesets/squid-3.3-12694.patch
- http://www.squid-cache.org/Versions/v3/3.4/changesets/squid-3.4-13232.patch
- http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-14015.patch
- http://www.ubuntu.com/usn/USN-2995-1
- https://security.gentoo.org/glsa/201607-01
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html
- http://www.securitytracker.com/id/1035457
- http://www.squid-cache.org/Advisories/SQUID-2016_3.txt
- http://www.squid-cache.org/Versions/v3/3.1/changesets/squid-3.1-10495.patch
- http://www.squid-cache.org/Versions/v3/3.2/changesets/squid-3.2-11839.patch
- http://www.squid-cache.org/Versions/v3/3.3/changesets/squid-3.3-12694.patch
- http://www.squid-cache.org/Versions/v3/3.4/changesets/squid-3.4-13232.patch
- http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-14015.patch
- http://www.ubuntu.com/usn/USN-2995-1
- https://security.gentoo.org/glsa/201607-01
Modified: 2025-04-12
CVE-2016-3948
Squid 3.x before 3.5.16 and 4.x before 4.0.8 improperly perform bounds checking, which allows remote attackers to cause a denial of service via a crafted HTTP response, related to Vary headers.
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html
- http://rhn.redhat.com/errata/RHSA-2016-2600.html
- http://www.securitytracker.com/id/1035458
- http://www.squid-cache.org/Advisories/SQUID-2016_4.txt
- http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-14016.patch
- https://security.gentoo.org/glsa/201607-01
- https://usn.ubuntu.com/3557-1/
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html
- http://rhn.redhat.com/errata/RHSA-2016-2600.html
- http://www.securitytracker.com/id/1035458
- http://www.squid-cache.org/Advisories/SQUID-2016_4.txt
- http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-14016.patch
- https://security.gentoo.org/glsa/201607-01
- https://usn.ubuntu.com/3557-1/
Modified: 2025-04-12
CVE-2016-4051
Buffer overflow in cachemgr.cgi in Squid 2.x, 3.x before 3.5.17, and 4.x before 4.0.9 might allow remote attackers to cause a denial of service or execute arbitrary code by seeding manager reports with crafted data.
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html
- http://www.debian.org/security/2016/dsa-3625
- http://www.openwall.com/lists/oss-security/2016/04/20/6
- http://www.openwall.com/lists/oss-security/2016/04/20/9
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.securityfocus.com/bid/86788
- http://www.securityfocus.com/bid/91787
- http://www.securitytracker.com/id/1035646
- http://www.squid-cache.org/Advisories/SQUID-2016_5.txt
- http://www.ubuntu.com/usn/USN-2995-1
- https://access.redhat.com/errata/RHSA-2016:1138
- https://access.redhat.com/errata/RHSA-2016:1139
- https://access.redhat.com/errata/RHSA-2016:1140
- https://security.gentoo.org/glsa/201607-01
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html
- http://www.debian.org/security/2016/dsa-3625
- http://www.openwall.com/lists/oss-security/2016/04/20/6
- http://www.openwall.com/lists/oss-security/2016/04/20/9
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.securityfocus.com/bid/86788
- http://www.securityfocus.com/bid/91787
- http://www.securitytracker.com/id/1035646
- http://www.squid-cache.org/Advisories/SQUID-2016_5.txt
- http://www.ubuntu.com/usn/USN-2995-1
- https://access.redhat.com/errata/RHSA-2016:1138
- https://access.redhat.com/errata/RHSA-2016:1139
- https://access.redhat.com/errata/RHSA-2016:1140
- https://security.gentoo.org/glsa/201607-01
Modified: 2025-04-12
CVE-2016-4052
Multiple stack-based buffer overflows in Squid 3.x before 3.5.17 and 4.x before 4.0.9 allow remote HTTP servers to cause a denial of service or execute arbitrary code via crafted Edge Side Includes (ESI) responses.
