Name: | squid |
---|---|
Epoch: | 7 |
Version: | 4.15 |
Release: | 6.module+el8.8.0+20967+cecc5697 |
Architecture: | aarch64 |
Module: | squid:4:8080020221208121636:fd72936b |
Group: | Unspecified |
Size: | 13354792 |
License: | GPLv2+ and (LGPLv2+ and MIT and BSD and Public Domain) |
RPM: | squid-4.15-6.module+el8.8.0+20967+cecc5697.aarch64.rpm |
Source RPM: | squid-4.15-6.module+el8.8.0+20967+cecc5697.src.rpm |
Build Date: | Fri Mar 31 2023 |
Build Host: | build-ol8-aarch64.oracle.com |
Vendor: | Oracle America |
URL: | http://www.squid-cache.org |
Summary: | The Squid proxy caching server |
Description: | Squid is a high-performance proxy caching server for Web clients, supporting FTP, gopher, and HTTP data objects. Unlike traditional caching software, Squid handles all requests in a single, non-blocking, I/O-driven process. Squid keeps meta data and especially hot objects cached in RAM, caches DNS lookups, supports non-blocking DNS lookups, and implements negative caching of failed requests. Squid consists of a main server program squid, a Domain Name System lookup program (dnsserver), a program for retrieving FTP data (ftpget), and some management and client tools. |
- Resolves: #2072988 - [RFE] Add the "IP_BIND_ADDRESS_NO_PORT" flag to sockets created for outgoing connections in the squid source code.
- Resolves: #2130260 - CVE-2022-41318 squid:4/squid: buffer-over-read in SSPI and SMB authentication
- Resolves: #2100783 - CVE-2021-46784 squid:4/squid: DoS when processing gopher server responses
- Resolves: #1941506 - CVE-2021-28116 squid:4/squid: out-of-bounds read in WCCP protocol data may lead to information disclosure
- Resolves: #2006121 - SQUID shortens FTP Link wrong that contains a semi-colon and as a result is not able to download zip file.CODE 404 TO CLIENT)
- new version 4.15 - Resolves: #1964384 - squid:4 rebase to 4.15
- Resolves: #1944261 - CVE-2020-25097 squid:4/squid: improper input validation may allow a trusted client to perform HTTP Request Smuggling
- Resolves: #1890606 - Fix for CVE 2019-13345 breaks authentication in cachemgr.cgi
- Resolves: #1871705 - CVE-2020-24606 squid: Improper Input Validation could result in a DoS - Resolves: #1871702 - CVE-2020-15811 squid: HTTP Request Splitting could result in cache poisoning - Resolves: #1871700 - CVE-2020-15810 squid: HTTP Request Smuggling could result in cache poisoning
- Resolves: #1853130 - CVE-2020-15049 squid:4/squid: request smuggling and poisoning attack against the HTTP cache - Resolves: #1853136 - CVE-2020-14058 squid:4/squid: DoS in TLS handshake