2020-04-24 14:21:23 by Nia Alarie | Files touched by this commit (17) |  |
Log message:
www: Remove squid3 - legacy squid package, broken with OpenSSL 1.1
|
2020-04-24 14:14:01 by Nia Alarie | Files touched by this commit (2) |
Log message:
www: Mark packages that fail with OpenSSL 1.1 BROKEN
|
2020-01-18 22:51:16 by Jonathan Perkin | Files touched by this commit (1836) |
Log message:
*: Recursive revision bump for openssl 1.1.1.
|
2019-11-04 23:10:16 by Roland Illig | Files touched by this commit (243) |
Log message:
www: align variable assignments
pkglint -Wall -F --only aligned --only indent -r
Manually excluded phraseanet since pkglint got the indentation wrong.
|
2019-08-11 15:25:21 by Thomas Klausner | Files touched by this commit (3557) |
Log message:
Bump PKGREVISIONs for perl 5.30.0
|
2018-08-22 11:48:07 by Thomas Klausner | Files touched by this commit (3558) |
Log message:
Recursive bump for perl5-5.28.0
|
2018-08-11 03:22:02 by Takahiro Kambe | Files touched by this commit (2) |  |
Log message:
www/squid3: update to 3.5.29
Changes to squid-3.5.28 (15 Jul 2018):
- SQUID-2018:1: crash processing SSL-Bumped traffic containing ESI
- SQUID-2018:2: crash handling responses to internally generated requests
- SQUID-2018:3 / CVE-2018-1172: crash in ESI Response processing
- Bug 4861: HTTPMSGLOCK missing pointer safety
- Bug 4829: IPC shared memory leaks when disker queue overflows
- Bug 4767: SMP breaks IPv6 SNMP and cache manager queries
- Bug 2821: Ignore Content-Range in non-206 responses
- HTCP: Ignore HTCP packets with invalid URI
- SSL-Bump: fix authentication with schemes other than Basic
- TPROXY: Fix clientside_mark and client port logging
- Fix "Cannot assign requested address" for to-origin TPROXY FTP data
- Fix --with-netfilter-conntrack error message
- Validate mime icon URL before allocating store entries
- ... and many documentation changes
|
2018-04-30 10:57:49 by Takahiro Kambe | Files touched by this commit (2) |
Log message:
www/squid3: Add official security patch SQUID-2018_3
Add security patch for SQUID-2018_3.
Bump PKGREVISION.
http://www.squid-cache.org/Advisories/SQUID-2018_3.txt
__________________________________________________________________
Problem Description:
Due to incorrect pointer handling Squid is vulnerable to denial
of service attack when processing ESI responses.
__________________________________________________________________
Severity:
This problem allows a remote server delivering ESI responses
to trigger a denial of service for all clients accessing the
Squid service.
This problem is limited to Squid operating as reverse proxy.
|
2018-01-25 17:54:28 by Bernd Ernesti | Files touched by this commit (1) |
Log message:
Add missing PATCH_SITES for the new patch files in the last commit.
|
2018-01-23 03:28:49 by Takahiro Kambe | Files touched by this commit (2) |
Log message:
www/squid3: Add security patches
Add two official security patches.
o Denial of service attack when processing ESI responses
o Denial of service attack when processing ESI responses or downloading
intermediate CA certificates
http://www.squid-cache.org/Advisories/SQUID-2018_1.txt
http://www.squid-cache.org/Advisories/SQUID-2018_2.txt
Bump PKGREVISION.
|