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html
- http://www.debian.org/security/2016/dsa-3625
- http://www.openwall.com/lists/oss-security/2016/04/20/6
- http://www.openwall.com/lists/oss-security/2016/04/20/9
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.securityfocus.com/bid/86788
- http://www.securityfocus.com/bid/91787
- http://www.securitytracker.com/id/1035647
- http://www.squid-cache.org/Advisories/SQUID-2016_6.txt
- http://www.ubuntu.com/usn/USN-2995-1
- https://access.redhat.com/errata/RHSA-2016:1138
- https://access.redhat.com/errata/RHSA-2016:1139
- https://access.redhat.com/errata/RHSA-2016:1140
- https://security.gentoo.org/glsa/201607-01
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html
- http://www.debian.org/security/2016/dsa-3625
- http://www.openwall.com/lists/oss-security/2016/04/20/6
- http://www.openwall.com/lists/oss-security/2016/04/20/9
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.securityfocus.com/bid/86788
- http://www.securityfocus.com/bid/91787
- http://www.securitytracker.com/id/1035647
- http://www.squid-cache.org/Advisories/SQUID-2016_6.txt
- http://www.ubuntu.com/usn/USN-2995-1
- https://access.redhat.com/errata/RHSA-2016:1138
- https://access.redhat.com/errata/RHSA-2016:1139
- https://access.redhat.com/errata/RHSA-2016:1140
- https://security.gentoo.org/glsa/201607-01
Modified: 2025-04-12
CVE-2016-4053
Squid 3.x before 3.5.17 and 4.x before 4.0.9 allow remote attackers to obtain sensitive stack layout information via crafted Edge Side Includes (ESI) responses, related to incorrect use of assert and compiler optimization.
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html
- http://www.debian.org/security/2016/dsa-3625
- http://www.openwall.com/lists/oss-security/2016/04/20/6
- http://www.openwall.com/lists/oss-security/2016/04/20/9
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.securityfocus.com/bid/86788
- http://www.securityfocus.com/bid/91787
- http://www.securitytracker.com/id/1035647
- http://www.squid-cache.org/Advisories/SQUID-2016_6.txt
- http://www.ubuntu.com/usn/USN-2995-1
- https://access.redhat.com/errata/RHSA-2016:1138
- https://access.redhat.com/errata/RHSA-2016:1139
- https://access.redhat.com/errata/RHSA-2016:1140
- https://security.gentoo.org/glsa/201607-01
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html
- http://www.debian.org/security/2016/dsa-3625
- http://www.openwall.com/lists/oss-security/2016/04/20/6
- http://www.openwall.com/lists/oss-security/2016/04/20/9
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.securityfocus.com/bid/86788
- http://www.securityfocus.com/bid/91787
- http://www.securitytracker.com/id/1035647
- http://www.squid-cache.org/Advisories/SQUID-2016_6.txt
- http://www.ubuntu.com/usn/USN-2995-1
- https://access.redhat.com/errata/RHSA-2016:1138
- https://access.redhat.com/errata/RHSA-2016:1139
- https://access.redhat.com/errata/RHSA-2016:1140
- https://security.gentoo.org/glsa/201607-01
Modified: 2025-04-12
CVE-2016-4054
Buffer overflow in Squid 3.x before 3.5.17 and 4.x before 4.0.9 allows remote attackers to execute arbitrary code via crafted Edge Side Includes (ESI) responses.
