Fix a remote denial of service vulnerability as described in Squid security advisory 2007:2 (http://www.squid-cache.org/Advisories/SQUID-2007_2.txt). Added files: files/patch-secfix-2007-2 Please see ports/118430 for the proposed VuXML entry for www/squid, or vuln id 65378ea7-a288-11dc-8856-0048543d60ce respectively. This VuXML entry should be updated as follows: In range please substitute <lt>2.6.17</lt><ge>3.0.*</ge> with <lt>2.6.17</lt><ge>3.0.*</ge><lt>3.0.r1.20071001_1</lt> Fix: Apply this patch:
delphij 2007-12-05 00:27:21 UTC FreeBSD ports repository Modified files: www/squid30 Makefile Added files: www/squid30/files patch-secfix-2007-2 Log: Apply a slightly modified vendor patch against SQUID-2007_2. PR: ports/118433 Submitted by: maintainer Security: http://www.squid-cache.org/Advisories/SQUID-2007_2.txt Approved by: portmgr (pav) Revision Changes Path 1.206 +1 -0 ports/www/squid30/Makefile 1.1 +143 -0 ports/www/squid30/files/patch-secfix-2007-2 (new) _______________________________________________ cvs-all@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/cvs-all To unsubscribe, send any mail to "cvs-all-unsubscribe@freebsd.org"
State Changed From-To: open->closed Patch committed, thanks!
Responsible Changed From-To: freebsd-ports-bugs->delphij Grab.