Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/patches/2225905/?format=api
{ "id": 2225905, "url": "http://patchwork.ozlabs.org/api/patches/2225905/?format=api", "web_url": "http://patchwork.ozlabs.org/project/buildroot/patch/20260421190816.2723435-1-bernd@kuhls.net/", "project": { "id": 27, "url": "http://patchwork.ozlabs.org/api/projects/27/?format=api", "name": "Buildroot development", "link_name": "buildroot", "list_id": "buildroot.buildroot.org", "list_email": "buildroot@buildroot.org", "web_url": "", "scm_url": "", "webscm_url": "", "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<20260421190816.2723435-1-bernd@kuhls.net>", "list_archive_url": null, "date": "2026-04-21T19:08:16", "name": "[1/1] package/squid: bump version to 7.5", "commit_ref": null, "pull_url": null, "state": "accepted", "archived": false, "hash": "e94da7b79b3448d9779947b599c013fbc0291bf7", "submitter": { "id": 86624, "url": "http://patchwork.ozlabs.org/api/people/86624/?format=api", "name": "Bernd Kuhls", "email": "bernd@kuhls.net" }, "delegate": { "id": 89618, "url": "http://patchwork.ozlabs.org/api/users/89618/?format=api", "username": "juju", "first_name": "Julien", "last_name": "Olivain", "email": "juju@cotds.org" }, "mbox": "http://patchwork.ozlabs.org/project/buildroot/patch/20260421190816.2723435-1-bernd@kuhls.net/mbox/", "series": [ { "id": 500883, "url": "http://patchwork.ozlabs.org/api/series/500883/?format=api", "web_url": "http://patchwork.ozlabs.org/project/buildroot/list/?series=500883", "date": "2026-04-21T19:08:16", "name": "[1/1] package/squid: bump version to 7.5", "version": 1, "mbox": "http://patchwork.ozlabs.org/series/500883/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/patches/2225905/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/2225905/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "<buildroot-bounces@buildroot.org>", "X-Original-To": [ "incoming-buildroot@patchwork.ozlabs.org", "buildroot@buildroot.org" ], "Delivered-To": [ "patchwork-incoming-buildroot@legolas.ozlabs.org", "buildroot@buildroot.org" ], "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=buildroot.org header.i=@buildroot.org\n header.a=rsa-sha256 header.s=default header.b=O9tWGdlb;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=buildroot.org\n (client-ip=2605:bc80:3010::137; helo=smtp4.osuosl.org;\n envelope-from=buildroot-bounces@buildroot.org; receiver=patchwork.ozlabs.org)" ], "Received": [ "from smtp4.osuosl.org (smtp4.osuosl.org [IPv6:2605:bc80:3010::137])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g0X213Vctz1yGs\n\tfor <incoming-buildroot@patchwork.ozlabs.org>;\n Wed, 22 Apr 2026 05:08:25 +1000 (AEST)", "from localhost (localhost [127.0.0.1])\n\tby smtp4.osuosl.org (Postfix) with ESMTP id B10D942048;\n\tTue, 21 Apr 2026 19:08:23 +0000 (UTC)", "from smtp4.osuosl.org ([127.0.0.1])\n by localhost (smtp4.