Bug 68448

Summary: [Maintainer] www/squid: fix FOLLOW_XFF, use vendor patch for NTLM vulnerability
Product: Ports & Packages Reporter: Thomas-Martin Seck <tmseck>
Component: Individual Port(s)Assignee: freebsd-ports-bugs (Nobody) <ports-bugs>
Status: Closed FIXED    
Severity: Affects Only Me    
Priority: Normal    
Version: Latest   
Hardware: Any   
OS: Any   
Attachments:
Description Flags
file.diff none

Description Thomas-Martin Seck 2004-06-28 17:30:25 UTC
- fix the patch that simulates the autotools bootstrap for the follow-xff-
  patchset (thanks to Michael Ranner for spotting the problem and
  testing the fix). While at it, wordsmith the comments in the patch.

- use the official patch for the NTLM auth helper vulnerability, see
  <http://www.squid-cache.org/Versions/v2/2.5/bugs/> for details. This
  patch is functionally identical to the FreeBSD patch in
  files/patch-helpers-ntlm_auth-SMB-libntlmssp.c

- build install the SMB basic authentication helpers by default, too

- bump PORTREVISION

Note to committer:
please 'cvs rm' files/patch-helpers-ntlm_auth-SMB-libntlmssp.c

Fix: Apply this patch:
Comment 1 Kirill Ponomarev freebsd_committer freebsd_triage 2004-06-28 17:56:12 UTC
State Changed
From-To: open->closed

Committed, thanks!