get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/2225905/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2225905,
    "url": "http://patchwork.ozlabs.org/api/patches/2225905/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/buildroot/patch/20260421190816.2723435-1-bernd@kuhls.net/",
    "project": {
        "id": 27,
        "url": "http://patchwork.ozlabs.org/api/projects/27/?format=api",
        "name": "Buildroot development",
        "link_name": "buildroot",
        "list_id": "buildroot.buildroot.org",
        "list_email": "buildroot@buildroot.org",
        "web_url": "",
        "scm_url": "",
        "webscm_url": "",
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<20260421190816.2723435-1-bernd@kuhls.net>",
    "list_archive_url": null,
    "date": "2026-04-21T19:08:16",
    "name": "[1/1] package/squid: bump version to 7.5",
    "commit_ref": null,
    "pull_url": null,
    "state": "accepted",
    "archived": false,
    "hash": "e94da7b79b3448d9779947b599c013fbc0291bf7",
    "submitter": {
        "id": 86624,
        "url": "http://patchwork.ozlabs.org/api/people/86624/?format=api",
        "name": "Bernd Kuhls",
        "email": "bernd@kuhls.net"
    },
    "delegate": {
        "id": 89618,
        "url": "http://patchwork.ozlabs.org/api/users/89618/?format=api",
        "username": "juju",
        "first_name": "Julien",
        "last_name": "Olivain",
        "email": "juju@cotds.org"
    },
    "mbox": "http://patchwork.ozlabs.org/project/buildroot/patch/20260421190816.2723435-1-bernd@kuhls.net/mbox/",
    "series": [
        {
            "id": 500883,
            "url": "http://patchwork.ozlabs.org/api/series/500883/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/buildroot/list/?series=500883",
            "date": "2026-04-21T19:08:16",
            "name": "[1/1] package/squid: bump version to 7.5",
            "version": 1,
            "mbox": "http://patchwork.ozlabs.org/series/500883/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/patches/2225905/comments/",
    "check": "pending",
    "checks": "http://patchwork.ozlabs.org/api/patches/2225905/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<buildroot-bounces@buildroot.org>",
        "X-Original-To": [
            "incoming-buildroot@patchwork.ozlabs.org",
            "buildroot@buildroot.org"
        ],
        "Delivered-To": [
            "patchwork-incoming-buildroot@legolas.ozlabs.org",
            "buildroot@buildroot.org"
        ],
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=buildroot.org header.i=@buildroot.org\n header.a=rsa-sha256 header.s=default header.b=O9tWGdlb;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=buildroot.org\n (client-ip=2605:bc80:3010::137; helo=smtp4.osuosl.org;\n envelope-from=buildroot-bounces@buildroot.org; receiver=patchwork.ozlabs.org)"
        ],
        "Received": [
            "from smtp4.osuosl.org (smtp4.osuosl.org [IPv6:2605:bc80:3010::137])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g0X213Vctz1yGs\n\tfor <incoming-buildroot@patchwork.ozlabs.org>;\n Wed, 22 Apr 2026 05:08:25 +1000 (AEST)",
