Commit Graph

105 Commits

Author SHA1 Message Date
espie
c82c4422b0 USE_GROFF=Yes 2010-10-19 08:02:53 +00:00
sthen
b363d9e7cc update to 2.7.STABLE9, from Brad (maintainer) 2010-06-18 10:32:17 +00:00
espie
83b43fde15 make sure patch does not get in for gcc2 2010-05-19 07:38:06 +00:00
ajacoutot
ce7c969358 Stupid poor blank lines, stupid poor blank lines... 2010-04-15 14:58:24 +00:00
jasper
82012ecbfd SECURITY FIX for CVE-2010-0308, "Squid DNS Packet Processing
Denial of Service Vulnerability"

brad (MAINTAINER) came up with the same diff
ok ajacoutot@ sthen@
2010-02-03 06:41:17 +00:00
sthen
b63c6b4c36 update to the latest bug fix release in the 2.7 branch. From Brad (maintainer). 2009-10-30 00:56:57 +00:00
jasper
34c1f307c2 Security fix for CVE-2009-2855
ok brad (MAINTAINER)
2009-08-30 21:52:44 +00:00
sthen
ae88779346 bug fix update to Squid 2.7-STABLE6, from Brad. 2009-02-08 15:04:33 +00:00
sthen
8d7d2b4d1b update to 2.7.STABLE5, various bugfixes. From Brad (and running here ~3wks). 2009-01-08 03:37:24 +00:00
brad
464f38be0c Upgrade Squid to 2.7-STABLE4
ok ajacoutot@
2008-08-20 16:35:15 +00:00
brad
ff9d8cf194 Upgrade Squid to 2.7-STABLE3.
ok okan@
2008-07-16 21:18:27 +00:00
jasper
1f76a0180b - update squid to 2.6STABLE20
- update license marker
- remove transparent flavor
- add ldap flavor

from brad@ (MAINTAINER), testing by several users
2008-05-31 10:07:45 +00:00
landry
9f72972268 Add missing @sample markers in PLIST, bump PKGNAME.
from brad@
2008-02-20 09:18:01 +00:00
rui
4da814357f - update squid to 2.6.STABLE18
from brad@
2008-01-28 22:04:00 +00:00
todd
ca63a400d5 update to 2.6.STABLE17
from maint; works and builds ok for me
2007-12-04 01:27:13 +00:00
aanriot
15758c2410 enable the "X-Forwarded-For" headers support which has been added in
Squid 2.6. It's not the default in squid.conf but can be enabled, and
it's useful e.g. when you are using squid through dansguardian, in order
to keep/show the source address of the client in the logs (otherwise,
squid thinks that everything comes from dansguardian).

ok brad@
2007-10-08 07:04:50 +00:00
merdely
c324015314 Update to Squid 2.6.STABLE16.
From brad (MAINTAINER)
ok sthen@
2007-09-10 17:49:23 +00:00
kili
eb4770dc84 Change Brads email address for now, so people can reach him instead of
getting bounces or 550s. Bump pkgnames. While here, remove quotes from
comments.

prompted by espie@
2007-09-01 20:11:21 +00:00
todd
82be18b245 update to 2.6 stable13, from brad@ (maint)
ok kili@ tested by me
2007-05-20 00:52:32 +00:00
robert
1e7cd4578c update to version 2.6.STABLE12 (regen patches while here);
from MAINTAINER; Brad <brad@comstyle.com>
2007-04-12 15:10:02 +00:00
todd
c49ef31abf bugfix maintenance release update for Squid.
from maint brad@
2007-02-01 07:46:24 +00:00
todd
5b9b91a5d5 bugfix update; from maintainer (brad@) 2007-01-13 16:13:28 +00:00
brad
501f04fa44 upgrade to 2.6.STABLE5 2006-11-13 02:11:39 +00:00
brad
dcee93fbfd fix the MESSAGE file, s/2.5/2.6/ 2006-10-03 18:32:44 +00:00
brad
78924f0824 upgrade to 2.6.STABLE4
Squid 2.6 supports kqueue and hw accelerated SSL via OpenSSL,
as well as many other improvements.
2006-10-03 05:00:49 +00:00
bernd
b8bedd34ec Back out change with no review.
ok espie@, pvalchev@
2006-06-19 11:49:07 +00:00
brad
27ff4e08fa upgrade to 2.5.STABLE14 2006-06-17 03:15:55 +00:00
brad
a20588de08 upgrade to 2.5.STABLE13 2006-04-13 23:46:56 +00:00
brad
7e96195d7d Have Squid open /dev/pf in read-only mode.
From: Andrey Matveev <evol at online dot ptt dot ru>
2006-01-06 01:40:27 +00:00
naddy
bfd5225608 Always explicitly set the AUTOCONF_VERSION to use. In some cases
the default was not appropriate.
2005-11-03 18:28:55 +00:00
brad
c813d99c13 upgrade to 2.5.STABLE12
- [Major] Error introduced in 2.5.STABLE11 causing truncated responses
  when using delay pools (Bug #1405)
2005-10-29 23:26:38 +00:00
brad
f01c664640 upgrade to 2.5.STABLE11
Alex Masterov has reported a vulnerability in Squid,
which potentially can be exploited by malicious people
to cause a DoS.

