The hardware and bandwidth for this mirror is donated by dogado GmbH, the Webhosting and Full Service-Cloud Provider. Check out our Wordpress Tutorial.
If you wish to report a bug, or if you are interested in having us mirror your free-software or open-source project, please feel free to contact us at mirror[@]dogado.de.

system environment/daemons

squid - The Squid proxy caching server

Website: http://www.squid-cache.org
License: GPLv2+ and (LGPLv2+ and MIT and BSD and Public Domain)
Vendor: Scientific Linux
Description:
Squid is a high-performance proxy caching server for Web clients,
supporting FTP, gopher, and HTTP data objects. Unlike traditional
caching software, Squid handles all requests in a single,
non-blocking, I/O-driven process. Squid keeps meta data and especially
hot objects cached in RAM, caches DNS lookups, supports non-blocking
DNS lookups, and implements negative caching of failed requests.

Squid consists of a main server program squid, a Domain Name System
lookup program (dnsserver), a program for retrieving FTP data
(ftpget), and some management and client tools.

Packages

squid-3.5.20-17.el7_9.9.x86_64 [2.9 MiB] Changelog by Stepan Broz (2023-11-01):
- Resolves: RHEL-14789 - squid: Denial of Service in HTTP Digest Authentication
  (CVE-2023-46847)
squid-3.5.20-17.el7_9.8.x86_64 [2.9 MiB] Changelog by Luboš Uhliarik (2022-09-28):
- Resolves: #2130254 - CVE-2022-41318 squid: buffer-over-read in SSPI and SMB
  authentication
squid-3.5.20-17.el7_9.7.x86_64 [2.9 MiB] Changelog by Luboš Uhliarik (2022-06-28):
- Resolves: #2100778 - CVE-2021-46784 squid: DoS when processing gopher server
  responses
squid-3.5.20-17.el7_9.6.x86_64 [2.9 MiB] Changelog by Lubos Uhliarik (2021-03-31):
- Resolves: #1944256 - CVE-2020-25097 squid: improper input validation may allow
  a trusted client to perform HTTP Request Smuggling
squid-3.5.20-17.el7_9.4.x86_64 [2.9 MiB] Changelog by Lubos Uhliarik (2020-08-28):
- Resolves: #1872349 - CVE-2020-24606 squid: Improper Input Validation could
  result in a DoS
- Resolves: #1872327 - CVE-2020-15810 squid: HTTP Request Smuggling could
  result in cache poisoning
- Resolves: #1872342 - CVE-2020-15811 squid: HTTP Request Splitting could
  result in cache poisoning
squid-3.5.20-15.el7_8.1.x86_64 [2.9 MiB] Changelog by Lubos Uhliarik (2020-04-28):
- Resolves: #1828359 - CVE-2020-11945 squid: improper access restriction upon
  Digest Authentication nonce replay could lead to remote code execution
- Resolves: #1828360 - CVE-2019-12519 squid: improper check for new member in
  ESIExpression::Evaluate allows for stack buffer overflow
- Resolves: #1829772 - CVE-2019-12525 squid: parsing of header
  Proxy-Authentication leads to memory corruption
squid-3.5.20-15.el7.x86_64 [2.9 MiB] Changelog by Lubos Uhliarik (2019-07-25):
- Resolves: #1690551 - Squid cache_peer DNS lookup failed when not all lower
  case
- Resolves: #1680022 - squid can't display download/upload packet size for HTTPS
  sites
- Resolves: #1717430 - Excessive memory usage when running out of descriptors
- Resolves: #1676420 - Cache siblings return wrongly cached gateway timeouts
- Resolves: #1729435 - CVE-2019-13345 squid: XSS via user_name or auth parameter
  in cachemgr.cgi
- Resolves: #1582301 - CVE-2018-1000024 CVE-2018-1000027 squid: various flaws
squid-3.5.20-2.el7_3.2.x86_64 [3.0 MiB] Changelog by Luboš Uhliarik (2017-01-13):
- Resolves: #1412735 - CVE-2016-10002 squid: Information disclosure in HTTP
  request processing
squid-3.5.20-2.el7.x86_64 [3.0 MiB] Changelog by Luboš Uhliarik (2016-09-21):
- Resolves: #1378025 - host_verify_strict only accepts lowercase arguments
squid-3.3.8-26.el7_2.3.x86_64 [2.6 MiB] Changelog by Luboš Uhliarik (2016-05-09):
- Related: #1330576 - CVE-2016-4553 squid: Cache poisoning issue in
  HTTP Request handling
- Related: #1334491 - CVE-2016-4554 CVE-2016-4555 CVE-2016-4556
  squid: various flaws
squid-3.3.8-26.el7.x86_64 [2.6 MiB] Changelog by Luboš Uhliarik (2015-10-14):
- Related: #1186768 - removing patch, because of missing tests and 
  incorrent patch

Listing created by Repoview-0.6.6-4.el7

These binaries (installable software) and packages are in development.
They may not be fully stable and should be used with caution. We make no claims about them.
Health stats visible at Monitor.