An issue was discovered in Squid 5.0.6 through 5.1.x before 5.2. When validating an origin server or peer certificate, Squid may incorrectly classify certain certificates as trusted. This problem allows a remote server to obtain security trust well improperly. This indication of trust may be passed along to clients, allowing access to unsafe or hijacked services.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Alpine | edge-main | noarch | squid | < 5.2-r0 | UNKNOWN |
Alpine | 3.13-main | noarch | squid | < 5.0.6-r2 | UNKNOWN |
Alpine | 3.14-main | noarch | squid | < 5.0.6-r2 | UNKNOWN |
Alpine | 3.15-main | noarch | squid | < 5.2-r0 | UNKNOWN |
Alpine | 3.16-main | noarch | squid | < 5.2-r0 | UNKNOWN |
Alpine | 3.17-main | noarch | squid | < 5.2-r0 | UNKNOWN |
Alpine | 3.18-main | noarch | squid | < 5.2-r0 | UNKNOWN |
Alpine | 3.19-main | noarch | squid | < 5.2-r0 | UNKNOWN |