            "from localhost (localhost [127.0.0.1])\n\tby smtp4.osuosl.org (Postfix) with ESMTP id B10D942048;\n\tTue, 21 Apr 2026 19:08:23 +0000 (UTC)",
            "from smtp4.osuosl.org ([127.0.0.1])\n by localhost (smtp4.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id RnEQe3zQjgsx; Tue, 21 Apr 2026 19:08:22 +0000 (UTC)",
            "from lists1.osuosl.org (lists1.osuosl.org [140.211.166.142])\n\tby smtp4.osuosl.org (Postfix) with ESMTP id 6F5214203A;\n\tTue, 21 Apr 2026 19:08:22 +0000 (UTC)",
            "from smtp3.osuosl.org (smtp3.osuosl.org [IPv6:2605:bc80:3010::136])\n by lists1.osuosl.org (Postfix) with ESMTP id 4DAF8257\n for <buildroot@buildroot.org>; Tue, 21 Apr 2026 19:08:20 +0000 (UTC)",
            "from localhost (localhost [127.0.0.1])\n by smtp3.osuosl.org (Postfix) with ESMTP id 32F486087F\n for <buildroot@buildroot.org>; Tue, 21 Apr 2026 19:08:20 +0000 (UTC)",
            "from smtp3.osuosl.org ([127.0.0.1])\n by localhost (smtp3.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id Xwg6OZ4JbpSJ for <buildroot@buildroot.org>;\n Tue, 21 Apr 2026 19:08:19 +0000 (UTC)",
            "from dd20012.kasserver.com (dd20012.kasserver.com [85.13.140.57])\n by smtp3.osuosl.org (Postfix) with ESMTPS id 9818260841\n for <buildroot@buildroot.org>; Tue, 21 Apr 2026 19:08:18 +0000 (UTC)",
            "from fli4l.lan.fli4l (p5b3a0177.dip0.t-ipconnect.de [91.58.1.119])\n by dd20012.kasserver.com (Postfix) with ESMTPSA id B7C9CA4C0185\n for <buildroot@buildroot.org>; Tue, 21 Apr 2026 21:08:16 +0200 (CEST)",
            "from bruckner.lan.fli4l ([192.168.1.1]:50872)\n by fli4l.lan.fli4l with esmtp (Exim 4.99.1)\n (envelope-from <bernd@kuhls.net>) id 1wFGSG-000000004gg-11io\n for buildroot@buildroot.org; Tue, 21 Apr 2026 19:08:16 +0000"
        ],
        "X-Virus-Scanned": [
            "amavis at osuosl.org",
            "amavis at osuosl.org"
        ],
        "X-Comment": "SPF check N/A for local connections - client-ip=140.211.166.142;\n helo=lists1.osuosl.org; envelope-from=buildroot-bounces@buildroot.org;\n receiver=<UNKNOWN> ",
        "DKIM-Filter": [
            "OpenDKIM Filter v2.11.0 smtp4.osuosl.org 6F5214203A",
            "OpenDKIM Filter v2.11.0 smtp3.osuosl.org 9818260841"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=buildroot.org;\n\ts=default; t=1776798502;\n\tbh=HrfBKJtG+jM8Wa+IqE/6L0oRbUmL2UwwOye0rrGfOCw=;\n\th=From:To:Date:Subject:List-Id:List-Unsubscribe:List-Archive:\n\t List-Post:List-Help:List-Subscribe:From;\n\tb=O9tWGdlbD88UJ+H2pCUalzGp4xA5/YLZU3mDMk0S0rxfV4Yvnxhlo4MWddPA+JudL\n\t 5xD61lSFNprGpSSIZvuRaTfK4eo1NC34f7fy6I5d4HUl9mPKAmyqzcXHq9FXn61qo/\n\t 5zCJCcHqFVrm8u7JWQgxZxRnJn4+jglKxKrSsi4YVZb7JVgY/3/9jSUmT4KKpvbvr6\n\t /4L0w+IK+6eRp626jcen+fVH2F2qELpkCfEKg+grm+IxUDMgzYwj6n9wz3hl81y/rd\n\t D568XL7HC/+Ae/nseQx+SwVLIGzsVHgo1z5yFgH6ey6WaN8V5R1gL2CUNFsyx3dT6H\n\t I5vvDsza25JTQ==",
        "Received-SPF": "Pass (mailfrom) identity=mailfrom; client-ip=85.13.140.57;\n helo=dd20012.kasserver.com; envelope-from=bernd@kuhls.net;\n receiver=<UNKNOWN>",
        "DMARC-Filter": "OpenDMARC Filter v1.4.2 smtp3.osuosl.org 9818260841",
        "From": "Bernd Kuhls <bernd@kuhls.net>",
        "To": "buildroot@buildroot.org",
        "Date": "Tue, 21 Apr 2026 21:08:16 +0200",
