OpenBSD/ports n3BB4qwwww/squid Makefile, www/squid/patches patch-src_client_side_request_cc

   fix http://www.squid-cache.org/Advisories/SQUID-2018_3.txt

   Due to incorrect pointer handling Squid is vulnerable to denial
   of service attack when processing ESI responses.

   This problem allows a remote server delivering ESI responses
   to trigger a denial of service for all clients accessing the
   Squid service.

   This problem is limited to Squid operating as reverse proxy.
VersionDeltaFile
1.1.4.1+26-2www/squid/patches/patch-src_client_side_request_cc
1.205.2.1+2-2www/squid/Makefile
+28-42 files

UnifiedSplitRaw