Package squid-7:4.15-10.module+el8.10.0+579+30c0d813.5.x86_64
Name | squid |
---|---|
Epoch | 7 |
Version | 4.15 |
Release | 10.module+el8.10.0+579+30c0d813.5 |
Architecture | x86_64 |
Website/URL | http://www.squid-cache.org |
License | GPLv2+ and (LGPLv2+ and MIT and BSD and Public Domain) |
Build Time | 2025-01-29 16:24:36 |
Build Host | builder-x86-04.inferitos.ru |
Summary | The Squid proxy caching server |
Repositories | AppStream |
Description | Squid is a high-performance proxy caching server for Web clients, supporting FTP and HTTP data objects. Unlike traditional caching software, Squid handles all requests in a single, non-blocking, I/O-driven process. Squid keeps meta data and especially hot objects cached in RAM, caches DNS lookups, supports non-blocking DNS lookups, and implements negative caching of failed requests. Squid consists of a main server program squid, a Domain Name System lookup program (dnsserver), a program for retrieving FTP data (ftpget), and some management and client tools. |
Errata | — |
Size | 3432 KiB |
Source Project | squid-4.15-10.module+el8.10.0+579+30c0d813.5 |
SHA-256 checksum | 686808643a4e68f662f0bceed0f9145f77a03c6a2e9d8bcca734b6bba41efc16 |
×
* Fri Nov 22 2024 Luboš Uhliarik <luhliari@redhat.com> - 7:4.15-10.5 - Resolves: RHEL-66120 - squid caches DNS entries despite having TTL set to 0 * Mon Nov 18 2024 Luboš Uhliarik <luhliari@redhat.com> - 7:4.15-10.4 - Resolves: RHEL-67870 - Remove gopher mention from spec file * Wed Nov 13 2024 Luboš Uhliarik <luhliari@redhat.com> - 7:4.15-10.3 - Resolves: RHEL-22593 - CVE-2024-23638 squid:4/squid: vulnerable to a Denial of Service attack against Cache Manager error responses * Thu Nov 07 2024 Luboš Uhliarik <luhliari@redhat.com> - 7:4.15-10.2 - Disable ESI support - Resolves: RHEL-65075 - CVE-2024-45802 squid:4/squid: Denial of Service processing ESI response content * Mon Oct 14 2024 Luboš Uhliarik <luhliari@redhat.com> - 7:4.15-10.1 - Resolves: RHEL-56024 - (Regression) Transfer-encoding:chunked data is not sent to the client in its complementary * Tue Mar 19 2024 Luboš Uhliarik <luhliari@redhat.com> - 7:4.15-10 - Resolves: RHEL-28529 - squid:4/squid: Denial of Service in HTTP Chunked Decoding (CVE-2024-25111) - Resolves: RHEL-26088 - squid:4/squid: denial of service in HTTP header parser (CVE-2024-25617) * Fri Feb 02 2024 Luboš Uhliarik <luhliari@redhat.com> - 7:4.15-9 - Resolves: RHEL-19552 - squid:4/squid: denial of service in HTTP request parsing (CVE-2023-50269) * Fri Feb 02 2024 Luboš Uhliarik <luhliari@redhat.com> - 7:4.15-8 - Resolves: RHEL-18351 - squid:4/squid: Buffer over-read in the HTTP Message processing feature (CVE-2023-49285) - Resolves: RHEL-18342 - squid:4/squid: Incorrect Check of Function Return Value In Helper Process management (CVE-2023-49286) - Resolves: RHEL-18230 - squid:4/squid: Denial of Service in SSL Certificate validation (CVE-2023-46724) - Resolves: RHEL-15911 - squid:4/squid: NULL pointer dereference in the gopher protocol code (CVE-2023-46728) - Resolves: RHEL-18251 - squid crashes in assertion when a parent peer exists - Resolves: RHEL-14794 - squid: squid multiple issues in HTTP response caching (CVE-2023-5824) - Resolves: RHEL-14803 - squid: squid: Denial of Service in HTTP Digest Authentication (CVE-2023-46847) - Resolves: RHEL-14777 - squid: squid: Request/Response smuggling in HTTP/1.1 and ICAP (CVE-2023-46846) * Tue Dec 12 2023 MSVSphere Packaging Team <packager@msvsphere-os.ru> - 7:4.15-7 - Rebuilt for MSVSphere 8.8 * Wed Aug 16 2023 Luboš Uhliarik <luhliari@redhat.com> - 7:4.15-7 - Resolves: #2076717 - Crash with half_closed_client on