.gitignore
|
Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875
|
2023-02-23 23:53:07 -05:00 |
cache_swap.sh
|
Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875
|
2022-08-08 14:08:02 -04:00 |
gating.yaml
|
Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875
|
2022-08-08 14:08:02 -04:00 |
perl-requires-squid.sh
|
Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875
|
2022-08-08 14:08:02 -04:00 |
sources
|
Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875
|
2023-02-23 23:53:07 -05:00 |
squid-3.0.STABLE1-perlpath.patch
|
Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875
|
2022-08-08 14:08:02 -04:00 |
squid-3.1.0.9-location.patch
|
Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875
|
2022-08-08 14:08:02 -04:00 |
squid-3.5.9-include-guards.patch
|
Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875
|
2022-08-08 14:08:02 -04:00 |
squid-4.0.11-config.patch
|
Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875
|
2022-08-08 14:08:02 -04:00 |
squid-4.11-active-ftp.patch
|
Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875
|
2022-08-08 14:08:02 -04:00 |
squid-4.11-config.patch
|
Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875
|
2022-08-08 14:08:02 -04:00 |
squid-4.11-convert-ipv4.patch
|
Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875
|
2022-08-08 14:08:02 -04:00 |
squid-4.11-include-guards.patch
|
Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875
|
2022-08-08 14:08:02 -04:00 |
squid-4.11-large-acl.patch
|
Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875
|
2022-08-08 14:08:02 -04:00 |
squid-4.11-location.patch
|
Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875
|
2022-08-08 14:08:02 -04:00 |
squid-4.11-perlpath.patch
|
Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875
|
2022-08-08 14:08:02 -04:00 |
squid-4.15-CVE-2021-28116.patch
|
Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875
|
2022-08-08 14:08:02 -04:00 |
squid-4.15-CVE-2021-46784.patch
|
Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875
|
2023-02-23 13:20:48 -05:00 |
squid-4.15-CVE-2022-41318.patch
|
Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875
|
2023-02-23 13:20:48 -05:00 |
squid-4.15-CVE-2023-5824.patch
|
Resolves: RHEL-18351 - squid:4/squid: Buffer over-read in the HTTP Message
|
2024-02-02 05:07:35 +01:00 |
squid-4.15-CVE-2023-46724.patch
|
Resolves: RHEL-18351 - squid:4/squid: Buffer over-read in the HTTP Message
|
2024-02-02 05:07:35 +01:00 |
squid-4.15-CVE-2023-46728.patch
|
Resolves: RHEL-18351 - squid:4/squid: Buffer over-read in the HTTP Message
|
2024-02-02 05:07:35 +01:00 |
squid-4.15-CVE-2023-46846.patch
|
Resolves: RHEL-18351 - squid:4/squid: Buffer over-read in the HTTP Message
|
2024-02-02 05:07:35 +01:00 |
squid-4.15-CVE-2023-46847.patch
|
Resolves: RHEL-18351 - squid:4/squid: Buffer over-read in the HTTP Message
|
2024-02-02 05:07:35 +01:00 |
squid-4.15-CVE-2023-49285.patch
|
Resolves: RHEL-18351 - squid:4/squid: Buffer over-read in the HTTP Message
|
2024-02-02 05:07:35 +01:00 |
squid-4.15-CVE-2023-49286.patch
|
Resolves: RHEL-18351 - squid:4/squid: Buffer over-read in the HTTP Message
|
2024-02-02 05:07:35 +01:00 |
squid-4.15-CVE-2023-50269.patch
|
Resolves: RHEL-19552 - squid:4/squid: denial of service in HTTP request
|
2024-02-02 05:47:19 +01:00 |
squid-4.15-CVE-2024-25111.patch
|
Resolves: RHEL-28529 - squid:4/squid: Denial of Service in HTTP Chunked
|
2024-03-19 16:52:20 +01:00 |
squid-4.15-CVE-2024-25617.patch
|
Resolves: RHEL-28529 - squid:4/squid: Denial of Service in HTTP Chunked
|
2024-03-19 16:52:20 +01:00 |
squid-4.15-ftp-filename-extraction.patch
|
Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875
|
2022-08-08 14:08:02 -04:00 |
squid-4.15-halfclosed.patch
|
Resolves: #2076717 - Crash with half_closed_client on
|
2023-08-16 14:18:50 +02:00 |
squid-4.15-ip-bind-address-no-port.patch
|
Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875
|
2023-02-23 13:20:48 -05:00 |
squid-4.15.tar.xz.asc
|
Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875
|
2022-08-08 14:08:02 -04:00 |
squid-5.0.5-symlink-lang-err.patch
|
Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875
|
2022-08-08 14:08:02 -04:00 |
squid-5.0.6-active-ftp.patch
|
Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875
|
2022-08-08 14:08:02 -04:00 |
squid-5.0.6-openssl3.patch
|
Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875
|
2022-08-08 14:08:02 -04:00 |
squid-5.1-test-store-cppsuite.patch
|
Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875
|
2022-08-08 14:08:02 -04:00 |
squid-5.5-CVE-2021-46784.patch
|
Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875
|
2022-08-08 14:08:02 -04:00 |
squid.logrotate
|
Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875
|
2022-08-08 14:08:02 -04:00 |
squid.nm
|
Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875
|
2022-08-08 14:08:02 -04:00 |
squid.pam
|
Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875
|
2022-08-08 14:08:02 -04:00 |
squid.service
|
Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875
|
2022-08-08 14:08:02 -04:00 |
squid.spec
|
Resolves: RHEL-28529 - squid:4/squid: Denial of Service in HTTP Chunked
|
2024-03-19 16:52:20 +01:00 |
squid.sysconfig
|
Import rpm: 602ea65a25fa2db67807d3a6e8f23364256ef875
|
2022-08-08 14:08:02 -04:00 |