- Issued:
- 2016-07-26
- Updated:
- 2016-07-26
RHBA-2016:1492 - Bug Fix Advisory
Synopsis
squid bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated squid packages that fix one bug are now available for Red Hat Enterprise Linux 6.
Description
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
This update fixes the following bug:
- Previously, the Squid proxy server sent an incorrect response for the GET-request following the Range-GET request. Red Hat Satellite Proxy customers running their server on Red Hat Enterprise Linux 6 failed to kickstart Red Hat Enterprise Linux 5 client systems. The underlying source code has been fixed, and kickstarting Red Hat Enterprise Linux 5 client systems works as expected. (BZ#1322709)
Users of squid are advised to upgrade to these updated packages, which fix this bug. After installing this update, the squid service will be restarted automatically.
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.7 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.7 i386
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.7 s390x
- Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.7 ppc64
- Red Hat Enterprise Linux for SAP Solutions for x86_64 - Extended Update Support 6.7 x86_64
Fixes
- BZ - 1322709 - Squid send wrong respond for GET-request following Range-GET request
CVEs
(none)
Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.7
SRPM | |
---|---|
squid-3.1.23-9.el6_7.1.src.rpm | SHA-256: d49ebb5ae93eebc30cece8f18a8f86f58f4d803e1d291cc415a671f8c5b86490 |
x86_64 | |
squid-3.1.23-9.el6_7.1.x86_64.rpm | SHA-256: 927092fe020b3d36e3cc841ac9128803c44a07fc8481617f9ca1566b74850729 |
squid-debuginfo-3.1.23-9.el6_7.1.x86_64.rpm | SHA-256: b9d23cc08e77c4d3284cee19dbb8964231adb007bf0a123728a92f446c8c0af0 |
i386 | |
squid-3.1.23-9.el6_7.1.i686.rpm | SHA-256: dab52104d1f26b959e1d72d2d82ac2442ea859dd58247a9adf670f82addf64ce |
squid-debuginfo-3.1.23-9.el6_7.1.i686.rpm | SHA-256: 3f4f4020a0c07eafa9ff5d995ce955ae91f22a472b5ca2cefdfe236604891f91 |
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.7
SRPM | |
---|---|
squid-3.1.23-9.el6_7.1.src.rpm | SHA-256: d49ebb5ae93eebc30cece8f18a8f86f58f4d803e1d291cc415a671f8c5b86490 |
s390x | |
squid-3.1.23-9.el6_7.1.s390x.rpm | SHA-256: 6cab76a5e4a7fe9ea9c43364666a44df73a404d3b24580c4cea0c37ba139d62a |
squid-debuginfo-3.1.23-9.el6_7.1.s390x.rpm | SHA-256: 17799fc449a4db6196a2c80c5bfdd2ea7029b0730b255a2635e8250ed10b66b8 |
Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.7
SRPM | |
---|---|
squid-3.1.23-9.el6_7.1.src.rpm | SHA-256: d49ebb5ae93eebc30cece8f18a8f86f58f4d803e1d291cc415a671f8c5b86490 |
ppc64 | |
squid-3.1.23-9.el6_7.1.ppc64.rpm | SHA-256: defcf3f90437ebdbc479ad6215eab0694b3979c9c4d3ed7596d1e01a1c0a69ef |
squid-debuginfo-3.1.23-9.el6_7.1.ppc64.rpm | SHA-256: 6147f7e1eba063b2911af3cef2c672130d460130ef41e454f4e1147657a34edf |
Red Hat Enterprise Linux for SAP Solutions for x86_64 - Extended Update Support 6.7
SRPM | |
---|---|
squid-3.1.23-9.el6_7.1.src.rpm | SHA-256: d49ebb5ae93eebc30cece8f18a8f86f58f4d803e1d291cc415a671f8c5b86490 |
x86_64 | |
squid-3.1.23-9.el6_7.1.x86_64.rpm | SHA-256: 927092fe020b3d36e3cc841ac9128803c44a07fc8481617f9ca1566b74850729 |
squid-debuginfo-3.1.23-9.el6_7.1.x86_64.rpm | SHA-256: b9d23cc08e77c4d3284cee19dbb8964231adb007bf0a123728a92f446c8c0af0 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.