Commit Graph

143 Commits

Author SHA1 Message Date
ajacoutot
df750b9dca Fix gcc2 patch. 2010-05-20 08:27:33 +00:00
espie
83b43fde15 make sure patch does not get in for gcc2 2010-05-19 07:38:06 +00:00
ajacoutot
ce7c969358 Stupid poor blank lines, stupid poor blank lines... 2010-04-15 14:58:24 +00:00
sthen
6ac85d151f m4 eval.c r1.67 fixed the HAVE_VOID__ problem which was causing
trouble for autoconf 2.62+; remove this workaround which now causes
the build to fail. No bump as the package doesn't change from the
version which last built successfully.

Build failure noticed by naddy@. 'make it so' jasper@, Brad ok.
2010-04-02 00:38:03 +00:00
jasper
82012ecbfd SECURITY FIX for CVE-2010-0308, "Squid DNS Packet Processing
Denial of Service Vulnerability"

brad (MAINTAINER) came up with the same diff
ok ajacoutot@ sthen@
2010-02-03 06:41:17 +00:00
sthen
b63c6b4c36 update to the latest bug fix release in the 2.7 branch. From Brad (maintainer). 2009-10-30 00:56:57 +00:00
jasper
34c1f307c2 Security fix for CVE-2009-2855
ok brad (MAINTAINER)
2009-08-30 21:52:44 +00:00
sthen
ae88779346 bug fix update to Squid 2.7-STABLE6, from Brad. 2009-02-08 15:04:33 +00:00
sthen
8d7d2b4d1b update to 2.7.STABLE5, various bugfixes. From Brad (and running here ~3wks). 2009-01-08 03:37:24 +00:00
brad
464f38be0c Upgrade Squid to 2.7-STABLE4
ok ajacoutot@
2008-08-20 16:35:15 +00:00
brad
ff9d8cf194 Upgrade Squid to 2.7-STABLE3.
ok okan@
2008-07-16 21:18:27 +00:00
jasper
1f76a0180b - update squid to 2.6STABLE20
- update license marker
- remove transparent flavor
- add ldap flavor

from brad@ (MAINTAINER), testing by several users
2008-05-31 10:07:45 +00:00
landry
9f72972268 Add missing @sample markers in PLIST, bump PKGNAME.
from brad@
2008-02-20 09:18:01 +00:00
rui
4da814357f - update squid to 2.6.STABLE18
from brad@
2008-01-28 22:04:00 +00:00
todd
ca63a400d5 update to 2.6.STABLE17
from maint; works and builds ok for me
2007-12-04 01:27:13 +00:00
aanriot
15758c2410 enable the "X-Forwarded-For" headers support which has been added in
Squid 2.6. It's not the default in squid.conf but can be enabled, and
it's useful e.g. when you are using squid through dansguardian, in order
to keep/show the source address of the client in the logs (otherwise,
squid thinks that everything comes from dansguardian).

ok brad@
2007-10-08 07:04:50 +00:00
merdely
c324015314 Update to Squid 2.6.STABLE16.
From brad (MAINTAINER)
ok sthen@
2007-09-10 17:49:23 +00:00
kili
eb4770dc84 Change Brads email address for now, so people can reach him instead of
getting bounces or 550s. Bump pkgnames. While here, remove quotes from
comments.

prompted by espie@
2007-09-01 20:11:21 +00:00
todd
82be18b245 update to 2.6 stable13, from brad@ (maint)
ok kili@ tested by me
2007-05-20 00:52:32 +00:00
robert
1e7cd4578c update to version 2.6.STABLE12 (regen patches while here);
from MAINTAINER; Brad <brad@comstyle.com>
2007-04-12 15:10:02 +00:00
espie
d4ebcd974d more base64 checksums 2007-04-05 17:26:05 +00:00
todd
c49ef31abf bugfix maintenance release update for Squid.
from maint brad@
2007-02-01 07:46:24 +00:00
todd
5b9b91a5d5 bugfix update; from maintainer (brad@) 2007-01-13 16:13:28 +00:00
brad
501f04fa44 upgrade to 2.6.STABLE5 2006-11-13 02:11:39 +00:00
brad
dcee93fbfd fix the MESSAGE file, s/2.5/2.6/ 2006-10-03 18:32:44 +00:00
brad
78924f0824 upgrade to 2.6.STABLE4
Squid 2.6 supports kqueue and hw accelerated SSL via OpenSSL,
as well as many other improvements.
2006-10-03 05:00:49 +00:00
bernd
b8bedd34ec Back out change with no review.
ok espie@, pvalchev@
2006-06-19 11:49:07 +00:00
brad
27ff4e08fa upgrade to 2.5.STABLE14 2006-06-17 03:15:55 +00:00
brad
a20588de08 upgrade to 2.5.STABLE13 2006-04-13 23:46:56 +00:00
brad
7e96195d7d Have Squid open /dev/pf in read-only mode.
From: Andrey Matveev <evol at online dot ptt dot ru>
2006-01-06 01:40:27 +00:00
naddy
bfd5225608 Always explicitly set the AUTOCONF_VERSION to use. In some cases
the default was not appropriate.
2005-11-03 18:28:55 +00:00
brad
c813d99c13 upgrade to 2.5.STABLE12
- [Major] Error introduced in 2.5.STABLE11 causing truncated responses
  when using delay pools (Bug #1405)
2005-10-29 23:26:38 +00:00
brad
f01c664640 upgrade to 2.5.STABLE11
Alex Masterov has reported a vulnerability in Squid,
which potentially can be exploited by malicious people
to cause a DoS.