        "Message-ID": "<20260421190816.2723435-1-bernd@kuhls.net>",
        "X-Mailer": "git-send-email 2.47.3",
        "MIME-Version": "1.0",
        "X-Spamd-Bar": "--",
        "X-Mailman-Original-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=kuhls.net;\n s=kas202511301023; t=1776798496;\n bh=xgBz+Dc5SQTrNp9sS3upNZTR7qnIkQtPhiEjr1VjyPY=;\n h=From:To:Subject:Date:From;\n b=jwpXAP57ewX7KOjQdyWF1MBzgo2663XESTwSgxAhtB5XOQndakFwrbAXcnL5WUqIn\n a808IUdRf14NR1uxWF02IxIEdZu0i8yg9KwiggiBSn6rZJPpvAHJ3NSSNaK5zCPtaB\n h15vz4VWmbETY655f5mRbshTqfhs3hMK7hef2OJAEHItPkDbqkf6cT2N3FvC/GeRcJ\n C/NFzGFqGeqAptVxt2Tro/f98/DlT4sw82I2cL/tBK+oFHofhTqexzl7dqqGbJgYnO\n 1ujf99cc1jm9oqgIKQvw01OgC1ikgUEGIuzDjUREe40bWhXAqRTJSLIkVui0zidQal\n 2jFNMZuG5748w==",
        "X-Mailman-Original-Authentication-Results": [
            "smtp3.osuosl.org;\n dmarc=pass (p=none dis=none)\n header.from=kuhls.net",
            "smtp3.osuosl.org;\n dkim=pass (2048-bit key) header.d=kuhls.net header.i=@kuhls.net\n header.a=rsa-sha256 header.s=kas202511301023 header.b=jwpXAP57"
        ],
        "Subject": "[Buildroot] [PATCH 1/1] package/squid: bump version to 7.5",
        "X-BeenThere": "buildroot@buildroot.org",
        "X-Mailman-Version": "2.1.30",
        "Precedence": "list",
        "List-Id": "Discussion and development of buildroot <buildroot.buildroot.org>",
        "List-Unsubscribe": "<https://lists.buildroot.org/mailman/options/buildroot>,\n <mailto:buildroot-request@buildroot.org?subject=unsubscribe>",
        "List-Archive": "<http://lists.buildroot.org/pipermail/buildroot/>",
        "List-Post": "<mailto:buildroot@buildroot.org>",
        "List-Help": "<mailto:buildroot-request@buildroot.org?subject=help>",
        "List-Subscribe": "<https://lists.buildroot.org/mailman/listinfo/buildroot>,\n <mailto:buildroot-request@buildroot.org?subject=subscribe>",
        "Content-Type": "text/plain; charset=\"us-ascii\"",
        "Content-Transfer-Encoding": "7bit",
        "Errors-To": "buildroot-bounces@buildroot.org",
        "Sender": "\"buildroot\" <buildroot-bounces@buildroot.org>"
    },
    "content": "https://github.com/squid-cache/squid/blob/SQUID_7_5/ChangeLog\n\nRemoved patches which are included in this release.\n\nSwitched to tarball hash provided by upstream.\n\nUpdated license hash due to upstream commit\nhttps://github.com/squid-cache/squid/commit/30a55c0819d96a16aab59fc5584d54be4a83f765\n\nSigned-off-by: Bernd Kuhls <bernd@kuhls.net>\n---\n ...Fix-ASN-1-encoding-of-long-SNMP-OIDs.patch |  52 -----\n ...2-Proxy-auth-data-visible-to-scripts.patch | 212 ------------------\n package/squid/squid.hash                      |   5 +-\n package/squid/squid.mk                        |   8 +-\n 4 files changed, 4 insertions(+), 273 deletions(-)\n delete mode 100644 package/squid/0001-Fix-ASN-1-encoding-of-long-SNMP-OIDs.patch\n delete mode 100644 package/squid/0002-Proxy-auth-data-visible-to-scripts.patch",
