squid-migration-script-3.5.20-17.el7_9.10.x86_64
[50 KiB] |
Changelog
by Stepan Broz (2024-02-06):
- Resolves: RHEL-16779 - squid: NULL pointer dereference in the gopher protocol
code -- Remove support for Gopher protocol (CVE-2023-46728)
- Resolves: RHEL-18176 - squid: Buffer over-read in the HTTP Message processing
feature (CVE-2023-49285)
- Resolves: RHEL-18171 - squid: Incorrect Check of Function Return Value In
Helper Process management (CVE-2023-49286)
- Resolves: RHEL-16758 - squid: Denial of Service in SSL Certificate validation
(CVE-2023-46724)
- Resolves: RHEL-19557 - squid: denial of service in HTTP request parsing
(CVE-2023-50269)
- Resolves: RHEL-26082 - squid: denial of service in HTTP header parser
(CVE-2024-25617)
|
squid-migration-script-3.5.20-17.el7_9.9.x86_64
[50 KiB] |
Changelog
by Stepan Broz (2023-11-01):
- Resolves: RHEL-14789 - squid: Denial of Service in HTTP Digest Authentication
(CVE-2023-46847)
|
squid-migration-script-3.5.20-17.el7_9.8.x86_64
[50 KiB] |
Changelog
by Luboš Uhliarik (2022-09-28):
- Resolves: #2130254 - CVE-2022-41318 squid: buffer-over-read in SSPI and SMB
authentication
|
squid-migration-script-3.5.20-17.el7_9.7.x86_64
[49 KiB] |
Changelog
by Luboš Uhliarik (2022-06-28):
- Resolves: #2100778 - CVE-2021-46784 squid: DoS when processing gopher server
responses
|
squid-migration-script-3.5.20-17.el7_9.6.x86_64
[49 KiB] |
Changelog
by Lubos Uhliarik (2021-03-31):
- Resolves: #1944256 - CVE-2020-25097 squid: improper input validation may allow
a trusted client to perform HTTP Request Smuggling
|
squid-migration-script-3.5.20-17.el7_9.4.x86_64
[49 KiB] |
Changelog
by Lubos Uhliarik (2020-08-28):
- Resolves: #1872349 - CVE-2020-24606 squid: Improper Input Validation could
result in a DoS
- Resolves: #1872327 - CVE-2020-15810 squid: HTTP Request Smuggling could
result in cache poisoning
- Resolves: #1872342 - CVE-2020-15811 squid: HTTP Request Splitting could
result in cache poisoning
|
squid-migration-script-3.5.20-15.el7_8.1.x86_64
[48 KiB] |
Changelog
by Lubos Uhliarik (2020-04-28):
- Resolves: #1828359 - CVE-2020-11945 squid: improper access restriction upon
Digest Authentication nonce replay could lead to remote code execution
- Resolves: #1828360 - CVE-2019-12519 squid: improper check for new member in
ESIExpression::Evaluate allows for stack buffer overflow
- Resolves: #1829772 - CVE-2019-12525 squid: parsing of header
Proxy-Authentication leads to memory corruption
|
squid-migration-script-3.5.20-15.el7.x86_64
[48 KiB] |
Changelog
by Lubos Uhliarik (2019-07-25):
- Resolves: #1690551 - Squid cache_peer DNS lookup failed when not all lower
case
- Resolves: #1680022 - squid can't display download/upload packet size for HTTPS
sites
- Resolves: #1717430 - Excessive memory usage when running out of descriptors
- Resolves: #1676420 - Cache siblings return wrongly cached gateway timeouts
- Resolves: #1729435 - CVE-2019-13345 squid: XSS via user_name or auth parameter
in cachemgr.cgi
- Resolves: #1582301 - CVE-2018-1000024 CVE-2018-1000027 squid: various flaws
|
squid-migration-script-3.5.20-2.el7_3.2.x86_64
[46 KiB] |
Changelog
by Luboš Uhliarik (2017-01-13):
- Resolves: #1412735 - CVE-2016-10002 squid: Information disclosure in HTTP
request processing
|
squid-migration-script-3.5.20-2.el7.x86_64
[46 KiB] |
Changelog
by Luboš Uhliarik (2016-09-21):
- Resolves: #1378025 - host_verify_strict only accepts lowercase arguments
|