[CLSA-2026:1777389615] Fix CVE(s): CVE-2024-45802
Type:
security
Severity:
Important
Release date:
2026-04-28 15:20:20 UTC
Description:
* SECURITY UPDATE: multiple vulnerabilities in Edge Side Includes (ESI) processing - debian/rules: build with --disable-esi to remove the vulnerable ESI response processor (matches the upstream Squid 6.10 default, where ESI support is disabled by default). - debian/control: drop libexpat1-dev and libxml2-dev Build-Depends as they are no longer required when ESI is disabled. - CVE-2024-45802
Updated packages:
  • squid_4.10-1ubuntu1.13+tuxcare.els3_amd64.deb
    sha:c9f8444afb903efaaeb0a3063fdb3fc92a701555
  • squid-cgi_4.10-1ubuntu1.13+tuxcare.els3_amd64.deb
    sha:0a285ba4f6d0b5ff6cedef22fde320e24c796843
  • squid-common_4.10-1ubuntu1.13+tuxcare.els3_all.deb
    sha:574ce3b17b255955ef8530d95583e0d14145e95d
  • squid-purge_4.10-1ubuntu1.13+tuxcare.els3_amd64.deb
    sha:413f9d44329a2e78acb13373612c20e95a58fab8
  • squidclient_4.10-1ubuntu1.13+tuxcare.els3_amd64.deb
    sha:e50b0204416df229c7858d410eefd8bed9707ccf
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.