.gitignore
|
RHEL 9.0.0 Alpha bootstrap
|
2020-10-20 08:24:33 -07:00 |
cache_swap.sh
|
RHEL 9.0.0 Alpha bootstrap
|
2020-10-20 08:24:33 -07:00 |
gating.yaml
|
Adding gating configuration
|
2021-05-19 09:25:58 +02:00 |
perl-requires-squid.sh
|
RHEL 9.0.0 Alpha bootstrap
|
2020-10-20 08:24:33 -07:00 |
sources
|
new version 5.5
|
2022-05-31 15:38:14 +02:00 |
squid-3.0.STABLE1-perlpath.patch
|
new version 5.5
|
2022-05-31 15:38:14 +02:00 |
squid-3.1.0.9-location.patch
|
RHEL 9.0.0 Alpha bootstrap
|
2020-10-20 08:24:33 -07:00 |
squid-3.5.9-include-guards.patch
|
RHEL 9.0.0 Alpha bootstrap
|
2020-10-20 08:24:33 -07:00 |
squid-4.0.11-config.patch
|
RHEL 9.0.0 Alpha bootstrap
|
2020-10-20 08:24:33 -07:00 |
squid-5.0.5-symlink-lang-err.patch
|
new version 5.5
|
2022-05-31 15:38:14 +02:00 |
squid-5.0.6-active-ftp.patch
|
Resolves: #1969322 - squid doesn't work with active ftp
|
2021-06-08 10:50:07 +02:00 |
squid-5.0.6-openssl3.patch
|
Resolves: #1985231 - squid: FTBFS because of OpenSSL 3.0 preprocessor macro
|
2021-08-05 22:33:36 +02:00 |
squid-5.1-test-store-cppsuite.patch
|
Resolves: #1988122 - Enable LTO build of squid for RHEL 9
|
2021-09-16 01:06:17 +02:00 |
squid-5.5-CVE-2021-46784.patch
|
Resolves: #2100785 - CVE-2021-46784 squid: DoS when processing gopher server
|
2022-07-11 11:29:04 +02:00 |
squid-5.5-CVE-2022-41318.patch
|
Resolves: #2130253 - CVE-2022-41318 squid: buffer-over-read in SSPI and SMB
|
2022-11-07 17:57:07 +01:00 |
squid-5.5-CVE-2023-5824.patch
|
Resolves: RHEL-18354 - squid: Buffer over-read in the HTTP Message processing
|
2024-02-01 16:47:43 +01:00 |
squid-5.5-CVE-2023-46724.patch
|
Resolves: RHEL-18354 - squid: Buffer over-read in the HTTP Message processing
|
2024-02-01 16:47:43 +01:00 |
squid-5.5-CVE-2023-46728.patch
|
Resolves: RHEL-18354 - squid: Buffer over-read in the HTTP Message processing
|
2024-02-01 16:47:43 +01:00 |
squid-5.5-CVE-2023-46846.patch
|
Resolves: RHEL-14820 - squid: squid: denial of Servicein FTP
|
2023-11-12 05:29:58 +01:00 |
squid-5.5-CVE-2023-46847.patch
|
Resolves: RHEL-14820 - squid: squid: denial of Servicein FTP
|
2023-11-12 05:29:58 +01:00 |
squid-5.5-CVE-2023-46848.patch
|
Resolves: RHEL-14820 - squid: squid: denial of Servicein FTP
|
2023-11-12 05:29:58 +01:00 |
squid-5.5-CVE-2023-49285.patch
|
Resolves: RHEL-18354 - squid: Buffer over-read in the HTTP Message processing
|
2024-02-01 16:47:43 +01:00 |
squid-5.5-CVE-2023-49286.patch
|
Resolves: RHEL-18354 - squid: Buffer over-read in the HTTP Message processing
|
2024-02-01 16:47:43 +01:00 |
squid-5.5-CVE-2023-50269.patch
|
Resolves: RHEL-19556 - squid: denial of service in HTTP request
|
2024-02-02 02:37:40 +01:00 |
squid-5.5-CVE-2024-25111.patch
|
Resolves: RHEL-28530 - squid: Denial of Service in HTTP Chunked
|
2024-03-19 15:58:27 +01:00 |
squid-5.5-CVE-2024-25617.patch
|
Resolves: RHEL-28530 - squid: Denial of Service in HTTP Chunked
|
2024-03-19 15:58:27 +01:00 |
squid-5.5-halfclosed.patch
|
Resolves: #2231827 - Crash with half_closed_client on
|
2023-08-16 15:10:34 +02:00 |
squid-5.5-ip-bind-address-no-port.patch
|
Resolves: #2151188 - [RFE] Add the "IP_BIND_ADDRESS_NO_PORT"
|
2022-12-06 11:18:27 +01:00 |
squid.logrotate
|
RHEL 9.0.0 Alpha bootstrap
|
2020-10-20 08:24:33 -07:00 |
squid.nm
|
RHEL 9.0.0 Alpha bootstrap
|
2020-10-20 08:24:33 -07:00 |
squid.pam
|
RHEL 9.0.0 Alpha bootstrap
|
2020-10-20 08:24:33 -07:00 |
squid.service
|
RHEL 9.0.0 Alpha bootstrap
|
2020-10-20 08:24:33 -07:00 |
squid.spec
|
Resolves: RHEL-28530 - squid: Denial of Service in HTTP Chunked
|
2024-03-19 15:58:27 +01:00 |
squid.sysconfig
|
RHEL 9.0.0 Alpha bootstrap
|
2020-10-20 08:24:33 -07:00 |
squid.sysusers
|
Resolves: #2095468 - [RFE] squid use systemd-sysusers
|
2022-11-07 19:19:09 +01:00 |