Jump to letter: [
          
            3ABCDEFGHIJKLMNOPQRSTWXYZ
          ]
        
        squid - The Squid proxy caching server
        
        
        - Description:
- Squid is a high-performance proxy caching server for Web clients,
supporting FTP, and HTTP data objects. Unlike traditional
caching software, Squid handles all requests in a single,
non-blocking, I/O-driven process. Squid keeps meta data and especially
hot objects cached in RAM, caches DNS lookups, supports non-blocking
DNS lookups, and implements negative caching of failed requests.
Squid consists of a main server program squid, a Domain Name System
lookup program (dnsserver), a program for retrieving FTP data
(ftpget), and some management and client tools. 
Packages
        
        
            | squid-3.5.20-17.el7_9.10.x86_64
              [2.9 MiB] | Changelog
              by Stepan Broz (2024-02-06): - Resolves: RHEL-16779 - squid: NULL pointer dereference in the gopher protocol
  code -- Remove support for Gopher protocol (CVE-2023-46728)
- Resolves: RHEL-18176 - squid: Buffer over-read in the HTTP Message processing
  feature (CVE-2023-49285)
- Resolves: RHEL-18171 - squid: Incorrect Check of Function Return Value In
  Helper Process management (CVE-2023-49286)
- Resolves: RHEL-16758 - squid: Denial of Service in SSL Certificate validation
  (CVE-2023-46724)
- Resolves: RHEL-19557 - squid: denial of service in HTTP request parsing
  (CVE-2023-50269)
- Resolves: RHEL-26082 - squid: denial of service in HTTP header parser
  (CVE-2024-25617) | 
            | squid-3.5.20-17.el7_9.9.x86_64
              [2.9 MiB] | Changelog
              by Stepan Broz (2023-11-01): - Resolves: RHEL-14789 - squid: Denial of Service in HTTP Digest Authentication
  (CVE-2023-46847) | 
            | squid-3.5.20-17.el7_9.8.x86_64
              [2.9 MiB] | Changelog
              by Luboš Uhliarik (2022-09-28): - Resolves: #2130254 - CVE-2022-41318 squid: buffer-over-read in SSPI and SMB
  authentication | 
            | squid-3.5.20-17.el7_9.7.x86_64
              [2.9 MiB] | Changelog
              by Luboš Uhliarik (2022-06-28): - Resolves: #2100778 - CVE-2021-46784 squid: DoS when processing gopher server
  responses | 
            | squid-3.5.20-17.el7_9.6.x86_64
              [2.9 MiB] | Changelog
              by Lubos Uhliarik (2021-03-31): - Resolves: #1944256 - CVE-2020-25097 squid: improper input validation may allow
  a trusted client to perform HTTP Request Smuggling | 
            | squid-3.5.20-17.el7_9.4.x86_64
              [2.9 MiB] | Changelog
              by Lubos Uhliarik (2020-08-28): - Resolves: #1872349 - CVE-2020-24606 squid: Improper Input Validation could
  result in a DoS
- Resolves: #1872327 - CVE-2020-15810 squid: HTTP Request Smuggling could
  result in cache poisoning
- Resolves: #1872342 - CVE-2020-15811 squid: HTTP Request Splitting could
  result in cache poisoning |