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id RnEQe3zQjgsx; Tue, 21 Apr 2026 19:08:22 +0000 (UTC)", "from lists1.osuosl.org (lists1.osuosl.org [140.211.166.142])\n\tby smtp4.osuosl.org (Postfix) with ESMTP id 6F5214203A;\n\tTue, 21 Apr 2026 19:08:22 +0000 (UTC)", "from smtp3.osuosl.org (smtp3.osuosl.org [IPv6:2605:bc80:3010::136])\n by lists1.osuosl.org (Postfix) with ESMTP id 4DAF8257\n for <buildroot@buildroot.org>; Tue, 21 Apr 2026 19:08:20 +0000 (UTC)", "from localhost (localhost [127.0.0.1])\n by smtp3.osuosl.org (Postfix) with ESMTP id 32F486087F\n for <buildroot@buildroot.org>; Tue, 21 Apr 2026 19:08:20 +0000 (UTC)", "from smtp3.osuosl.org ([127.0.0.1])\n by localhost (smtp3.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id Xwg6OZ4JbpSJ for <buildroot@buildroot.org>;\n Tue, 21 Apr 2026 19:08:19 +0000 (UTC)", "from dd20012.kasserver.com (dd20012.kasserver.com [85.13.140.57])\n by smtp3.osuosl.org (Postfix) with ESMTPS id 9818260841\n for <buildroot@buildroot.org>; Tue, 21 Apr 2026 19:08:18 +0000 (UTC)", "from fli4l.lan.fli4l (p5b3a0177.dip0.t-ipconnect.de [91.58.1.119])\n by dd20012.kasserver.com (Postfix) with ESMTPSA id B7C9CA4C0185\n for <buildroot@buildroot.org>; Tue, 21 Apr 2026 21:08:16 +0200 (CEST)", "from bruckner.lan.fli4l ([192.168.1.1]:50872)\n by fli4l.lan.fli4l with esmtp (Exim 4.99.1)\n (envelope-from <bernd@kuhls.net>) id 1wFGSG-000000004gg-11io\n for buildroot@buildroot.org; Tue, 21 Apr 2026 19:08:16 +0000" ], "X-Virus-Scanned": [ "amavis at osuosl.org", "amavis at osuosl.org" ], "X-Comment": "SPF check N/A for local connections - client-ip=140.211.166.142;\n helo=lists1.osuosl.org; envelope-from=buildroot-bounces@buildroot.org;\n receiver=<UNKNOWN> ", "DKIM-Filter": [ "OpenDKIM Filter v2.11.0 smtp4.osuosl.org 6F5214203A", "OpenDKIM Filter v2.11.0 smtp3.osuosl.org 9818260841" ], "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=buildroot.org;\n\ts=default; t=1776798502;\n\tbh=HrfBKJtG+jM8Wa+IqE/6L0oRbUmL2UwwOye0rrGfOCw=;\n\th=From:To:Date:Subject:List-Id:List-Unsubscribe:List-Archive:\n\t List-Post:List-Help:List-Subscribe:From;\n\tb=O9tWGdlbD88UJ+H2pCUalzGp4xA5/YLZU3mDMk0S0rxfV4Yvnxhlo4MWddPA+JudL\n\t 5xD61lSFNprGpSSIZvuRaTfK4eo1NC34f7fy6I5d4HUl9mPKAmyqzcXHq9FXn61qo/\n\t 5zCJCcHqFVrm8u7JWQgxZxRnJn4+jglKxKrSsi4YVZb7JVgY/3/9jSUmT4KKpvbvr6\n\t /4L0w+IK+6eRp626jcen+fVH2F2qELpkCfEKg+grm+IxUDMgzYwj6n9wz3hl81y/rd\n\t D568XL7HC/+Ae/nseQx+SwVLIGzsVHgo1z5yFgH6ey6WaN8V5R1gL2CUNFsyx3dT6H\n\t I5vvDsza25JTQ==", "Received-SPF": "Pass (mailfrom) identity=mailfrom; client-ip=85.13.140.57;\n helo=dd20012.kasserver.com; envelope-from=bernd@kuhls.net;\n receiver=<UNKNOWN>", "DMARC-Filter": "OpenDMARC Filter v1.4.2 smtp3.osuosl.org 9818260841", "From": "Bernd Kuhls <bernd@kuhls.net>", "To": "buildroot@buildroot.org", "Date": "Tue, 21 Apr 2026 21:08:16 +0200", "Message-ID": "<20260421190816.2723435-1-bernd@kuhls.net>", "X-Mailer": "git-send-email 