Пакет squid-7:5.5-19.el9_6.aarch64
Имя | squid |
---|---|
Эпоха | 7 |
Версия | 5.5 |
Релиз | 19.el9_6 |
Архитектура | aarch64 |
Сайт | http://www.squid-cache.org |
Лицензия | GPLv2+ and (LGPLv2+ and MIT and BSD and Public Domain) |
Время сборки | 2025-06-25 09:14:04 |
Хост сборки | builder-arm64-1.inferitos.ru |
Краткое описание | The Squid proxy caching server |
Репозитории | AppStream |
Полное описание | Squid is a high-performance proxy caching server for Web clients, supporting FTP and HTTP data objects. Unlike traditional caching software, Squid handles all requests in a single, non-blocking, I/O-driven process. Squid keeps meta data and especially hot objects cached in RAM, caches DNS lookups, supports non-blocking DNS lookups, and implements negative caching of failed requests. Squid consists of a main server program squid, a Domain Name System lookup program (dnsserver), a program for retrieving FTP data (ftpget), and some management and client tools. |
Эррата | — |
Размер | 3720 КиБ |
Исходный проект | squid-5.5-19.el9_6 |
Контрольная сумма SHA-256 | 0cda3ea20ffae07450a3e66716d1d11b9f38511b198dab0d2e5f0484f0b6a341 |
×
* Wed Mar 26 2025 Luboš Uhliarik <luhliari@redhat.com> - 7:5.5-19 - Resolves: RHEL-84694 - squid aborts trying to access memory * Mon Nov 18 2024 Luboš Uhliarik <luhliari@redhat.com> - 7:5.5-18 - Resolves: RHEL-67869 - Remove gopher mention from spec file * Thu Nov 14 2024 Luboš Uhliarik <luhliari@redhat.com> - 7:5.5-17 - Disable ESI support - Resolves: RHEL-65080 - CVE-2024-45802 squid: Denial of Service processing ESI response content * Tue Oct 22 2024 Luboš Uhliarik <luhliari@redhat.com> - 7:5.5-16 - Resolves: RHEL-12356 - TCP_MISS_ABORTED/100 erros when uploading * Mon Oct 14 2024 Luboš Uhliarik <luhliari@redhat.com> - 7:5.5-15 - Resolves: RHEL-62324 - (Regression) Transfer-encoding:chunked data is not sent to the client in its complementary * Mon Jul 01 2024 Luboš Uhliarik <luhliari@redhat.com> - 7:5.5-14 - Resolves: RHEL-45057 - squid: Out-of-bounds write error may lead to Denial of Service (CVE-2024-37894) - Resolves: RHEL-22594 - squid: vulnerable to a Denial of Service attack against Cache Manager error responses (CVE-2024-23638) * Thu May 09 2024 Luboš Uhliarik <luhliari@redhat.com> - 7:5.5-13 - Resolves: RHEL-30352 - squid v5 crashes with SIGABRT when ipv6 is disabled at kernel level but it is asked to connect to an ipv6 address by a client * Tue Mar 19 2024 Luboš Uhliarik <luhliari@redhat.com> - 7:5.5-12 - Resolves: RHEL-28530 - squid: Denial of Service in HTTP Chunked Decoding (CVE-2024-25111) - Resolves: RHEL-26092 - squid: denial of service in HTTP header parser (CVE-2024-25617) * Fri Feb 02 2024 Luboš Uhliarik <luhliari@redhat.com> - 7:5.5-10 - Resolves: RHEL-19556 - squid: denial of service in HTTP request parsing (CVE-2023-50269) * Thu Feb 01 2024 Luboš Uhliarik <luhliari@redhat.com> - 7:5.5-9 - Resolves: RHEL-18354 - squid: Buffer over-read in the HTTP Message processing feature (CVE-2023-49285) - Resolves: RHEL-18345 - squid: Incorrect Check of Function Return Value In Helper Process management (CVE-2023-49286) - Resolves: RHEL-18146 - squid crashes in assertion when a parent peer exists - Resolves: RHEL-18231 - squid: Denial of Service in SSL Certificate validation (CVE-2023-46724) - Resolves: RHEL-15912 - squid: NULL pointer dereference in the gopher protocol code (CVE-2023-46728)