The vulnerability is caused due to an unspecified error
in the "sslConnectTimeout()" function after handling
malformed requests. This may be exploited to crash Squid.

CAN-2005-2796
2005-09-25 17:03:32 +00:00
brad
5359105907 upgrade to 2.5.STABLE10
- Malicious users may spoof DNS lookups if the DNS client UDP port (random,
  assigned by OS at startup) is unfiltered and your network is not protected
  from IP spoofing.
- CVE-1999-0710, adds access controls to the cachemgr.cgi script, preventing
  it from being abused to reach other servers than allowed in a local
  configuration file.
2005-05-25 02:27:13 +00:00
brad
abdb1f835e upgrade to Squid 2.5.STABLE9 2005-02-25 16:37:25 +00:00
brad
8e2e7b5074 upgrade to Squid 2.5.STABLE8 + patches
Fixes 2 major issues over STABLE7 + the previous round of patches..

- Data corruption when HTTP reply headers is split in several packets
- Assertion failure on certain odd DNS responses
2005-02-17 03:32:24 +00:00
brad
c5a2906562 add missing ERR_INVALID_RESP to PLIST 2005-02-11 02:47:55 +00:00
brad
a754b815eb fix for ldap_search 2005-02-05 21:36:30 +00:00
brad
29a54c815a SECURITY:
add most of the latest distribution patches which include 4 security
fixes.

-Correct handling of oversized reply headers
-Buffer overflow in WCCP recvfrom() call
-Strengthen Squid from HTTP response splitting cache pollution attack
-Reject malformed HTTP requests and responses that conflict with the HTTP specifications
2005-02-04 04:27:38 +00:00
brad
6c1b677ada Fix 2 security issues...
A bug exists in the code that parses responses from Gopher servers.
The bug results in a buffer overflow if a Gopher server returns a
line longer than 4096 bytes.  The overflow results in memory
corruption and usually crashes Squid.

CAN-2005-0094

A bug exists in the code that parses WCCP messages.  An attacker
that sends a malformed WCCP messages, with a spoofed source address
matching Squid's "home router" can crash Squid.

CAN-2005-0095
2005-01-26 05:08:11 +00:00
naddy
ae76d3ea1f SIZE 2005-01-05 17:21:50 +00:00
alek
61a5f078cf - Kill DEINSTALL
- Replace INSTALL with @samples, @execs, etc.
- Add WANTLIB marker
- Bump PKGNAME
2004-12-07 19:33:33 +00:00
brad
91bd55630f use @newgroup / @newuser 2004-10-31 07:20:29 +00:00
brad
7d4db47663 better 2004-10-31 06:54:37 +00:00
brad
3935b2a8bb upgrade to Squid 2.5.STABLE7
A parsing error exists in the SNMP module of Squid where a
specially-crafted UDP packet can potentially cause the server to
restart, closing all current connections.
2004-10-20 21:44:20 +00:00
espie
e44839e34b new plists.
comment out netscape-dynmotif, since we don't have the required motif lib.
2004-09-15 18:49:48 +00:00
naddy
6b9c0f500b fix up MODGNU_CONFIG_GUESS_DIRS 2004-08-04 16:12:14 +00:00
brad
4532560e76 sync 2004-07-11 17:05:03 +00:00
brad
333f7e2260 upgrade to Squid 2.5.STABLE6 2004-07-11 17:00:47 +00:00
brad
d84edf1a11 remove messages about user/group change. 2004-06-24 03:16:55 +00:00