2.47.3", "MIME-Version": "1.0", "X-Spamd-Bar": "--", "X-Mailman-Original-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=kuhls.net;\n s=kas202511301023; t=1776798496;\n bh=xgBz+Dc5SQTrNp9sS3upNZTR7qnIkQtPhiEjr1VjyPY=;\n h=From:To:Subject:Date:From;\n b=jwpXAP57ewX7KOjQdyWF1MBzgo2663XESTwSgxAhtB5XOQndakFwrbAXcnL5WUqIn\n a808IUdRf14NR1uxWF02IxIEdZu0i8yg9KwiggiBSn6rZJPpvAHJ3NSSNaK5zCPtaB\n h15vz4VWmbETY655f5mRbshTqfhs3hMK7hef2OJAEHItPkDbqkf6cT2N3FvC/GeRcJ\n C/NFzGFqGeqAptVxt2Tro/f98/DlT4sw82I2cL/tBK+oFHofhTqexzl7dqqGbJgYnO\n 1ujf99cc1jm9oqgIKQvw01OgC1ikgUEGIuzDjUREe40bWhXAqRTJSLIkVui0zidQal\n 2jFNMZuG5748w==", "X-Mailman-Original-Authentication-Results": [ "smtp3.osuosl.org;\n dmarc=pass (p=none dis=none)\n header.from=kuhls.net", "smtp3.osuosl.org;\n dkim=pass (2048-bit key) header.d=kuhls.net header.i=@kuhls.net\n header.a=rsa-sha256 header.s=kas202511301023 header.b=jwpXAP57" ], "Subject": "[Buildroot] [PATCH 1/1] package/squid: bump version to 7.5", "X-BeenThere": "buildroot@buildroot.org", "X-Mailman-Version": "2.1.30", "Precedence": "list", "List-Id": "Discussion and development of buildroot <buildroot.buildroot.org>", "List-Unsubscribe": "<https://lists.buildroot.org/mailman/options/buildroot>,\n <mailto:buildroot-request@buildroot.org?subject=unsubscribe>", "List-Archive": "<http://lists.buildroot.org/pipermail/buildroot/>", "List-Post": "<mailto:buildroot@buildroot.org>", "List-Help": "<mailto:buildroot-request@buildroot.org?subject=help>", "List-Subscribe": "<https://lists.buildroot.org/mailman/listinfo/buildroot>,\n <mailto:buildroot-request@buildroot.org?subject=subscribe>", "Content-Type": "text/plain; charset=\"us-ascii\"", "Content-Transfer-Encoding": "7bit", "Errors-To": "buildroot-bounces@buildroot.org", "Sender": "\"buildroot\" <buildroot-bounces@buildroot.org>" }, "content": "https://github.com/squid-cache/squid/blob/SQUID_7_5/ChangeLog\n\nRemoved patches which are included in this release.\n\nSwitched to tarball hash provided by upstream.\n\nUpdated license hash due to upstream commit\nhttps://github.com/squid-cache/squid/commit/30a55c0819d96a16aab59fc5584d54be4a83f765\n\nSigned-off-by: Bernd Kuhls <bernd@kuhls.net>\n---\n ...Fix-ASN-1-encoding-of-long-SNMP-OIDs.patch | 52 -----\n ...2-Proxy-auth-data-visible-to-scripts.patch | 212 ------------------\n package/squid/squid.hash | 5 +-\n package/squid/squid.mk | 8 +-\n 4 files changed, 4 insertions(+), 273 deletions(-)\n delete mode 100644 package/squid/0001-Fix-ASN-1-encoding-of-long-SNMP-OIDs.patch\n delete mode 100644 package/squid/0002-Proxy-auth-data-visible-to-scripts.patch", "diff": "diff --git a/package/squid/0001-Fix-ASN-1-encoding-of-long-SNMP-OIDs.patch b/package/squid/0001-Fix-ASN-1-encoding-of-long-SNMP-OIDs.patch\ndeleted file mode 100644\nindex 695ba0255e..0000000000\n--- a/package/squid/0001-Fix-ASN-1-encoding-of-long-SNMP-OIDs.patch\n+++ /dev/null\n@@ -1,52 +0,0 @@\n-From 0d89165ee6da10e6fa50c44998b3cd16d59400e9 Mon Sep 17 