The Squid proxy caching server
Go to file
Luboš Uhliarik eaa264aa2b Resolves: RHEL-19556 - squid: denial of service in HTTP request 2024-02-02 04:43:05 +00:00
.gitignore RHEL 9.0.0 Alpha bootstrap 2020-10-20 08:24:33 -07:00
.squid.metadata Resolves: RHEL-19556 - squid: denial of service in HTTP request 2024-02-02 04:43:05 +00:00
cache_swap.sh RHEL 9.0.0 Alpha bootstrap 2020-10-20 08:24:33 -07:00
gating.yaml Adding gating configuration 2021-05-19 09:25:58 +02:00
perl-requires-squid.sh RHEL 9.0.0 Alpha bootstrap 2020-10-20 08:24:33 -07:00
sources new version 5.5 2022-05-31 15:38:14 +02:00
squid-3.0.STABLE1-perlpath.patch new version 5.5 2022-05-31 15:38:14 +02:00
squid-3.1.0.9-location.patch RHEL 9.0.0 Alpha bootstrap 2020-10-20 08:24:33 -07:00
squid-3.5.9-include-guards.patch RHEL 9.0.0 Alpha bootstrap 2020-10-20 08:24:33 -07:00
squid-4.0.11-config.patch RHEL 9.0.0 Alpha bootstrap 2020-10-20 08:24:33 -07:00
squid-5.0.5-symlink-lang-err.patch new version 5.5 2022-05-31 15:38:14 +02:00
squid-5.0.6-active-ftp.patch Resolves: #1969322 - squid doesn't work with active ftp 2021-06-08 10:50:07 +02:00
squid-5.0.6-openssl3.patch Resolves: #1985231 - squid: FTBFS because of OpenSSL 3.0 preprocessor macro 2021-08-05 22:33:36 +02:00
squid-5.1-test-store-cppsuite.patch Resolves: #1988122 - Enable LTO build of squid for RHEL 9 2021-09-16 01:06:17 +02:00
squid-5.5-CVE-2021-46784.patch Resolves: #2100785 - CVE-2021-46784 squid: DoS when processing gopher server 2022-07-11 11:29:04 +02:00
squid-5.5-CVE-2022-41318.patch Resolves: #2130253 - CVE-2022-41318 squid: buffer-over-read in SSPI and SMB 2022-11-07 17:57:07 +01:00
squid-5.5-CVE-2023-5824.patch Resolves: RHEL-18354 - squid: Buffer over-read in the HTTP Message processing 2024-02-01 16:47:43 +01:00
squid-5.5-CVE-2023-46724.patch Resolves: RHEL-18354 - squid: Buffer over-read in the HTTP Message processing 2024-02-01 16:47:43 +01:00
squid-5.5-CVE-2023-46728.patch Resolves: RHEL-18354 - squid: Buffer over-read in the HTTP Message processing 2024-02-01 16:47:43 +01:00
squid-5.5-CVE-2023-46846.patch Resolves: RHEL-14820 - squid: squid: denial of Servicein FTP 2023-11-12 05:29:58 +01:00
squid-5.5-CVE-2023-46847.patch Resolves: RHEL-14820 - squid: squid: denial of Servicein FTP 2023-11-12 05:29:58 +01:00
squid-5.5-CVE-2023-46848.patch Resolves: RHEL-14820 - squid: squid: denial of Servicein FTP 2023-11-12 05:29:58 +01:00
squid-5.5-CVE-2023-49285.patch Resolves: RHEL-18354 - squid: Buffer over-read in the HTTP Message processing 2024-02-01 16:47:43 +01:00
squid-5.5-CVE-2023-49286.patch Resolves: RHEL-18354 - squid: Buffer over-read in the HTTP Message processing 2024-02-01 16:47:43 +01:00
squid-5.5-CVE-2023-50269.patch Resolves: RHEL-19556 - squid: denial of service in HTTP request 2024-02-02 04:43:05 +00:00
squid-5.5-halfclosed.patch Resolves: #2231827 - Crash with half_closed_client on 2023-08-16 15:10:34 +02:00
squid-5.5-ip-bind-address-no-port.patch Resolves: #2151188 - [RFE] Add the "IP_BIND_ADDRESS_NO_PORT" 2022-12-06 11:18:27 +01:00
squid.logrotate RHEL 9.0.0 Alpha bootstrap 2020-10-20 08:24:33 -07:00
squid.nm RHEL 9.0.0 Alpha bootstrap 2020-10-20 08:24:33 -07:00
squid.pam RHEL 9.0.0 Alpha bootstrap 2020-10-20 08:24:33 -07:00
squid.service RHEL 9.0.0 Alpha bootstrap 2020-10-20 08:24:33 -07:00
squid.spec Resolves: RHEL-19556 - squid: denial of service in HTTP request 2024-02-02 04:43:05 +00:00
squid.sysconfig RHEL 9.0.0 Alpha bootstrap 2020-10-20 08:24:33 -07:00
squid.sysusers Resolves: #2095468 - [RFE] squid use systemd-sysusers 2022-11-07 19:19:09 +01:00