    "diff": "diff --git a/package/squid/0001-Fix-ASN-1-encoding-of-long-SNMP-OIDs.patch b/package/squid/0001-Fix-ASN-1-encoding-of-long-SNMP-OIDs.patch\ndeleted file mode 100644\nindex 695ba0255e..0000000000\n--- a/package/squid/0001-Fix-ASN-1-encoding-of-long-SNMP-OIDs.patch\n+++ /dev/null\n@@ -1,52 +0,0 @@\n-From 0d89165ee6da10e6fa50c44998b3cd16d59400e9 Mon Sep 17 00:00:00 2001\n-From: Alex Rousskov <rousskov@measurement-factory.com>\n-Date: Sat, 30 Aug 2025 06:49:36 +0000\n-Subject: [PATCH] Fix ASN.1 encoding of long SNMP OIDs (#2149)\n-\n-Upstream: https://github.com/squid-cache/squid/commit/250a18e0a80694b919972a1836cdfe20f2e1baa0\n-CVE: CVE-2025-59362\n-Signed-off-by: Thomas Perale <thomas.perale@mind.be>\n----\n- lib/snmplib/asn1.c | 13 +++++++++++++\n- 1 file changed, 13 insertions(+)\n-\n-diff --git a/lib/snmplib/asn1.c b/lib/snmplib/asn1.c\n-index 81f2051fbe7..2852c26b220 100644\n---- a/lib/snmplib/asn1.c\n-+++ b/lib/snmplib/asn1.c\n-@@ -735,6 +735,7 @@ asn_build_objid(u_char * data, int *datalength,\n-      * lastbyte ::= 0 7bitvalue\n-      */\n-     u_char buf[MAX_OID_LEN];\n-+    u_char *bufEnd = buf + sizeof(buf);\n-     u_char *bp = buf;\n-     oid *op = objid;\n-     int asnlength;\n-@@ -753,6 +754,10 @@ asn_build_objid(u_char * data, int *datalength,\n-     while (objidlength-- > 0) {\n-         subid = *op++;\n-         if (subid < 127) {  /* off by one? */\n-+            if (bp >= bufEnd) {\n-+                snmp_set_api_error(SNMPERR_ASN_ENCODE);\n-+                return (NULL);\n-+            }\n-             *bp++ = subid;\n-         } else {\n-             mask = 0x7F;    /* handle subid == 0 case */\n-@@ -770,8 +775,16 @@ asn_build_objid(u_char * data, int *datalength,\n-                 /* fix a mask that got truncated above */\n-                 if (mask == 0x1E00000)\n-                     mask = 0xFE00000;\n-+                if (bp >= bufEnd) {\n-+                    snmp_set_api_error(SNMPERR_ASN_ENCODE);\n-+                    return (NULL);\n-+                }\n-                 *bp++ = (u_char) (((subid & mask) >> bits) | ASN_BIT8);\n-             }\n-+            if (bp >= bufEnd) {\n-+                snmp_set_api_error(SNMPERR_ASN_ENCODE);\n-+                return (NULL);\n-+            }\n-             *bp++ = (u_char) (subid & mask);\n-         }\n-     }\ndiff --git a/package/squid/0002-Proxy-auth-data-visible-to-scripts.patch b/package/squid/0002-Proxy-auth-data-visible-to-scripts.patch\ndeleted file mode 100644\nindex 2e5c67c8c1..0000000000\n--- a/package/squid/0002-Proxy-auth-data-visible-to-scripts.patch\n+++ /dev/null\n@@ -1,212 +0,0 @@\n-From 0951a0681011dfca3d78c84fd7f1e19c78a4443f Mon Sep 17 00:00:00 2001\n-From: Amos Jeffries <yadij@users.noreply.github.com>\n-Date: Sat, 11 Oct 2025 16:33:02 +1300\n-Subject: [PATCH] Bug 3390: Proxy auth data visible to scripts (#2249)\n-\n-Original changes to redact credentials from error page %R code\n-expansion output was incomplete. It missed the parse failure\n-case where ErrorState::request_hdrs raw buffer contained\n-sensitive information.\n-\n-Also missed was the %W case where full request message headers\n-were generated in a mailto link. This case is especially\n-problematic as it may be delivered over insecure SMTP even if\n-the error was secured with HTTPS.\n-\n-After this change:\n-* The HttpRequest message packing code for error pages is de-duplicated\n-  and elides authentication headers for both %R and %W code outputs.