.gitignore
RHEL 9.0.0 Alpha bootstrap
2020-10-20 08:24:33 -07:00
cache_swap.sh
RHEL 9.0.0 Alpha bootstrap
2020-10-20 08:24:33 -07:00
gating.yaml
Adding gating configuration
2021-05-19 09:25:58 +02:00
perl-requires-squid.sh
RHEL 9.0.0 Alpha bootstrap
2020-10-20 08:24:33 -07:00
sources
new version 5.5
2022-05-31 15:38:14 +02:00
squid-3.0.STABLE1-perlpath.patch
new version 5.5
2022-05-31 15:38:14 +02:00
squid-3.1.0.9-location.patch
RHEL 9.0.0 Alpha bootstrap
2020-10-20 08:24:33 -07:00
squid-3.5.9-include-guards.patch
RHEL 9.0.0 Alpha bootstrap
2020-10-20 08:24:33 -07:00
squid-4.0.11-config.patch
RHEL 9.0.0 Alpha bootstrap
2020-10-20 08:24:33 -07:00
squid-5.0.5-symlink-lang-err.patch
new version 5.5
2022-05-31 15:38:14 +02:00
squid-5.0.6-active-ftp.patch
Resolves : #1969322 - squid doesn't work with active ftp
2021-06-08 10:50:07 +02:00
squid-5.0.6-openssl3.patch
Resolves : #1985231 - squid: FTBFS because of OpenSSL 3.0 preprocessor macro
2021-08-05 22:33:36 +02:00
squid-5.1-test-store-cppsuite.patch
Resolves : #1988122 - Enable LTO build of squid for RHEL 9
2021-09-16 01:06:17 +02:00
squid-5.5-CVE-2021-46784.patch
Resolves : #2100785 - CVE-2021-46784 squid: DoS when processing gopher server
2022-07-11 11:29:04 +02:00
squid-5.5-CVE-2022-41318.patch
Resolves : #2130253 - CVE-2022-41318 squid: buffer-over-read in SSPI and SMB
2022-11-07 17:57:07 +01:00
squid-5.5-CVE-2023-5824.patch
Resolves: RHEL-18354 - squid: Buffer over-read in the HTTP Message processing
2024-02-01 16:47:43 +01:00
squid-5.5-CVE-2023-46724.patch
Resolves: RHEL-18354 - squid: Buffer over-read in the HTTP Message processing
2024-02-01 16:47:43 +01:00
squid-5.5-CVE-2023-46728.patch
Resolves: RHEL-18354 - squid: Buffer over-read in the HTTP Message processing
2024-02-01 16:47:43 +01:00
squid-5.5-CVE-2023-46846.patch
Resolves: RHEL-14820 - squid: squid: denial of Servicein FTP
2023-11-12 05:29:58 +01:00
squid-5.5-CVE-2023-46847.patch
Resolves: RHEL-14820 - squid: squid: denial of Servicein FTP
2023-11-12 05:29:58 +01:00
squid-5.5-CVE-2023-46848.patch
Resolves: RHEL-14820 - squid: squid: denial of Servicein FTP
2023-11-12 05:29:58 +01:00
squid-5.5-CVE-2023-49285.patch
Resolves: RHEL-18354 - squid: Buffer over-read in the HTTP Message processing
2024-02-01 16:47:43 +01:00
squid-5.5-CVE-2023-49286.patch
Resolves: RHEL-18354 - squid: Buffer over-read in the HTTP Message processing
2024-02-01 16:47:43 +01:00
squid-5.5-CVE-2023-50269.patch
Resolves: RHEL-19556 - squid: denial of service in HTTP request
2024-02-02 02:37:40 +01:00
squid-5.5-CVE-2024-25111.patch
Resolves: RHEL-28530 - squid: Denial of Service in HTTP Chunked
2024-03-19 15:58:27 +01:00
squid-5.5-CVE-2024-25617.patch
Resolves: RHEL-28530 - squid: Denial of Service in HTTP Chunked
2024-03-19 15:58:27 +01:00
squid-5.5-halfclosed.patch
Resolves : #2231827 - Crash with half_closed_client on
2023-08-16 15:10:34 +02:00
squid-5.5-ip-bind-address-no-port.patch
Resolves : #2151188 - [RFE] Add the "IP_BIND_ADDRESS_NO_PORT"
2022-12-06 11:18:27 +01:00
squid.logrotate
RHEL 9.0.0 Alpha bootstrap
2020-10-20 08:24:33 -07:00
squid.nm
RHEL 9.0.0 Alpha bootstrap
2020-10-20 08:24:33 -07:00
squid.pam
RHEL 9.0.0 Alpha bootstrap
2020-10-20 08:24:33 -07:00
squid.service
RHEL 9.0.0 Alpha bootstrap
2020-10-20 08:24:33 -07:00
squid.spec
Bump version - rebuild with correct target
2024-03-19 20:32:08 +01:00
squid.sysconfig
RHEL 9.0.0 Alpha bootstrap
2020-10-20 08:24:33 -07:00
squid.sysusers
Resolves : #2095468 - [RFE] squid use systemd-sysusers
2022-11-07 19:19:09 +01:00