00:00:00 2001\n-From: Alex Rousskov <rousskov@measurement-factory.com>\n-Date: Sat, 30 Aug 2025 06:49:36 +0000\n-Subject: [PATCH] Fix ASN.1 encoding of long SNMP OIDs (#2149)\n-\n-Upstream: https://github.com/squid-cache/squid/commit/250a18e0a80694b919972a1836cdfe20f2e1baa0\n-CVE: CVE-2025-59362\n-Signed-off-by: Thomas Perale <thomas.perale@mind.be>\n----\n- lib/snmplib/asn1.c | 13 +++++++++++++\n- 1 file changed, 13 insertions(+)\n-\n-diff --git a/lib/snmplib/asn1.c b/lib/snmplib/asn1.c\n-index 81f2051fbe7..2852c26b220 100644\n---- a/lib/snmplib/asn1.c\n-+++ b/lib/snmplib/asn1.c\n-@@ -735,6 +735,7 @@ asn_build_objid(u_char * data, int *datalength,\n- * lastbyte ::= 0 7bitvalue\n- */\n- u_char buf[MAX_OID_LEN];\n-+ u_char *bufEnd = buf + sizeof(buf);\n- u_char *bp = buf;\n- oid *op = objid;\n- int asnlength;\n-@@ -753,6 +754,10 @@ asn_build_objid(u_char * data, int *datalength,\n- while (objidlength-- > 0) {\n- subid = *op++;\n- if (subid < 127) { /* off by one? */\n-+ if (bp >= bufEnd) {\n-+ snmp_set_api_error(SNMPERR_ASN_ENCODE);\n-+ return (NULL);\n-+ }\n- *bp++ = subid;\n- } else {\n- mask = 0x7F; /* handle subid == 0 case */\n-@@ -770,8 +775,16 @@ asn_build_objid(u_char * data, int *datalength,\n- /* fix a mask that got truncated above */\n- if (mask == 0x1E00000)\n- mask = 0xFE00000;\n-+ if (bp >= bufEnd) {\n-+ snmp_set_api_error(SNMPERR_ASN_ENCODE);\n-+ return (NULL);\n-+ }\n- *bp++ = (u_char) (((subid & mask) >> bits) | ASN_BIT8);\n- }\n-+ if (bp >= bufEnd) {\n-+ snmp_set_api_error(SNMPERR_ASN_ENCODE);\n-+ return (NULL);\n-+ }\n- *bp++ = (u_char) (subid & mask);\n- }\n- }\ndiff --git a/package/squid/0002-Proxy-auth-data-visible-to-scripts.patch b/package/squid/0002-Proxy-auth-data-visible-to-scripts.patch\ndeleted file mode 100644\nindex 2e5c67c8c1..0000000000\n--- a/package/squid/0002-Proxy-auth-data-visible-to-scripts.patch\n+++ /dev/null\n@@ -1,212 +0,0 @@\n-From 0951a0681011dfca3d78c84fd7f1e19c78a4443f Mon Sep 17 00:00:00 2001\n-From: Amos Jeffries <yadij@users.noreply.github.com>\n-Date: Sat, 11 Oct 2025 16:33:02 +1300\n-Subject: [PATCH] Bug 3390: Proxy auth data visible to scripts (#2249)\n-\n-Original changes to redact credentials from error page %R code\n-expansion output was incomplete. It missed the parse failure\n-case where ErrorState::request_hdrs raw buffer contained\n-sensitive information.\n-\n-Also missed was the %W case where full request message headers\n-were generated in a mailto link. This case is especially\n-problematic as it may be delivered over insecure SMTP even if\n-the error was secured with HTTPS.\n-\n-After this change:\n-* The HttpRequest message packing code for error pages is de-duplicated\n- and elides authentication headers for both %R and %W code outputs.\n-* The %R code output includes the CRLF request message terminator.\n-* The email_err_data directive causing advanced details to be added to\n- %W mailto links is disabled by default.