update to squid-3.5.23

<http://www.squid-cache.org/Advisories/SQUID-2016_10.txt>
Incorrect HTTP Request header comparison results in Collapsed
Forwarding feature mistakenly identifying some private responses as
being suitable for delivery to multiple clients.

<http://www.squid-cache.org/Advisories/SQUID-2016_11.txt>
Incorrect processing of responses to If-None-Modified HTTP conditional
requests leads to client-specific Cookie data being leaked to other
clients. Attack requests can easily be crafted by a client to probe a
cache for this information.
This commit is contained in:
sthen 2016-12-18 22:36:52 +00:00
parent df77324de6
commit d2f20ed67b
2 changed files with 4 additions and 4 deletions

View File

@ -1,10 +1,10 @@
# $OpenBSD: Makefile,v 1.189 2016/10/11 13:47:44 sthen Exp $
# $OpenBSD: Makefile,v 1.190 2016/12/18 22:36:52 sthen Exp $
COMMENT-main= WWW and FTP proxy cache and accelerator
COMMENT-ldap= LDAP authentication/ACL support for Squid
COMMENT-ntlm= NTLM authentication/ACL support for Squid
V= 3.5.22
V= 3.5.23
DISTNAME= squid-$V
EXTRACT_SUFX= .tar.xz
PKGNAME-main= squid-$V

View File

@ -1,2 +1,2 @@
SHA256 (squid-3.5.22.tar.xz) = HOlbRpJXq+su2KHAQXgSMBwe9aTMQMpQQWfapHCtk1g=
SIZE (squid-3.5.22.tar.xz) = 2324164
SHA256 (squid-3.5.23.tar.xz) = +kwMmfQekv4TML7Tlo0XbG9H7y466i+Dl31VAa+kC9s=
SIZE (squid-3.5.23.tar.xz) = 2325884