Name: | squid |
---|---|
Epoch: | 7 |
Version: | 5.5 |
Release: | 6.0.1.el9_3.2 |
Architecture: | x86_64 |
Group: | Unspecified |
Size: | 12264699 |
License: | GPLv2+ and (LGPLv2+ and MIT and BSD and Public Domain) |
RPM: | squid-5.5-6.0.1.el9_3.2.x86_64.rpm |
Source RPM: | squid-5.5-6.0.1.el9_3.2.src.rpm |
Build Date: | Tue Dec 19 2023 |
Build Host: | build-ol9-x86_64.oracle.com |
Vendor: | Oracle America |
URL: | http://www.squid-cache.org |
Summary: | The Squid proxy caching server |
Description: | Squid is a high-performance proxy caching server for Web clients, supporting FTP, gopher, and HTTP data objects. Unlike traditional caching software, Squid handles all requests in a single, non-blocking, I/O-driven process. Squid keeps meta data and especially hot objects cached in RAM, caches DNS lookups, supports non-blocking DNS lookups, and implements negative caching of failed requests. Squid consists of a main server program squid, a Domain Name System lookup program (dnsserver), a program for retrieving FTP data (ftpget), and some management and client tools. |
- Fix Bug 5318: peer_digest.cc:399: "fetch->pd && receivedData.data" [Orabug: 36109804]
- Fix: squid: DoS against HTTP and HTTPS (CVE-2023-5824)
- Resolves: RHEL-14819 - squid: squid: denial of Servicein FTP - Resolves: RHEL-14807 - squid: squid: Denial of Service in HTTP Digest Authentication - Resolves: RHEL-14780 - squid: squid: Request/Response smuggling in HTTP/1.1 and ICAP
- Resolves: #2231827 - Crash with half_closed_client on
- Resolves: #2151188 - [RFE] Add the "IP_BIND_ADDRESS_NO_PORT" flag to sockets created for outgoing connections in the squid source code.
- Resolves: #2095468 - [RFE] squid use systemd-sysusers
- Resolves: #2130253 - CVE-2022-41318 squid: buffer-over-read in SSPI and SMB authentication
- Resolves: #2100785 - CVE-2021-46784 squid: DoS when processing gopher server responses
- new version 5.5 - Resolves: #2075727 - The memory usage of the squid process keeps increasing