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html
- http://www.debian.org/security/2016/dsa-3625
- http://www.openwall.com/lists/oss-security/2016/04/20/6
- http://www.openwall.com/lists/oss-security/2016/04/20/9
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.securityfocus.com/bid/86788
- http://www.securitytracker.com/id/1035647
- http://www.squid-cache.org/Advisories/SQUID-2016_6.txt
- http://www.ubuntu.com/usn/USN-2995-1
- https://access.redhat.com/errata/RHSA-2016:1138
- https://access.redhat.com/errata/RHSA-2016:1139
- https://access.redhat.com/errata/RHSA-2016:1140
- https://security.gentoo.org/glsa/201607-01
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html
- http://www.debian.org/security/2016/dsa-3625
- http://www.openwall.com/lists/oss-security/2016/04/20/6
- http://www.openwall.com/lists/oss-security/2016/04/20/9
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.securityfocus.com/bid/86788
- http://www.securitytracker.com/id/1035647
- http://www.squid-cache.org/Advisories/SQUID-2016_6.txt
- http://www.ubuntu.com/usn/USN-2995-1
- https://access.redhat.com/errata/RHSA-2016:1138
- https://access.redhat.com/errata/RHSA-2016:1139
- https://access.redhat.com/errata/RHSA-2016:1140
- https://security.gentoo.org/glsa/201607-01
Modified: 2025-04-12
CVE-2016-4553
client_side.cc in Squid before 3.5.18 and 4.x before 4.0.10 does not properly ignore the Host header when absolute-URI is provided, which allows remote attackers to conduct cache-poisoning attacks via an HTTP request.
- http://bugs.squid-cache.org/show_bug.cgi?id=4501
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html
- http://www.debian.org/security/2016/dsa-3625
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.securitytracker.com/id/1035768
- http://www.squid-cache.org/Advisories/SQUID-2016_7.txt
- http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-14039.patch
- http://www.ubuntu.com/usn/USN-2995-1
- https://access.redhat.com/errata/RHSA-2016:1139
- https://access.redhat.com/errata/RHSA-2016:1140
- https://security.gentoo.org/glsa/201607-01
- http://bugs.squid-cache.org/show_bug.cgi?id=4501
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html
- http://www.debian.org/security/2016/dsa-3625
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.securitytracker.com/id/1035768
- http://www.squid-cache.org/Advisories/SQUID-2016_7.txt
- http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-14039.patch
- http://www.ubuntu.com/usn/USN-2995-1
- https://access.redhat.com/errata/RHSA-2016:1139
- https://access.redhat.com/errata/RHSA-2016:1140
- https://security.gentoo.org/glsa/201607-01
Modified: 2025-04-12
CVE-2016-4554
mime_header.cc in Squid before 3.5.18 allows remote attackers to bypass intended same-origin restrictions and possibly conduct cache-poisoning attacks via a crafted HTTP Host header, aka a "header smuggling" issue.
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html
- http://www.debian.org/security/2016/dsa-3625
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.securitytracker.com/id/1035769
- http://www.squid-cache.org/Advisories/SQUID-2016_8.txt
- http://www.squid-cache.org/Versions/v3/3.1/changesets/SQUID-2016_8.patch
- http://www.squid-cache.org/Versions/v3/3.2/changesets/SQUID-2016_8.patch
- http://www.squid-cache.org/Versions/v3/3.3/changesets/SQUID-2016_8.patch
- http://www.squid-cache.org/Versions/v3/3.4/changesets/SQUID-2016_8.patch
- http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2016_8.patch
- http://www.ubuntu.com/usn/USN-2995-1
- https://access.redhat.com/errata/RHSA-2016:1138
- https://access.redhat.com/errata/RHSA-2016:1139
- https://access.redhat.com/errata/RHSA-2016:1140
- https://security.gentoo.org/glsa/201607-01
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html
- http://www.debian.org/security/2016/dsa-3625
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.securitytracker.com/id/1035769
- http://www.squid-cache.org/Advisories/SQUID-2016_8.txt
- http://www.squid-cache.org/Versions/v3/3.1/changesets/SQUID-2016_8.patch
- http://www.squid-cache.org/Versions/v3/3.2/changesets/SQUID-2016_8.patch
- http://www.squid-cache.org/Versions/v3/3.3/changesets/SQUID-2016_8.patch
- http://www.squid-cache.org/Versions/v3/3.4/changesets/SQUID-2016_8.patch
- http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2016_8.patch
- http://www.ubuntu.com/usn/USN-2995-1
- https://access.redhat.com/errata/RHSA-2016:1138
- https://access.redhat.com/errata/RHSA-2016:1139
- https://access.redhat.com/errata/RHSA-2016:1140
- https://security.gentoo.org/glsa/201607-01
Modified: 2025-04-12
CVE-2016-4555
client_side_request.cc in Squid 3.x before 3.5.18 and 4.x before 4.0.10 allows remote servers to cause a denial of service (crash) via crafted Edge Side Includes (ESI) responses.
