update to squid-4.11
SQUID-2020:3 - Due to incorrect buffer handling Squid is vulnerable to cache poisoning, remote execution, and denial of service attacks when processing ESI responses. SQUID-2020:4 - Due to an integer overflow bug Squid is vulnerable to credential replay and remote code execution attacks against HTTP Digest Authentication tokens.
This commit is contained in:
parent
ade3ae46cc
commit
e63e83eee1
@ -1,10 +1,10 @@
|
||||
# $OpenBSD: Makefile,v 1.222 2020/04/06 22:11:21 sthen Exp $
|
||||
# $OpenBSD: Makefile,v 1.223 2020/04/23 10:54:48 sthen Exp $
|
||||
|
||||
COMMENT-main= WWW and FTP proxy cache and accelerator
|
||||
COMMENT-ldap= LDAP authentication/ACL support for Squid
|
||||
COMMENT-ntlm= NTLM authentication/ACL support for Squid
|
||||
|
||||
V= 4.10
|
||||
V= 4.11
|
||||
DISTNAME= squid-$V
|
||||
EXTRACT_SUFX= .tar.xz
|
||||
PKGNAME-main= squid-$V
|
||||
|
@ -1,2 +1,2 @@
|
||||
SHA256 (squid-4.10.tar.xz) = mPAQCv2KQupfa4HrmLDks216VL6rHHPS8XBatJsCXx8=
|
||||
SIZE (squid-4.10.tar.xz) = 2445848
|
||||
SHA256 (squid-4.11.tar.xz) = TtlHYSQQJj9XrQ45v9CH5g+3FPAo19Ow5GmUPv00KH0=
|
||||
SIZE (squid-4.11.tar.xz) = 2447700
|
||||
|
Loading…
x
Reference in New Issue
Block a user