squid vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the squid package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Operation on a Resource after Expiration or Release

<7:4.15-10.module+el8.10.0+90442+8ef3f586.3
  • H
CVE-2024-45802

<7:4.15-10.module+el8.10.0+90442+8ef3f586.3
  • H
Collapse of Data into Unsafe Value

<7:4.15-7.module+el8.9.0+90184+ff65e696.10
  • H
Uncontrolled Recursion

<7:4.15-7.module+el8.9.0+90184+ff65e696.10
  • H
CVE-2024-25111

<7:4.15-7.module+el8.9.0+90184+ff65e696.10
  • H
Out-of-bounds Read

<7:4.15-7.module+el8.9.0+90111+615ac445.5
  • H
Improper Certificate Validation

<7:4.15-7.module+el8.9.0+90111+615ac445.5
  • H
NULL Pointer Dereference

<7:4.15-7.module+el8.9.0+90111+615ac445.5
  • H
Reachable Assertion

<7:4.15-7.module+el8.9.0+90111+615ac445.5
  • H
Improper Handling of Exceptional Conditions

<7:4.15-7.module+el8.9.0+90100+fede0fa7.3
  • C
HTTP Request Smuggling

<7:4.15-7.module+el8.9.0+90083+f7556140.1
  • C
Buffer Overflow

<7:4.15-6.0.1.module+el8.8.0+90059+985ac402
  • H
Integer Overflow or Wraparound

<7:4.15-3.module+el8.6.0+20822+0be15e43.1
  • H
Reachable Assertion

<7:4.15-3.module+el8.6.0+20699+8fa0a254.1
  • M
Out-of-bounds Read

<7:4.15-3.module+el8.6.0+20529+9782b8ab
  • M
Memory Leak

<7:4.15-1.module+el8.5.0+20327+24c223d9
  • M
Improper Input Validation

<7:4.15-1.module+el8.5.0+20327+24c223d9
  • M
Memory Leak

<7:4.15-1.module+el8.5.0+20327+24c223d9
  • M
Integer Overflow or Wraparound

<7:4.15-1.module+el8.5.0+20327+24c223d9
  • M
Integer Overflow or Wraparound

<7:4.15-1.module+el8.5.0+20327+24c223d9
  • M
Improper Encoding or Escaping of Output

<7:4.15-1.module+el8.5.0+20327+24c223d9
  • M
Improper Encoding or Escaping of Output

<7:4.15-1.module+el8.5.0+20327+24c223d9
  • H
Improper Input Validation

<7:4.11-4.module+el8.4.0+20173+36853f3f.2
  • M
Cross-site Request Forgery (CSRF)

<7:4.11-3.module+el8.3.0+7819+eb7d4ef6
  • M
Information Exposure

<7:4.11-3.module+el8.3.0+7819+eb7d4ef6
  • M
Out-of-bounds Write

<7:4.11-3.module+el8.3.0+7819+eb7d4ef6
  • M
HTTP Request Smuggling

<7:4.11-3.module+el8.3.0+7819+eb7d4ef6
  • M
Off-by-one Error

<7:4.11-3.module+el8.3.0+7819+eb7d4ef6
  • M
Missing Authentication for Critical Function

<7:4.11-3.module+el8.3.0+7819+eb7d4ef6
  • M
Out-of-bounds Read

<7:4.11-3.module+el8.3.0+7819+eb7d4ef6
  • M
Out-of-bounds Write

<7:4.11-3.module+el8.3.0+7819+eb7d4ef6
  • M
Arbitrary Code Injection

<7:4.11-3.module+el8.3.0+7819+eb7d4ef6
  • M
Improper Input Validation

<7:4.11-3.module+el8.3.0+7819+eb7d4ef6
  • M
CVE-2020-14058

<7:4.11-3.module+el8.3.0+7819+eb7d4ef6
  • M
CVE-2019-12523

<7:4.11-3.module+el8.3.0+7819+eb7d4ef6
  • M
CVE-2019-12854

<7:4.11-3.module+el8.3.0+7819+eb7d4ef6
  • M
Incorrect Calculation of Buffer Size

<7:4.11-3.module+el8.3.0+7819+eb7d4ef6
  • M
CVE-2019-12528

<7:4.11-3.module+el8.3.0+7819+eb7d4ef6
  • M
Exposure of Resource to Wrong Sphere

<7:4.11-3.module+el8.3.0+7819+eb7d4ef6
  • M
Improper Locking

<7:4.11-3.module+el8.3.0+7819+eb7d4ef6
  • M
HTTP Request Smuggling

<7:4.11-3.module+el8.3.0+7819+eb7d4ef6
  • H
Insufficient Comparison

<7:4.4-8.module+el8.2.0+7778+aff7482f.2
  • H
HTTP Request Smuggling

<7:4.4-8.module+el8.2.0+7778+aff7482f.2
  • H
Out-of-bounds Write

<7:4.4-8.module+el8.2.0+7611+d512f060.1
  • H
Integer Overflow or Wraparound

<7:4.4-8.module+el8.2.0+7611+d512f060.1
  • H
Out-of-bounds Write

<7:4.4-8.module+el8.2.0+7611+d512f060.1
  • M
Cross-site Scripting (XSS)

<7:4.4-8.module+el8.1.0+5405+03b963f4
  • H
Out-of-bounds Write

<7:4.4-5.module+el8.0.0+5324+ea04b9c2