- http://bugs.squid-cache.org/show_bug.cgi?id=4455
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html
- http://www.debian.org/security/2016/dsa-3625
- http://www.openwall.com/lists/oss-security/2016/05/06/3
- http://www.openwall.com/lists/oss-security/2016/05/06/5
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.securitytracker.com/id/1035770
- http://www.squid-cache.org/Advisories/SQUID-2016_9.txt
- http://www.squid-cache.org/Versions/v3/3.4/changesets/SQUID-2016_9.patch
- http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2016_9.patch
- http://www.ubuntu.com/usn/USN-2995-1
- https://access.redhat.com/errata/RHSA-2016:1139
- https://access.redhat.com/errata/RHSA-2016:1140
- https://security.gentoo.org/glsa/201607-01
- http://bugs.squid-cache.org/show_bug.cgi?id=4455
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html
- http://www.debian.org/security/2016/dsa-3625
- http://www.openwall.com/lists/oss-security/2016/05/06/3
- http://www.openwall.com/lists/oss-security/2016/05/06/5
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.securitytracker.com/id/1035770
- http://www.squid-cache.org/Advisories/SQUID-2016_9.txt
- http://www.squid-cache.org/Versions/v3/3.4/changesets/SQUID-2016_9.patch
- http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2016_9.patch
- http://www.ubuntu.com/usn/USN-2995-1
- https://access.redhat.com/errata/RHSA-2016:1139
- https://access.redhat.com/errata/RHSA-2016:1140
- https://security.gentoo.org/glsa/201607-01
Modified: 2025-04-12
CVE-2016-4556
Double free vulnerability in Esi.cc in Squid 3.x before 3.5.18 and 4.x before 4.0.10 allows remote servers to cause a denial of service (crash) via a crafted Edge Side Includes (ESI) response.
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html
- http://www.debian.org/security/2016/dsa-3625
- http://www.openwall.com/lists/oss-security/2016/05/06/3
- http://www.openwall.com/lists/oss-security/2016/05/06/5
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.securitytracker.com/id/1035770
- http://www.squid-cache.org/Advisories/SQUID-2016_9.txt
- http://www.squid-cache.org/Versions/v3/3.4/changesets/SQUID-2016_9.patch
- http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2016_9.patch
- http://www.ubuntu.com/usn/USN-2995-1
- https://access.redhat.com/errata/RHSA-2016:1138
- https://access.redhat.com/errata/RHSA-2016:1139
- https://access.redhat.com/errata/RHSA-2016:1140
- https://security.gentoo.org/glsa/201607-01
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html
- http://www.debian.org/security/2016/dsa-3625
- http://www.openwall.com/lists/oss-security/2016/05/06/3
- http://www.openwall.com/lists/oss-security/2016/05/06/5
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.securitytracker.com/id/1035770
- http://www.squid-cache.org/Advisories/SQUID-2016_9.txt
- http://www.squid-cache.org/Versions/v3/3.4/changesets/SQUID-2016_9.patch
- http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2016_9.patch
- http://www.ubuntu.com/usn/USN-2995-1
- https://access.redhat.com/errata/RHSA-2016:1138
- https://access.redhat.com/errata/RHSA-2016:1139
- https://access.redhat.com/errata/RHSA-2016:1140
- https://security.gentoo.org/glsa/201607-01
Closed bugs
Обновиться до ветки 3.4
FR: собрать с опцией --with-filedescriptors=65536
Ошибка при обновлении