\n-* The %R code output includes the CRLF request message terminator.\n-* The email_err_data directive causing advanced details to be added to\n-  %W mailto links is disabled by default.\n-\n-Also redact credentials from generated TRACE responses.\n-\n----------\n-\n-Co-authored-by: Alex Rousskov <rousskov@measurement-factory.com>\n-\n-CVE: CVE-2025-62168\n-Upstream: https://github.com/squid-cache/squid/commit/0951a0681011dfca3d78c84fd7f1e19c78a4443f\n-[thomas: remove release note, backport errorpage.cc]\n-Signed-off-by: Thomas Perale <thomas.perale@mind.be>\n----\n- src/HttpRequest.cc                  |  6 +++---\n- src/HttpRequest.h                   |  2 +-\n- src/cf.data.pre                     |  8 +++++++-\n- src/client_side_reply.cc            | 14 +++++++-------\n- src/errorpage.cc                    | 17 ++++-------------\n- src/errorpage.h                     |  1 -\n- src/tests/stub_HttpRequest.cc       |  2 +-\n- 8 files changed, 26 insertions(+), 27 deletions(-)\n-\n-diff --git a/src/HttpRequest.cc b/src/HttpRequest.cc\n-index cd7ee71d4af..c6ed5bee45d 100644\n---- a/src/HttpRequest.cc\n-+++ b/src/HttpRequest.cc\n-@@ -341,7 +341,7 @@ HttpRequest::swapOut(StoreEntry * e)\n- \n- /* packs request-line and headers, appends <crlf> terminator */\n- void\n--HttpRequest::pack(Packable * p) const\n-+HttpRequest::pack(Packable * const p, const bool maskSensitiveInfo) const\n- {\n-     assert(p);\n-     /* pack request-line */\n-@@ -349,8 +349,8 @@ HttpRequest::pack(Packable * p) const\n-                SQUIDSBUFPRINT(method.image()), SQUIDSBUFPRINT(url.path()),\n-                http_ver.major, http_ver.minor);\n-     /* headers */\n--    header.packInto(p);\n--    /* trailer */\n-+    header.packInto(p, maskSensitiveInfo);\n-+    /* indicate the end of the header section */\n-     p->append(\"\\r\\n\", 2);\n- }\n- \n-diff --git a/src/HttpRequest.h b/src/HttpRequest.h\n-index 6d369029322..28dc4daf99d 100644\n---- a/src/HttpRequest.h\n-+++ b/src/HttpRequest.h\n-@@ -206,7 +206,7 @@ class HttpRequest: public Http::Message\n- \n-     void swapOut(StoreEntry * e);\n- \n--    void pack(Packable * p) const;\n-+    void pack(Packable * p, bool maskSensitiveInfo = false) const;\n- \n-     static void httpRequestPack(void *obj, Packable *p);\n- \n-diff --git a/src/cf.data.pre b/src/cf.data.pre\n-index 0a73020e111..2dce65a4d0a 100644\n---- a/src/cf.data.pre\n-+++ b/src/cf.data.pre\n-@@ -8941,12 +8941,18 @@ NAME: email_err_data\n- COMMENT: on|off\n- TYPE: onoff\n- LOC: Config.onoff.emailErrData\n--DEFAULT: on\n-+DEFAULT: off\n- DOC_START\n- \tIf enabled, information about the occurred error will be\n- \tincluded in the mailto links of the ERR pages (if %W is set)\n- \tso that the email body contains the data.\n- \tSyntax is <A HREF=\"mailto:%w%W\">%w</A>\n-+\n-+\tSECURITY WARNING:\n-+\t\tRequest headers and other included facts may contain\n-+\t\tsensitive information about transaction history, the\n-+\t\tSquid instance, and its environment which would be\n-+\t\tunavailable to error recipients otherwise.