The vulnerability is caused due to an unspecified error
in the "sslConnectTimeout()" function after handling
malformed requests. This may be exploited to crash Squid.

CAN-2005-2796
2005-09-25 17:03:32 +00:00
brad
5359105907 upgrade to 2.5.STABLE10
- Malicious users may spoof DNS lookups if the DNS client UDP port (random,
  assigned by OS at startup) is unfiltered and your network is not protected
  from IP spoofing.
- CVE-1999-0710, adds access controls to the cachemgr.cgi script, preventing
  it from being abused to reach other servers than allowed in a local
  configuration file.
2005-05-25 02:27:13 +00:00
brad
abdb1f835e upgrade to Squid 2.5.STABLE9 2005-02-25 16:37:25 +00:00
brad
8e2e7b5074 upgrade to Squid 2.5.STABLE8 + patches
Fixes 2 major issues over STABLE7 + the previous round of patches..

- Data corruption when HTTP reply headers is split in several packets
- Assertion failure on certain odd DNS responses
2005-02-17 03:32:24 +00:00
brad
c5a2906562 add missing ERR_INVALID_RESP to PLIST 2005-02-11 02:47:55 +00:00
brad
29a54c815a SECURITY:
add most of the latest distribution patches which include 4 security
fixes.

-Correct handling of oversized reply headers
-Buffer overflow in WCCP recvfrom() call
-Strengthen Squid from HTTP response splitting cache pollution attack
-Reject malformed HTTP requests and responses that conflict with the HTTP specifications
2005-02-04 04:27:38 +00:00
brad
6c1b677ada Fix 2 security issues...
A bug exists in the code that parses responses from Gopher servers.
The bug results in a buffer overflow if a Gopher server returns a
line longer than 4096 bytes.  The overflow results in memory
corruption and usually crashes Squid.

CAN-2005-0094

A bug exists in the code that parses WCCP messages.  An attacker
that sends a malformed WCCP messages, with a spoofed source address
matching Squid's "home router" can crash Squid.

CAN-2005-0095
2005-01-26 05:08:11 +00:00
alek
61a5f078cf - Kill DEINSTALL
- Replace INSTALL with @samples, @execs, etc.
- Add WANTLIB marker
- Bump PKGNAME
2004-12-07 19:33:33 +00:00
brad
3935b2a8bb upgrade to Squid 2.5.STABLE7
A parsing error exists in the SNMP module of Squid where a
specially-crafted UDP packet can potentially cause the server to
restart, closing all current connections.
2004-10-20 21:44:20 +00:00
naddy
6b9c0f500b fix up MODGNU_CONFIG_GUESS_DIRS 2004-08-04 16:12:14 +00:00
brad
333f7e2260 upgrade to Squid 2.5.STABLE6 2004-07-11 17:00:47 +00:00
brad
86d502ddb4 - add 2 more distribution patches
- add snmp FLAVOR from Joel CARNAT <joel at carnat dot net>
- add some auth types and auth/acl helpers
- add NTLM auth SMB patch even though the default port does NOT compile this support in
2004-06-11 08:00:35 +00:00
brad
be1ae753c5 more distribution patches 2004-06-02 21:39:59 +00:00
brad
5c7d163fec Add 2 more distribution patches. One of them fixes an issue if using
Digest authentication. Users can crash Squid with a segmentation fault
simply by entering a blank user name.
2004-04-21 11:11:19 +00:00
brad
145a5e937b - add some distribution patches. From: Robert Nagy <thuglife at bsd dot hu>
- only apply optimization workaround for gcc if using 2.95
2004-04-13 00:40:47 +00:00
brad
b765b0c3ec upgrade to Squid 2.5.STABLE5 2004-03-03 01:20:42 +00:00
naddy
f16b99d84d The sparc64 compiler is gcc3 now; don't require the gcc3 module. 2004-02-25 02:35:15 +00:00
brad
b1f0d46719 add 29 of the latest distribution patches. 2004-02-16 10:21:20 +00:00
brad
4e2e7789ec upgrade to Squid 2.5.STABLE4 2003-10-17 18:03:54 +00:00