Jump to letter: [
3ABCDEFGHIJKLMNOPQRSTUVWXYZ
]
squid - The Squid proxy caching server
- Description:
Squid is a high-performance proxy caching server for Web clients,
supporting FTP, and HTTP data objects. Unlike traditional
caching software, Squid handles all requests in a single,
non-blocking, I/O-driven process. Squid keeps meta data and especially
hot objects cached in RAM, caches DNS lookups, supports non-blocking
DNS lookups, and implements negative caching of failed requests.
Squid consists of a main server program squid, a Domain Name System
lookup program (dnsserver), a program for retrieving FTP data
(ftpget), and some management and client tools.
Packages
squid-3.5.20-17.vl7.10.src
[2.4 MiB] |
Changelog
by Stepan Broz (2024-02-06):
- Resolves: RHEL-16779 - squid: NULL pointer dereference in the gopher protocol
code -- Remove support for Gopher protocol (CVE-2023-46728)
- Resolves: RHEL-18176 - squid: Buffer over-read in the HTTP Message processing
feature (CVE-2023-49285)
- Resolves: RHEL-18171 - squid: Incorrect Check of Function Return Value In
Helper Process management (CVE-2023-49286)
- Resolves: RHEL-16758 - squid: Denial of Service in SSL Certificate validation
(CVE-2023-46724)
- Resolves: RHEL-19557 - squid: denial of service in HTTP request parsing
(CVE-2023-50269)
- Resolves: RHEL-26082 - squid: denial of service in HTTP header parser
(CVE-2024-25617)
|
squid-3.5.20-17.vl7.8.src
[2.3 MiB] |
Changelog
by Luboš Uhliarik (2022-09-28):
- Resolves: #2130254 - CVE-2022-41318 squid: buffer-over-read in SSPI and SMB
authentication
|
squid-3.5.20-17.vl7.7.src
[2.3 MiB] |
Changelog
by Luboš Uhliarik (2022-06-28):
- Resolves: #2100778 - CVE-2021-46784 squid: DoS when processing gopher server
responses
|
squid-3.5.20-17.vl7.6.src
[2.3 MiB] |
Changelog
by Lubos Uhliarik (2021-03-31):
- Resolves: #1944256 - CVE-2020-25097 squid: improper input validation may allow
a trusted client to perform HTTP Request Smuggling
|
squid-3.5.20-17.vl7.5.src
[2.3 MiB] |
Changelog
by Lubos Uhliarik (2020-10-26):
- Resolves: #1890581 - Fix for CVE 2019-13345 breaks authentication in
cachemgr.cgi
|
squid-3.5.20-17.vl7.4.src
[2.3 MiB] |
Changelog
by Lubos Uhliarik (2020-08-28):
- Resolves: #1872349 - CVE-2020-24606 squid: Improper Input Validation could
result in a DoS
- Resolves: #1872327 - CVE-2020-15810 squid: HTTP Request Smuggling could
result in cache poisoning
- Resolves: #1872342 - CVE-2020-15811 squid: HTTP Request Splitting could
result in cache poisoning
|
squid-3.5.20-15.vl7.src
[2.3 MiB] |
Changelog
by Lubos Uhliarik (2019-07-25):
- Resolves: #1690551 - Squid cache_peer DNS lookup failed when not all lower
case
- Resolves: #1680022 - squid can't display download/upload packet size for HTTPS
sites
- Resolves: #1717430 - Excessive memory usage when running out of descriptors
- Resolves: #1676420 - Cache siblings return wrongly cached gateway timeouts
- Resolves: #1729435 - CVE-2019-13345 squid: XSS via user_name or auth parameter
in cachemgr.cgi
- Resolves: #1582301 - CVE-2018-1000024 CVE-2018-1000027 squid: various flaws
|
squid-3.5.20-12.vl7.1.src
[2.3 MiB] |
Changelog
by Luboš Uhliarik (2018-12-10):
- Resolves: #1657638 - migration of upstream squid bug 4007
|