Rocky Linux: RLSA-2021:1979 squid | LinuxSecurity.com
\{'type': 'Security', 'shortCode': 'RL', 'name': 'RLSA-2021:1979', 'synopsis': 'Important: squid:4 security update', 'severity': 'Important', 'topic': 'An update for the squid:4 module is now available for Rocky Linux 8.\nRocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.', 'description': 'Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', 'solution': None, 'affectedProducts': ['Rocky Linux 8'], 'fixes': ['1939925'], 'cves': ['Red Hat:::https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25097.json:::CVE-2020-25097'], 'references': [], 'publishedAt': '2021-07-22T03:16:49.718214Z', 'rpms': ['libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.aarch64.rpm', 'libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.src.rpm', 'libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm', 'libecap-debuginfo-1.0.1-2.module+el8.4.0+404+316a0dc5.aarch64.rpm', 'libecap-debuginfo-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm', 'libecap-debugsource-1.0.1-2.module+el8.4.0+404+316a0dc5.aarch64.rpm', 'libecap-debugsource-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm', 'libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.aarch64.rpm', 'libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm', 'squid-4.11-4.module+el8.4.0+404+316a0dc5.2.aarch64.rpm', 'squid-4.11-4.module+el8.4.0+404+316a0dc5.2.src.rpm', 'squid-4.11-4.module+el8.4.0+404+316a0dc5.2.x86_64.rpm', 'squid-debuginfo-4.11-4.module+el8.4.0+404+316a0dc5.2.aarch64.rpm', 'squid-debuginfo-4.11-4.module+el8.4.0+404+316a0dc5.2.x86_64.rpm', 'squid-debugsource-4.11-4.module+el8.4.0+404+316a0dc5.2.aarch64.rpm', 'squid-debugsource-4.11-4.module+el8.4.0+404+316a0dc5.2.x86_64.rpm']}\

Rocky Linux: RLSA-2021:1979 squid

September 2, 2022
An update for the squid:4 module is now available for Rocky Linux 8

Summary

An update for the squid:4 module is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.


Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

RPMs

libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.aarch64.rpm
libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.src.rpm
libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
libecap-debuginfo-1.0.1-2.module+el8.4.0+404+316a0dc5.aarch64.rpm
libecap-debuginfo-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
libecap-debugsource-1.0.1-2.module+el8.4.0+404+316a0dc5.aarch64.rpm
libecap-debugsource-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.aarch64.rpm
libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
squid-4.11-4.module+el8.4.0+404+316a0dc5.2.aarch64.rpm
squid-4.11-4.module+el8.4.0+404+316a0dc5.2.src.rpm
squid-4.11-4.module+el8.4.0+404+316a0dc5.2.x86_64.rpm
squid-debuginfo-4.11-4.module+el8.4.0+404+316a0dc5.2.aarch64.rpm
squid-debuginfo-4.11-4.module+el8.4.0+404+316a0dc5.2.x86_64.rpm
squid-debugsource-4.11-4.module+el8.4.0+404+316a0dc5.2.aarch64.rpm
squid-debugsource-4.11-4.module+el8.4.0+404+316a0dc5.2.x86_64.rpm

References

Severity
Name: RLSA-2021:1979
Affected Products: Rocky Linux 8

Fixes

https://bugzilla.redhat.com/show_bug.cgi?id=1939925

CVES

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25097.json

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.