\n- DOC_END\n- \n- NAME: deny_info\n-diff --git a/src/client_side_reply.cc b/src/client_side_reply.cc\n-index d73bf3f99f6..fc2feccf802 100644\n---- a/src/client_side_reply.cc\n-+++ b/src/client_side_reply.cc\n-@@ -94,7 +94,7 @@ clientReplyContext::clientReplyContext(ClientHttpRequest *clientContext) :\n- void\n- clientReplyContext::setReplyToError(\n-     err_type err, Http::StatusCode status, char const *uri,\n--    const ConnStateData *conn, HttpRequest *failedrequest, const char *unparsedrequest,\n-+    const ConnStateData *conn, HttpRequest *failedrequest, const char *,\n- #if USE_AUTH\n-     Auth::UserRequest::Pointer auth_user_request\n- #else\n-@@ -104,9 +104,6 @@ clientReplyContext::setReplyToError(\n- {\n-     auto errstate = clientBuildError(err, status, uri, conn, failedrequest, http->al);\n- \n--    if (unparsedrequest)\n--        errstate->request_hdrs = xstrdup(unparsedrequest);\n--\n- #if USE_AUTH\n-     errstate->auth_user_request = auth_user_request;\n- #endif\n-@@ -995,11 +992,14 @@ clientReplyContext::traceReply()\n-     triggerInitialStoreRead();\n-     http->storeEntry()->releaseRequest();\n-     http->storeEntry()->buffer();\n-+    MemBuf content;\n-+    content.init();\n-+    http->request->pack(&content, true /* hide authorization data */);\n-     const HttpReplyPointer rep(new HttpReply);\n--    rep->setHeaders(Http::scOkay, nullptr, \"text/plain\", http->request->prefixLen(), 0, squid_curtime);\n-+    rep->setHeaders(Http::scOkay, nullptr, \"message/http\", content.contentSize(), 0, squid_curtime);\n-+    rep->body.set(SBuf(content.buf, content.size));\n-     http->storeEntry()->replaceHttpReply(rep);\n--    http->request->swapOut(http->storeEntry());\n--    http->storeEntry()->complete();\n-+    http->storeEntry()->completeSuccessfully(\"traceReply() stored the entire response\");\n- }\n- \n- #define SENDING_BODY 0\n-diff --git a/src/errorpage.cc b/src/errorpage.cc\n-index d7a588d099f..06046de9ebb 100644\n---- a/src/errorpage.cc\n-+++ b/src/errorpage.cc\n-@@ -792,7 +792,6 @@ ErrorState::~ErrorState()\n- {\n-     safe_free(redirect_url);\n-     safe_free(url);\n--    safe_free(request_hdrs);\n-     wordlistDestroy(&ftp.server_msg);\n-     safe_free(ftp.request);\n-     safe_free(ftp.reply);\n-@@ -850,7 +849,7 @@ ErrorState::Dump(MemBuf * mb)\n-                     SQUIDSBUFPRINT(request->url.path()),\n-                     AnyP::ProtocolType_str[request->http_ver.protocol],\n-                     request->http_ver.major, request->http_ver.minor);\n--        request->header.packInto(&str);\n-+        request->header.packInto(&str, true /* hide authorization data */);\n-     }\n- \n-     str.append(\"\\r\\n\", 2);\n-@@ -1112,18 +1111,10 @@ ErrorState::compileLegacyCode(Build &build)\n-                 p = \"[no request]\";\n-             break;\n-         }\n--        if (request) {\n--            mb.appendf(SQUIDSBUFPH \" \" SQUIDSBUFPH \" %s/%d.