DescriptionIncorrect HTTP Request header comparison in Squid HTTP Proxy through 3.5.22, and 4.0.1 through 4.0.16 results in Collapsed Forwarding feature mistakenly identifying some private responses as being suitable for delivery to multiple clients.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs848491

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
squid3 (PTS)jessie, jessie (lts)3.5.23-5+deb8u7fixed
stretch (security)3.5.23-5+deb9u7fixed
stretch (lts), stretch3.5.23-5+deb9u10fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
squid3sourcewheezy(not affected)
squid3sourcejessie(not affected)


[jessie] - squid3 <not-affected> (Does not affect Squid versions before
[wheezy] - squid3 <not-affected> (Does not affect Squid versions before
Marked as not-affected, vulnerable vulnerability not present due to
the collapsed_forwarding directive beeing added in only (for squid-3.5 excluding 3.5.22) (for squid 3.5.22 only)
Vulnerable Squid Versions: up to and including 3.5.22
4.0.1 up to and including 4.0.16

Search for package or bug name: Reporting problems