Fedora 39: squid 2023-ab77331a34
Summary
Squid is a high-performance proxy caching server for Web clients,
supporting FTP, gopher, and HTTP data objects. Unlike traditional
caching software, Squid handles all requests in a single,
non-blocking, I/O-driven process. Squid keeps meta data and especially
hot objects cached in RAM, caches DNS lookups, supports non-blocking
DNS lookups, and implements negative caching of failed requests.
Squid consists of a main server program squid, a Domain Name System
lookup program (dnsserver), a program for retrieving FTP data
(ftpget), and some management and client tools.
Update Information:
- New version 6.6 - Important security fixes - Removed gopher support
Change Log
* Wed Dec 13 2023 Yaakov Selkowitz
References
[ 1 ] Bug #2250224 - CVE-2023-46724 squid: Denial of Service in SSL Certificate validation [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2250224 [ 2 ] Bug #2250229 - TRIAGE CVE-2023-46728 squid: NULL pointer dereference in the gopher protocol code [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2250229 [ 3 ] Bug #2252919 - CVE-2023-49288 squid: Use-After-Free in the HTTP Collapsed Forwarding Feature [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2252919 [ 4 ] Bug #2252924 - CVE-2023-49286 squid: Incorrect Check of Function Return Value In Helper Process management [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2252924 [ 5 ] Bug #2252927 - CVE-2023-49285 squid: Buffer over-read in the HTTP Message processing feature [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2252927 [ 6 ] Bug #2253417 - squid-6.6 is available https://bugzilla.redhat.com/show_bug.cgi?id=2253417 [ 7 ] Bug #2254686 - CVE-2023-50269 squid: denial of service in HTTP request parsing [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2254686
Update Instructions
This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2023-ab77331a34' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html