The Squid proxy caching server
Go to file
Luboš Uhliarik 43e21cffe5 Resolves: RHEL-19552 - squid:4/squid: denial of service in HTTP request 2024-02-03 04:40:39 +00:00
.gitignore Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875 2023-02-23 23:53:07 -05:00
.squid.metadata Resolves: RHEL-19552 - squid:4/squid: denial of service in HTTP request 2024-02-03 04:40:39 +00:00
cache_swap.sh Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875 2022-08-08 14:08:02 -04:00
gating.yaml Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875 2022-08-08 14:08:02 -04:00
perl-requires-squid.sh Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875 2022-08-08 14:08:02 -04:00
sources Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875 2023-02-23 23:53:07 -05:00
squid-3.0.STABLE1-perlpath.patch Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875 2022-08-08 14:08:02 -04:00
squid-3.1.0.9-location.patch Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875 2022-08-08 14:08:02 -04:00
squid-3.5.9-include-guards.patch Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875 2022-08-08 14:08:02 -04:00
squid-4.0.11-config.patch Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875 2022-08-08 14:08:02 -04:00
squid-4.11-active-ftp.patch Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875 2022-08-08 14:08:02 -04:00
squid-4.11-config.patch Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875 2022-08-08 14:08:02 -04:00
squid-4.11-convert-ipv4.patch Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875 2022-08-08 14:08:02 -04:00
squid-4.11-include-guards.patch Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875 2022-08-08 14:08:02 -04:00
squid-4.11-large-acl.patch Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875 2022-08-08 14:08:02 -04:00
squid-4.11-location.patch Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875 2022-08-08 14:08:02 -04:00
squid-4.11-perlpath.patch Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875 2022-08-08 14:08:02 -04:00
squid-4.15-CVE-2021-28116.patch Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875 2022-08-08 14:08:02 -04:00
squid-4.15-CVE-2021-46784.patch Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875 2023-02-23 13:20:48 -05:00
squid-4.15-CVE-2022-41318.patch Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875 2023-02-23 13:20:48 -05:00
squid-4.15-CVE-2023-5824.patch Resolves: RHEL-18351 - squid:4/squid: Buffer over-read in the HTTP Message 2024-02-02 05:07:35 +01:00
squid-4.15-CVE-2023-46724.patch Resolves: RHEL-18351 - squid:4/squid: Buffer over-read in the HTTP Message 2024-02-02 05:07:35 +01:00
squid-4.15-CVE-2023-46728.patch Resolves: RHEL-18351 - squid:4/squid: Buffer over-read in the HTTP Message 2024-02-02 05:07:35 +01:00
squid-4.15-CVE-2023-46846.patch Resolves: RHEL-18351 - squid:4/squid: Buffer over-read in the HTTP Message 2024-02-02 05:07:35 +01:00
squid-4.15-CVE-2023-46847.patch Resolves: RHEL-18351 - squid:4/squid: Buffer over-read in the HTTP Message 2024-02-02 05:07:35 +01:00
squid-4.15-CVE-2023-49285.patch Resolves: RHEL-18351 - squid:4/squid: Buffer over-read in the HTTP Message 2024-02-02 05:07:35 +01:00
squid-4.15-CVE-2023-49286.patch Resolves: RHEL-18351 - squid:4/squid: Buffer over-read in the HTTP Message 2024-02-02 05:07:35 +01:00
squid-4.15-CVE-2023-50269.patch Resolves: RHEL-19552 - squid:4/squid: denial of service in HTTP request 2024-02-03 04:40:39 +00:00
squid-4.15-ftp-filename-extraction.patch Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875 2022-08-08 14:08:02 -04:00
squid-4.15-halfclosed.patch Resolves: #2076717 - Crash with half_closed_client on 2023-08-16 14:18:50 +02:00
squid-4.15-ip-bind-address-no-port.patch Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875 2023-02-23 13:20:48 -05:00
squid-4.15.tar.xz.asc Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875 2022-08-08 14:08:02 -04:00
squid-5.0.5-symlink-lang-err.patch Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875 2022-08-08 14:08:02 -04:00
squid-5.0.6-active-ftp.patch Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875 2022-08-08 14:08:02 -04:00
squid-5.0.6-openssl3.patch Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875 2022-08-08 14:08:02 -04:00
squid-5.1-test-store-cppsuite.patch Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875 2022-08-08 14:08:02 -04:00
squid-5.5-CVE-2021-46784.patch Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875 2022-08-08 14:08:02 -04:00
squid.logrotate Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875 2022-08-08 14:08:02 -04:00
squid.nm Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875 2022-08-08 14:08:02 -04:00
squid.pam Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875 2022-08-08 14:08:02 -04:00
squid.service Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875 2022-08-08 14:08:02 -04:00
squid.spec Resolves: RHEL-19552 - squid:4/squid: denial of service in HTTP request 2024-02-03 04:40:39 +00:00
squid.sysconfig Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875 2022-08-08 14:08:02 -04:00