CVSROOT:        /cvs
Module name:    ports
Changes by:     st...@cvs.openbsd.org   2020/04/23 05:13:38

Modified files:
        www/squid      : Tag: OPENBSD_6_6 Makefile distinfo 
        www/squid/patches: Tag: OPENBSD_6_6 patch-bootstrap_sh 
                           patch-src_squid_8_in 

Log message:
update -stable to squid-4.11

SQUID-2019:12 - Due to incorrect buffer handling Squid is vulnerable to
cache poisoning, remote execution, and denial of service attacks when
processing ESI responses.

SQUID-2020:4 - Due to an integer overflow bug Squid is vulnerable to
credential replay and remote code execution attacks against HTTP Digest
Authentication tokens.

Reply via email to