\n-\n-Also redact credentials from generated TRACE responses.\n-\n----------\n-\n-Co-authored-by: Alex Rousskov <rousskov@measurement-factory.com>\n-\n-CVE: CVE-2025-62168\n-Upstream: https://github.com/squid-cache/squid/commit/0951a0681011dfca3d78c84fd7f1e19c78a4443f\n-[thomas: remove release note, backport errorpage.cc]\n-Signed-off-by: Thomas Perale <thomas.perale@mind.be>\n----\n- src/HttpRequest.cc | 6 +++---\n- src/HttpRequest.h | 2 +-\n- src/cf.data.pre | 8 +++++++-\n- src/client_side_reply.cc | 14 +++++++-------\n- src/errorpage.cc | 17 ++++-------------\n- src/errorpage.h | 1 -\n- src/tests/stub_HttpRequest.cc | 2 +-\n- 8 files changed, 26 insertions(+), 27 deletions(-)\n-\n-diff --git a/src/HttpRequest.cc b/src/HttpRequest.cc\n-index cd7ee71d4af..c6ed5bee45d 100644\n---- a/src/HttpRequest.cc\n-+++ b/src/HttpRequest.cc\n-@@ -341,7 +341,7 @@ HttpRequest::swapOut(StoreEntry * e)\n- \n- /* packs request-line and headers, appends <crlf> terminator */\n- void\n--HttpRequest::pack(Packable * p) const\n-+HttpRequest::pack(Packable * const p, const bool maskSensitiveInfo) const\n- {\n- assert(p);\n- /* pack request-line */\n-@@ -349,8 +349,8 @@ HttpRequest::pack(Packable * p) const\n- SQUIDSBUFPRINT(method.image()), SQUIDSBUFPRINT(url.path()),\n- http_ver.major, http_ver.minor);\n- /* headers */\n-- header.packInto(p);\n-- /* trailer */\n-+ header.packInto(p, maskSensitiveInfo);\n-+ /* indicate the end of the header section */\n- p->append(\"\\r\\n\", 2);\n- }\n- \n-diff --git a/src/HttpRequest.h b/src/HttpRequest.h\n-index 6d369029322..28dc4daf99d 100644\n---- a/src/HttpRequest.h\n-+++ b/src/HttpRequest.h\n-@@ -206,7 +206,7 @@ class HttpRequest: public Http::Message\n- \n- void swapOut(StoreEntry * e);\n- \n-- void pack(Packable * p) const;\n-+ void pack(Packable * p, bool maskSensitiveInfo = false) const;\n- \n- static void httpRequestPack(void *obj, Packable *p);\n- \n-diff --git a/src/cf.data.pre b/src/cf.data.pre\n-index 0a73020e111..2dce65a4d0a 100644\n---- a/src/cf.data.pre\n-+++ b/src/cf.data.pre\n-@@ -8941,12 +8941,18 @@ NAME: email_err_data\n- COMMENT: on|off\n- TYPE: onoff\n- LOC: Config.onoff.emailErrData\n--DEFAULT: on\n-+DEFAULT: off\n- DOC_START\n- \tIf enabled, information about the occurred error will be\n- \tincluded in the mailto links of the ERR pages (if %W is set)\n- \tso that the email body contains the data.\n- \tSyntax is <A HREF=\"mailto:%w%W\">%w</A>\n-+\n-+\tSECURITY WARNING:\n-+\t\tRequest headers and other included facts may contain\n-+\t\tsensitive information about transaction history, the\n-+\t\tSquid instance, and its environment which would be\n-+\t\tunavailable to error recipients otherwise.