Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: squidGuard | Distribution: SUSE Linux Enterprise 15 SP6 |
Version: 1.6.0 | Vendor: openSUSE |
Release: bp156.3.7 | Build date: Wed May 15 06:26:54 2024 |
Group: Productivity/Networking/Web/Proxy | Build host: i01-armsrv3 |
Size: 529996 | Source RPM: squidGuard-1.6.0-bp156.3.7.src.rpm |
Packager: https://bugs.opensuse.org | |
Url: http://www.squidguard.org/ | |
Summary: Filter plugin for squid |
SquidGuard is a filter, redirector, and access controller plugin for squid. It lets you define multiple access rules with different restrictions for different user groups on a squid cache. SquidGuard uses squid's standard redirector interface.
GPL-2.0-only
* Wed Apr 28 2021 Ferdinand Thiessen <rpm@fthiessen.de> - Update to debian maintained version 1.6.0: * Add support for IPv6 protocol (as in squid 3.x) * Bugfix: Convert special characters to fix XSS security problem. * Move text files to UTF-8 format. * Fix for missing content after percent sign * Fix for working (only) with squid 3.4 and higher. - Update to debian maintained version 1.5.1 * Updated links in documentation and sample files. * Use newer OpenLDAP search * Enable 'ldap deprecated' flag. - Update to debian maintained version 1.5.0 * Fixed a problem with Berkeley DB 5.x * Fixed inconsistent blocking. * Added Russian translation to squidGuard.cgi.in * Added a feature to send log messages to syslog * Anonymized passwords (for connecting to the ldap or mysql server) written to logfiles when squidGuard is starting. * Added patch to check IP addresses against LDAP. * Added patch to allow quoted strings in the configuration file * Fixed a problem with regular expressions. * Added patch to enable blocking against DNS based blacklists - Update to debian maintained version 1.4.1 * Fix of a bypass problem with URLs which length is close to the limit defined by MAX_BUF in squidGuard and MAX_URL in squid. Increasing the buffer limit to be higher than the one defined in MAX_URL solves the issue. * Fix of another bypass problem, which is related to the definition of these buffer limits. * Fix of one buffer overflow problem in sgLog.c when overlong URLs are requested * Fixes CVE-2009-3700, CVE-2009-3826 and CVE-2015-8936 - Refreshed squidGuard-config.patch - Refreshed default_config_pathfixes.patch - Refreshed and renamed squidGuard-1.4-mysql.patch to squidGuard-mysql.patch - Dropped upstream fixed patches * xss_fix_02_2015.patch * squidGuard-CVE-2009-3826.patch * squidGuard-CVE-2009-3700.patch * squidGuard-1.4_upgrade.patch * squidGuard-Makefile.patch * type_fixes.patch * Fri Jun 19 2020 Martin Pluskal <mpluskal@suse.com> - Fix building with gcc10 * Mon Jul 08 2019 Martin Wilck <mwilck@suse.com> - Use "su" directive in logrotate conf file (boo#1104856) - Set user write permissions on /var/lib/squidGuard/db/blacklist (boo#1140722) - Get rid of SysV init call in postrotate script * Wed Feb 28 2018 mpluskal@suse.com - Cleanup with spec-cleaner * Wed Feb 28 2018 adam.majer@suse.de - remove patches that modify generated code instead of template. They are already in the template and are unnedded. + squidGuard-trailing_dot.patch + squidGuard-unusual_url_end.patch - update patches removing parts that update generated code + squidGuard-1.4_upgrade.patch + type_fixes.patch - remove generated code before applying patches - use SPDX 3.0 license and install it correctly squidGuard is GPL-2.0-only * Thu Feb 15 2018 adam.majer@suse.de - Enable LDAP support (bnc#1081012) - type_fixes.patch: Actually define functions so use use correct pointer sizes on 64-bit arches once LDAP support is enabled. - Minor specfile and description cleanup - Fix building on SLE12 by removing useless BR: on lynx * Wed Oct 04 2017 adam.majer@suse.de - Merge SLE changes into Factory * Thu Jun 29 2017 adam.majer@suse.de - default_config_pathfixes.patch: reference only existing filter lists in default installed config (bnc#961499) * Mon Jun 20 2016 adam.majer@suse.de - add xss_fix_02_2015.patch: o fix XSS possibility in blocked error page by escaping all < and > in the printed url (CVE-2015-8936, bnc#985612) - fix URL in README so it doesn't point at non-existent page * Tue Mar 10 2015 ecsos@opensuse.org - fix squid 3.4 error witch patch squidGuard-1.4_upgrade.patch see http://bugs.squid-cache.org/show_bug.cgi?id=3978 (bnc#1040757) * Sat Mar 07 2015 ecsos@opensuse.org - fix permissions for blacklist, conf, dbhome and logdir, so other tools like squidguardmanager can access
/etc/logrotate.d/squidGuard /etc/squidguard.conf /srv/www/cgi-bin/babel.de /srv/www/cgi-bin/babel.en /srv/www/cgi-bin/babel.es /srv/www/cgi-bin/babel.fr /srv/www/cgi-bin/babel.nl /srv/www/cgi-bin/babel.no /srv/www/cgi-bin/babel.ru /srv/www/cgi-bin/squidGuard-simple-de.cgi /srv/www/cgi-bin/squidGuard-simple.cgi /srv/www/cgi-bin/squidGuard.cgi /srv/www/htdocs/images /srv/www/htdocs/images/blocked.gif /usr/sbin/squidGuard /usr/share/doc/packages/squidGuard /usr/share/doc/packages/squidGuard/ANNOUNCE /usr/share/doc/packages/squidGuard/CHANGELOG /usr/share/doc/packages/squidGuard/FAQ /usr/share/doc/packages/squidGuard/README /usr/share/doc/packages/squidGuard/README.LDAP /usr/share/doc/packages/squidGuard/README.QuotedStrings /usr/share/doc/packages/squidGuard/README.SUSE /usr/share/licenses/squidGuard /usr/share/licenses/squidGuard/COPYING /usr/share/licenses/squidGuard/GPL /var/lib/squidGuard /var/lib/squidGuard/db /var/lib/squidGuard/db/blacklist /var/lib/squidGuard/db/blacklist/domains /var/lib/squidGuard/db/blacklist/expressions /var/lib/squidGuard/db/blacklist/urls /var/log/squidGuard
Generated by rpm2html 1.8.1
Fabrice Bellet, Tue Jul 9 20:14:19 2024