squid3_3.5.12-1ubuntu7.6_all.deb


Advertisement

Description

squid3 - Dummy transitional package

Property Value
Distribution Ubuntu 16.04 LTS (Xenial Xerus)
Repository Ubuntu Updates Main i386
Package name squid3
Package version 3.5.12
Package release 1ubuntu7.6
Package architecture all
Package type deb
Installed size 161 B
Download size 31.79 KB
Official Mirror archive.ubuntu.com
Squid is a high-performance proxy caching server for web clients, supporting
FTP, gopher, ICY and HTTP data objects.
Squid version 3 is a major rewrite of Squid in C++ and introduces a number of
new features including ICAP and ESI support.
This is a dummy transitional package used to migrate from squid3 to squid.

Alternatives

Package Version Architecture Repository
squid3_3.5.12-1ubuntu7.6_all.deb 3.5.12 all Ubuntu Updates Main
squid3_3.5.12-1ubuntu7_all.deb 3.5.12 all Ubuntu Main
squid3_3.5.12-1ubuntu7_all.deb 3.5.12 all Ubuntu Main
squid3 - - -

Requires

Name Value
squid >= 3.5.12-1ubuntu7.6

Download

Type URL
Binary Package squid3_3.5.12-1ubuntu7.6_all.deb
Source Package squid3

Install Howto

  1. Update the package index:
    # sudo apt-get update
  2. Install squid3 deb package:
    # sudo apt-get install squid3

Files

Path
/usr/share/doc/squid3/CONTRIBUTORS.gz
/usr/share/doc/squid3/CREDITS.gz
/usr/share/doc/squid3/README
/usr/share/doc/squid3/README.Debian
/usr/share/doc/squid3/changelog.Debian.gz
/usr/share/doc/squid3/copyright

Changelog

2018-10-31 - Andreas Hasenack <andreas@canonical.com>
squid3 (3.5.12-1ubuntu7.6) xenial; urgency=medium
* d/squid.rc: fix regexp for catching FATAL errors (LP: #1738412)
* d/t/test-squid.py: in xenial,  initscript, apparmor profile, pidfile and
process are named squid, not squid3. Get rid of the multiple distro
logic since these tests will be only run on xenial.
* d/t/control: drop uneeded dependency on python-unit.
* d/t/squid: use a shorter shutdown timeout for the tests, so they
run faster
2018-02-01 - Marc Deslauriers <marc.deslauriers@ubuntu.com>
squid3 (3.5.12-1ubuntu7.5) xenial-security; urgency=medium
* SECURITY UPDATE: various denial of service issues
- debian/patches/CVE-2016-25xx-1.patch: better handling of huge
response headers in src/http.cc.
- debian/patches/CVE-2016-25xx-2.patch: throw instead of asserting on
some String overflows in src/SquidString.h, src/StrList.cc,
src/String.cc, src/clients/Client.cc, src/clients/Client.h,
src/clients/FtpClient.cc, src/http.cc.
- debian/patches/CVE-2016-25xx-3.patch: fix assertion in custom ESI
parser in src/esi/CustomParser.cc, src/esi/CustomParser.h.
- debian/patches/CVE-2016-25xx-4.patch: fix assertion in
src/FwdState.cc, src/FwdState.h, src/clients/Client.h, src/comm.cc,
src/comm.h, src/http.cc.
- CVE-2016-2569
- CVE-2016-2570
- CVE-2016-2571
* SECURITY UPDATE: denial of service via crafted HTTP response
- debian/patches/CVE-2016-3948.patch: convert Vary handling to SBuf in
src/HttpRequest.cc, src/HttpRequest.h, src/MemObject.cc,
src/MemObject.h, src/MemStore.cc, src/StoreMetaVary.cc,
src/client_side.cc, src/client_side_reply.cc, src/http.cc,
src/http.h, src/store.cc, src/store_key_md5.cc,
src/store_swapmeta.cc, src/tests/stub_MemObject.cc,
src/tests/stub_http.cc.
- CVE-2016-3948
* SECURITY UPDATE: denial of service in ESI Response processing
- debian/patches/CVE-2018-1000024.patch: make sure endofName never
exceeds tagEnd in src/esi/CustomParser.cc.
- CVE-2018-1000024
* SECURITY UPDATE: denial of service in in HTTP Message processing
- debian/patches/CVE-2018-1000027.patch: fix indirect IP logging for
transactions without a client connection in
src/client_side_request.cc.
- CVE-2018-1000027
2017-07-07 - Andreas Hasenack <andreas@canonical.com>
squid3 (3.5.12-1ubuntu7.4) xenial; urgency=medium
* debian/patches/passive-ftp-segfault-1560429.patch: Fix for segfault
when ftp passive mode is not available.  Closes: #793473, LP:
#1560429.
2017-02-03 - Marc Deslauriers <marc.deslauriers@ubuntu.com>
squid3 (3.5.12-1ubuntu7.3) xenial-security; urgency=medium
* SECURITY UPDATE: cookie data leak via If-Not-Modified HTTP conditional
- debian/patches/CVE-2016-10002.patch: properly handle combination of
If-Match and a Cache Hit in src/LogTags.h, src/client_side.cc,
src/client_side_reply.cc, src/client_side_reply.h.
- CVE-2016-10002
* SECURITY UPDATE: incorrect HTTP Request header comparison
- debian/patches/CVE-2016-10003.patch: don't share private responses
with collapsed client in src/client_side_reply.cc.
- CVE-2016-10003

See Also

Package Description
squid_3.5.12-1ubuntu7.6_i386.deb Full featured Web Proxy cache (HTTP proxy)
ssh_7.2p2-4ubuntu2.6_all.deb secure shell client and server (metapackage)
sssd-ad-common_1.13.4-1ubuntu1.12_i386.deb System Security Services Daemon -- PAC responder
sssd-ad_1.13.4-1ubuntu1.12_i386.deb System Security Services Daemon -- Active Directory back end
sssd-common_1.13.4-1ubuntu1.12_i386.deb System Security Services Daemon -- common files
sssd-dbus_1.13.4-1ubuntu1.12_i386.deb System Security Services Daemon -- D-Bus responder
sssd-ipa_1.13.4-1ubuntu1.12_i386.deb System Security Services Daemon -- IPA back end
sssd-krb5-common_1.13.4-1ubuntu1.12_i386.deb System Security Services Daemon -- Kerberos helpers
sssd-krb5_1.13.4-1ubuntu1.12_i386.deb System Security Services Daemon -- Kerberos back end
sssd-ldap_1.13.4-1ubuntu1.12_i386.deb System Security Services Daemon -- LDAP back end
sssd-proxy_1.13.4-1ubuntu1.12_i386.deb System Security Services Daemon -- proxy back end
sssd-tools_1.13.4-1ubuntu1.12_i386.deb System Security Services Daemon -- tools
sssd_1.13.4-1ubuntu1.12_i386.deb System Security Services Daemon -- metapackage
strongswan-charon_5.3.5-1ubuntu3.8_i386.deb strongSwan Internet Key Exchange daemon
strongswan-ike_5.3.5-1ubuntu3.8_all.deb strongSwan Internet Key Exchange daemon (transitional package)
Advertisement
Advertisement