update to squid-4.11

SQUID-2020:3 - Due to incorrect buffer handling Squid is vulnerable to
cache poisoning, remote execution, and denial of service attacks when
processing ESI responses.

SQUID-2020:4 - Due to an integer overflow bug Squid is vulnerable to
credential replay and remote code execution attacks against HTTP Digest
Authentication tokens.
This commit is contained in:
sthen 2020-04-23 10:54:48 +00:00
parent ade3ae46cc
commit e63e83eee1
2 changed files with 4 additions and 4 deletions

View File

@ -1,10 +1,10 @@
# $OpenBSD: Makefile,v 1.222 2020/04/06 22:11:21 sthen Exp $
# $OpenBSD: Makefile,v 1.223 2020/04/23 10:54:48 sthen Exp $
COMMENT-main= WWW and FTP proxy cache and accelerator
COMMENT-ldap= LDAP authentication/ACL support for Squid
COMMENT-ntlm= NTLM authentication/ACL support for Squid
V= 4.10
V= 4.11
DISTNAME= squid-$V
EXTRACT_SUFX= .tar.xz
PKGNAME-main= squid-$V

View File

@ -1,2 +1,2 @@
SHA256 (squid-4.10.tar.xz) = mPAQCv2KQupfa4HrmLDks216VL6rHHPS8XBatJsCXx8=
SIZE (squid-4.10.tar.xz) = 2445848
SHA256 (squid-4.11.tar.xz) = TtlHYSQQJj9XrQ45v9CH5g+3FPAo19Ow5GmUPv00KH0=
SIZE (squid-4.11.tar.xz) = 2447700