\n- DOC_END\n- \n- NAME: deny_info\n-diff --git a/src/client_side_reply.cc b/src/client_side_reply.cc\n-index d73bf3f99f6..fc2feccf802 100644\n---- a/src/client_side_reply.cc\n-+++ b/src/client_side_reply.cc\n-@@ -94,7 +94,7 @@ clientReplyContext::clientReplyContext(ClientHttpRequest *clientContext) :\n- void\n- clientReplyContext::setReplyToError(\n- err_type err, Http::StatusCode status, char const *uri,\n-- const ConnStateData *conn, HttpRequest *failedrequest, const char *unparsedrequest,\n-+ const ConnStateData *conn, HttpRequest *failedrequest, const char *,\n- #if USE_AUTH\n- Auth::UserRequest::Pointer auth_user_request\n- #else\n-@@ -104,9 +104,6 @@ clientReplyContext::setReplyToError(\n- {\n- auto errstate = clientBuildError(err, status, uri, conn, failedrequest, http->al);\n- \n-- if (unparsedrequest)\n-- errstate->request_hdrs = xstrdup(unparsedrequest);\n--\n- #if USE_AUTH\n- errstate->auth_user_request = auth_user_request;\n- #endif\n-@@ -995,11 +992,14 @@ clientReplyContext::traceReply()\n- triggerInitialStoreRead();\n- http->storeEntry()->releaseRequest();\n- http->storeEntry()->buffer();\n-+ MemBuf content;\n-+ content.init();\n-+ http->request->pack(&content, true /* hide authorization data */);\n- const HttpReplyPointer rep(new HttpReply);\n-- rep->setHeaders(Http::scOkay, nullptr, \"text/plain\", http->request->prefixLen(), 0, squid_curtime);\n-+ rep->setHeaders(Http::scOkay, nullptr, \"message/http\", content.contentSize(), 0, squid_curtime);\n-+ rep->body.set(SBuf(content.buf, content.size));\n- http->storeEntry()->replaceHttpReply(rep);\n-- http->request->swapOut(http->storeEntry());\n-- http->storeEntry()->complete();\n-+ http->storeEntry()->completeSuccessfully(\"traceReply() stored the entire response\");\n- }\n- \n- #define SENDING_BODY 0\n-diff --git a/src/errorpage.cc b/src/errorpage.cc\n-index d7a588d099f..06046de9ebb 100644\n---- a/src/errorpage.cc\n-+++ b/src/errorpage.cc\n-@@ -792,7 +792,6 @@ ErrorState::~ErrorState()\n- {\n- safe_free(redirect_url);\n- safe_free(url);\n-- safe_free(request_hdrs);\n- wordlistDestroy(&ftp.server_msg);\n- safe_free(ftp.request);\n- safe_free(ftp.reply);\n-@@ -850,7 +849,7 @@ ErrorState::Dump(MemBuf * mb)\n- SQUIDSBUFPRINT(request->url.path()),\n- AnyP::ProtocolType_str[request->http_ver.protocol],\n- request->http_ver.major, request->http_ver.minor);\n-- request->header.packInto(&str);\n-+ request->header.packInto(&str, true /* hide authorization data */);\n- }\n- \n- str.append(\"\\r\\n\", 2);\n-@@ -1112,18 +1111,10 @@ ErrorState::compileLegacyCode(Build &build)\n- p = \"[no request]\";\n- break;\n- }\n-- if (request) {\n-- mb.appendf(SQUIDSBUFPH \" \" SQUIDSBUFPH \" %s/%d.%d\\n\",\n-- SQUIDSBUFPRINT(request->method.image()),\n-- SQUIDSBUFPRINT(request->url.path()),\n-- AnyP::ProtocolType_str[request->http_ver.protocol],\n-- request->http_ver.major, request->http_ver.minor);\n-- request->header.packInto(&mb, true); //hide authorization data\n-- } else if (request_hdrs) {\n-- p = request_hdrs;\n-- } else {\n-+ else if (request)\n-+ request->pack(&mb, true /* hide authorization data */);\n-+ else\n- p = \"[no request]\";\n-- }\n- break;\n- \n- case 