Name: | squid |
---|---|
Epoch: | 7 |
Version: | 4.15 |
Release: | 10.module+el8.10.0+90431+a3faf78c.1 |
Architecture: | aarch64 |
Module: | squid:4:8100020241105050344:10 |
Group: | Unspecified |
Size: | 13027172 |
License: | GPLv2+ and (LGPLv2+ and MIT and BSD and Public Domain) |
RPM: | squid-4.15-10.module+el8.10.0+90431+a3faf78c.1.aarch64.rpm |
Source RPM: | squid-4.15-10.module+el8.10.0+90431+a3faf78c.1.src.rpm |
Build Date: | Tue Nov 05 2024 |
Build Host: | build-ol8-aarch64.oracle.com |
Vendor: | Oracle America |
URL: | http://www.squid-cache.org |
Summary: | The Squid proxy caching server |
Description: | Squid is a high-performance proxy caching server for Web clients, supporting FTP, gopher, and HTTP data objects. Unlike traditional caching software, Squid handles all requests in a single, non-blocking, I/O-driven process. Squid keeps meta data and especially hot objects cached in RAM, caches DNS lookups, supports non-blocking DNS lookups, and implements negative caching of failed requests. Squid consists of a main server program squid, a Domain Name System lookup program (dnsserver), a program for retrieving FTP data (ftpget), and some management and client tools. |
- Resolves: RHEL-56024 - (Regression) Transfer-encoding:chunked data is not sent to the client in its complementary
- Resolves: RHEL-28529 - squid:4/squid: Denial of Service in HTTP Chunked Decoding (CVE-2024-25111) - Resolves: RHEL-26088 - squid:4/squid: denial of service in HTTP header parser (CVE-2024-25617)
- Resolves: RHEL-19552 - squid:4/squid: denial of service in HTTP request parsing (CVE-2023-50269)
- Resolves: RHEL-18351 - squid:4/squid: Buffer over-read in the HTTP Message processing feature (CVE-2023-49285) - Resolves: RHEL-18342 - squid:4/squid: Incorrect Check of Function Return Value In Helper Process management (CVE-2023-49286) - Resolves: RHEL-18230 - squid:4/squid: Denial of Service in SSL Certificate validation (CVE-2023-46724) - Resolves: RHEL-15911 - squid:4/squid: NULL pointer dereference in the gopher protocol code (CVE-2023-46728) - Resolves: RHEL-18251 - squid crashes in assertion when a parent peer exists - Resolves: RHEL-14794 - squid: squid multiple issues in HTTP response caching (CVE-2023-5824) - Resolves: RHEL-14803 - squid: squid: Denial of Service in HTTP Digest Authentication (CVE-2023-46847) - Resolves: RHEL-14777 - squid: squid: Request/Response smuggling in HTTP/1.1 and ICAP (CVE-2023-46846)
- Resolves: #2076717 - Crash with half_closed_client on
- Resolves: #2072988 - [RFE] Add the "IP_BIND_ADDRESS_NO_PORT" flag to sockets created for outgoing connections in the squid source code.
- Resolves: #2130260 - CVE-2022-41318 squid:4/squid: buffer-over-read in SSPI and SMB authentication
- Resolves: #2100783 - CVE-2021-46784 squid:4/squid: DoS when processing gopher server responses
- Resolves: #1941506 - CVE-2021-28116 squid:4/squid: out-of-bounds read in WCCP protocol data may lead to information disclosure
- Resolves: #2006121 - SQUID shortens FTP Link wrong that contains a semi-colon and as a result is not able to download zip file.CODE 404 TO CLIENT)