Caching and forwarding HTTP web proxy
http://www.squid-cache.org
Squid is a caching proxy for the Web supporting HTTP(S), FTP, and
some others. It reduces bandwidth and improves response times by
caching and reusing frequently-requested web pages. Squid has
extensive access controls and can also be used as a server
accelerator.
- Devel package for openSUSE:Factory
-
6
derived packages
- Links to openSUSE:Factory / squid
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout server:proxy/squid && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
README.kerberos | 0000002460 2.4 KB | |
_link | 0000000124 124 Bytes | |
cache_dir.sed | 0000000107 107 Bytes | |
initialize_cache_if_needed.sh | 0000000259 259 Bytes | |
missing_installs.patch | 0000000532 532 Bytes | |
pam.squid | 0000000165 165 Bytes | |
squid-4.8.tar.xz | 0002440888 2.33 MB | |
squid-4.8.tar.xz.asc | 0000001193 1.17 KB | |
squid.changes | 0000125992 123 KB | |
squid.keyring | 0000095203 93 KB | |
squid.logrotate | 0000000352 352 Bytes | |
squid.permissions | 0000000145 145 Bytes | |
squid.service | 0000000352 352 Bytes | |
squid.spec | 0000011152 10.9 KB | |
tmpfilesdir.squid.conf | 0000000064 64 Bytes | |
unsquid.pl | 0000005040 4.92 KB |
Revision 188 (latest revision is 300)
Adam Majer (adamm)
committed
(revision 188)
- Update to squid 4.8: + Ignore ECONNABORTED in accept(2) + RFC 7230 forbids generation of userinfo subcomponent of https URL + cachemgr.cgi: unallocated memory access resulting in a potential denial of service. (bsc#1141442, CVE-2019-12854) + terminating c-strings beyond BASE64_DECODE_LENGTH + Replace uudecode with libnettle base64 decoder fixing a denial of service vulnerability (bsc#1141329, CVE-2019-12529) + fix to_localhost does not include :: + Fix GCC-9 build issues + Fix Digest auth parameter parsing preventing a potential denial of service (bsc#1141332, CVE-2019-12525) + Update HttpHeader::getAuth to SBuf which prevents a potential heap overflowing allowing a possible remote code execution attack when processing HTTP Authentication credentials (bsc#1141330, CVE-2019-12527) + Add the NO_TLSv1_3 option to available tls-options values + Fix handling of tiny invalid responses + Fix Memory leak when http_reply_access uses external_acl + Fix Multiple XSS issues in cachemgr.cgi (bsc#1140738, CVE-2019-13345)
Comments 0