's':\n-diff --git a/src/errorpage.h b/src/errorpage.h\n-index abca4a17d7b..297b306978d 100644\n---- a/src/errorpage.h\n-+++ b/src/errorpage.h\n-@@ -194,7 +194,6 @@ class ErrorState\n- MemBuf *listing = nullptr;\n- } ftp;\n- \n-- char *request_hdrs = nullptr;\n- char *err_msg = nullptr; /* Preformatted error message from the cache */\n- \n- AccessLogEntryPointer ale; ///< transaction details (or nil)\n-diff --git a/src/tests/stub_HttpRequest.cc b/src/tests/stub_HttpRequest.cc\n-index 495597d9a1b..48a0f1ce03e 100644\n---- a/src/tests/stub_HttpRequest.cc\n-+++ b/src/tests/stub_HttpRequest.cc\n-@@ -45,7 +45,7 @@ bool HttpRequest::expectingBody(const HttpRequestMethod &, int64_t &) const STUB\n- bool HttpRequest::bodyNibbled() const STUB_RETVAL(false)\n- int HttpRequest::prefixLen() const STUB_RETVAL(0)\n- void HttpRequest::swapOut(StoreEntry *) STUB\n--void HttpRequest::pack(Packable *) const STUB\n-+void HttpRequest::pack(Packable *, bool) const STUB\n- void HttpRequest::httpRequestPack(void *, Packable *) STUB\n- HttpRequest * HttpRequest::FromUrl(const SBuf &, const MasterXaction::Pointer &, const HttpRequestMethod &) STUB_RETVAL(nullptr)\n- HttpRequest * HttpRequest::FromUrlXXX(const char *, const MasterXaction::Pointer &, const HttpRequestMethod &) STUB_RETVAL(nullptr)\ndiff --git a/package/squid/squid.hash b/package/squid/squid.hash\nindex 329d61ca93..508b5517c5 100644\n--- a/package/squid/squid.hash\n+++ b/package/squid/squid.hash\n@@ -1,3 +1,4 @@\n+# From https://github.com/squid-cache/squid/releases/tag/SQUID_7_5\n+sha256 f6058907db0150d2f5d228482b5a9e5678920cf368ae0ccbcecceb2ff4c35106 squid-7.5.tar.xz\n # Locally calculated\n-sha256 9eafe06f58a199b918e79d33d8aa03afb9ae0c11d18974dca0b44c2669cab6dd squid-6.14.tar.xz\n-sha256 8177f97513213526df2cf6184d8ff986c675afb514d4e68a404010521b880643 COPYING\n+sha256 edaef632cbb643e4e7a221717a6c441a4c1a7c918e6e4d56debc3d8739b233f6 COPYING\ndiff --git a/package/squid/squid.mk b/package/squid/squid.mk\nindex c031f1aa03..6d403c6c2e 100644\n--- a/package/squid/squid.mk\n+++ b/package/squid/squid.mk\n@@ -4,7 +4,7 @@\n #\n ################################################################################\n \n-SQUID_VERSION = 6.14\n+SQUID_VERSION = 7.5\n SQUID_SOURCE = squid-$(SQUID_VERSION).tar.xz\n SQUID_SITE = https://github.com/squid-cache/squid/releases/download/SQUID_$(subst .,_,$(SQUID_VERSION))\n SQUID_LICENSE = GPL-2.0+\n@@ -12,12 +12,6 @@ SQUID_LICENSE_FILES = COPYING\n SQUID_CPE_ID_VENDOR = squid-cache\n SQUID_SELINUX_MODULES = apache squid\n \n-# 0001-Fix-ASN-1-encoding-of-long-SNMP-OIDs.patch\n-SQUID_IGNORE_CVES += CVE-2025-59362\n-\n-# 0002-Proxy-auth-data-visible-to-scripts.patch\n-SQUID_IGNORE_CVES += CVE-2025-62168\n-\n SQUID_DEPENDENCIES = libcap host-libcap libtool libxml2 host-pkgconf \\\n \t$(if $(BR2_PACKAGE_LIBNETFILTER_CONNTRACK),libnetfilter_conntrack)\n SQUID_CONF_ENV = \\\n", "prefixes": [ "1/1" ] }