Date: Tue, 04 Jan 2022 17:14:43 +0000 From: bugzilla-noreply@freebsd.org To: ports-bugs@FreeBSD.org Subject: [Bug 260927] www/squid: update to 5.3 Message-ID: <bug-260927-7788@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D260927 Bug ID: 260927 Summary: www/squid: update to 5.3 Product: Ports & Packages Version: Latest Hardware: Any OS: Any Status: New Severity: Affects Only Me Priority: --- Component: Individual Port(s) Assignee: ports-bugs@FreeBSD.org Reporter: timp87@gmail.com Created attachment 230700 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D230700&action= =3Dedit port patch 1. What's new comparing to 4.15: - use gmake - BDB deprecation in behalf of TDB - official release notes are at http://www.squid-cache.org/Versions/v5/squid-5.3-RELEASENOTES.html, see "2. Major new features since Squid-4" if you concerned about upgrade from 4 to = 5. 2. Dear port committed please retire www/squid-devel as there is no sense to keep it in ports tree now. I was using it to track 5 branch at the time it = was soon to be released. 3. There were a number of vulnerabilities found in squid starting from 4.15 (current ports version) https://www.cvedetails.com/vulnerability-list/vendor_id-9950/product_id-177= 66/Squid-cache-Squid.html. See - CVE-2021-28651 - CVE-2021-28652 - CVE-2021-28662 - CVE-2021-31806 - CVE-2021-31807 - CVE-2021-31808 - CVE-2021-33620 - CVE-2021-41611 --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-260927-7788>