%d\\n\",\n--                       SQUIDSBUFPRINT(request->method.image()),\n--                       SQUIDSBUFPRINT(request->url.path()),\n--                       AnyP::ProtocolType_str[request->http_ver.protocol],\n--                       request->http_ver.major, request->http_ver.minor);\n--            request->header.packInto(&mb, true); //hide authorization data\n--        } else if (request_hdrs) {\n--            p = request_hdrs;\n--        } else {\n-+        else if (request)\n-+            request->pack(&mb, true /* hide authorization data */);\n-+        else\n-             p = \"[no request]\";\n--        }\n-         break;\n- \n-     case 's':\n-diff --git a/src/errorpage.h b/src/errorpage.h\n-index abca4a17d7b..297b306978d 100644\n---- a/src/errorpage.h\n-+++ b/src/errorpage.h\n-@@ -194,7 +194,6 @@ class ErrorState\n-         MemBuf *listing = nullptr;\n-     } ftp;\n- \n--    char *request_hdrs = nullptr;\n-     char *err_msg = nullptr; /* Preformatted error message from the cache */\n- \n-     AccessLogEntryPointer ale; ///< transaction details (or nil)\n-diff --git a/src/tests/stub_HttpRequest.cc b/src/tests/stub_HttpRequest.cc\n-index 495597d9a1b..48a0f1ce03e 100644\n---- a/src/tests/stub_HttpRequest.cc\n-+++ b/src/tests/stub_HttpRequest.cc\n-@@ -45,7 +45,7 @@ bool HttpRequest::expectingBody(const HttpRequestMethod &, int64_t &) const STUB\n- bool HttpRequest::bodyNibbled() const STUB_RETVAL(false)\n- int HttpRequest::prefixLen() const STUB_RETVAL(0)\n- void HttpRequest::swapOut(StoreEntry *) STUB\n--void HttpRequest::pack(Packable *) const STUB\n-+void HttpRequest::pack(Packable *, bool) const STUB\n- void HttpRequest::httpRequestPack(void *, Packable *) STUB\n- HttpRequest * HttpRequest::FromUrl(const SBuf &, const MasterXaction::Pointer &, const HttpRequestMethod &) STUB_RETVAL(nullptr)\n- HttpRequest * HttpRequest::FromUrlXXX(const char *, const MasterXaction::Pointer &, const HttpRequestMethod &) STUB_RETVAL(nullptr)\ndiff --git a/package/squid/squid.hash b/package/squid/squid.hash\nindex 329d61ca93..508b5517c5 100644\n--- a/package/squid/squid.hash\n+++ b/package/squid/squid.hash\n@@ -1,3 +1,4 @@\n+# From https://github.com/squid-cache/squid/releases/tag/SQUID_7_5\n+sha256  f6058907db0150d2f5d228482b5a9e5678920cf368ae0ccbcecceb2ff4c35106  squid-7.5.tar.xz\n # Locally calculated\n-sha256  9eafe06f58a199b918e79d33d8aa03afb9ae0c11d18974dca0b44c2669cab6dd  squid-6.14.tar.xz\n-sha256  8177f97513213526df2cf6184d8ff986c675afb514d4e68a404010521b880643  COPYING\n+sha256  edaef632cbb643e4e7a221717a6c441a4c1a7c918e6e4d56debc3d8739b233f6  COPYING\ndiff --git a/package/squid/squid.mk b/package/squid/squid.mk\nindex c031f1aa03..6d403c6c2e 100644\n--- a/package/squid/squid.mk\n+++ b/package/squid/squid.mk\n@@ -4,7 +4,7 @@\n #\n ################################################################################\n \n-SQUID_VERSION = 6.14\n+SQUID_VERSION = 7.5\n SQUID_SOURCE = squid-$(SQUID_VERSION).tar.xz\n SQUID_SITE = https://github.com/squid-cache/squid/releases/download/SQUID_$(subst .,_,$(SQUID_VERSION))\n SQUID_LICENSE = GPL-2.0+\n@@ -12,12 +12,6 @@ SQUID_LICENSE_FILES = COPYING\n SQUID_CPE_ID_VENDOR = squid-cache\n SQUID_SELINUX_MODULES = apache squid\n \n-# 0001-Fix-ASN-1-encoding-of-long-SNMP-OIDs.patch\n-SQUID_IGNORE_CVES += CVE-2025-59362\n-\n-# 0002-Proxy-auth-data-visible-to-scripts.patch\n-SQUID_IGNORE_CVES += CVE-2025-62168\n-\n SQUID_DEPENDENCIES = libcap host-libcap libtool libxml2 host-pkgconf \\\n \t$(if $(BR2_PACKAGE_LIBNETFILTER_CONNTRACK),libnetfilter_conntrack)\n SQUID_CONF_ENV = \\\n",
    "prefixes": [
        "1/1"
    ]
}