Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 27 Jul 2009 20:12:49 +0200 (CEST)
From:      Thomas-Martin Seck <tmseck@web.de>
To:        FreeBSD-gnats-submit@FreeBSD.org
Cc:        ports-security@FreeBSD.org
Subject:   ports/137184: [Maintainer] www/squid30: update to 3.0.STABLE17
Message-ID:  <200907271812.n6RICn5d066307@hardy.tmseck.homedns.org>
Resent-Message-ID: <200907271820.n6RIK144052619@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help

>Number:         137184
>Category:       ports
>Synopsis:       [Maintainer] www/squid30: update to 3.0.STABLE17
>Confidential:   no
>Severity:       critical
>Priority:       high
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          maintainer-update
>Submitter-Id:   current-users
>Arrival-Date:   Mon Jul 27 18:20:01 UTC 2009
>Closed-Date:
>Last-Modified:
>Originator:     Thomas-Martin Seck
>Release:        FreeBSD 7.2-RELEASE i386
>Organization:
a private site in Germany
>Environment:
FreeBSD ports collection as of July 27, 2009.

	
>Description:
Update to 3.0.STABLE17.

This update adresses several remote denial of service vulnerabilities.

Proposed VuXML entry:

  <vuln vid="e1156e90-7ad6-11de-b26a-0048543d60ce">
    <topic>squid -- several remote denial of service vulnerabilities</topic>
    <affects>
      <package>
        <name>squid</name>
	<range><ge>3.0.1</ge><lt>3.0.17</lt></range>
      </package>
    </affects>
    <description>
      <body xmlns="http://www.w3.org/1999/xhtml">;
        <p>Squid security advisory 2009:2 reports:</p>
	<blockquote cite="http://www.squid-cache.org/Advisories/SQUID-2009_2.txt">;
	  <p>Due to incorrect buffer limits and related bound checks Squid
	    is vulnerable to a denial of service attack when processing
	    specially crafted requests or responses.</p>
	  <p>Due to incorrect data validation Squid is vulnerable to a
	    denial of service attack when processing specially crafted
	    responses.</p>
	  <p>These problems allow any trusted client or external server to
	    perform a denial of service attack on the Squid service.</p>
	</blockquote> 
	<p>Squid-2.x releases are not affected.</p>
      </body>
    </description>
    <references>
      <url>http://www.squid-cache.org/Advisories/SQUID-2009_2.txt</url>;
    </references>
    <dates>
      <discovery>2009-07-27</discovery>
    </dates>
  </vuln>
	
>How-To-Repeat:
	
>Fix:
Apply this patch:

Index: Makefile
===================================================================
--- Makefile	(.../www/squid30)	(revision 1649)
+++ Makefile	(.../local/squid30)	(revision 1649)
@@ -92,14 +92,14 @@
 		http://www1.jp.squid-cache.org/%SUBDIR%/ \
 		http://www1.tw.squid-cache.org/%SUBDIR%/
 PATCH_SITE_SUBDIR=	Versions/v3/3.0/changesets
-PATCHFILES=	b9052.patch
+PATCHFILES=
 
 MAINTAINER=	tmseck@web.de
 COMMENT=	HTTP Caching Proxy
 
 LATEST_LINK=	squid30
 
-SQUID_STABLE_VER=	16
+SQUID_STABLE_VER=	17
 
 CONFLICTS=	squid-2.[0-9].* squid-3.[^0].* cacheboy-[0-9]*
 GNU_CONFIGURE=	yes
Index: distinfo
===================================================================
--- distinfo	(.../www/squid30)	(revision 1649)
+++ distinfo	(.../local/squid30)	(revision 1649)
@@ -1,6 +1,3 @@
-MD5 (squid3.0/squid-3.0.STABLE16.tar.bz2) = aa039a2c75404a496f0e99a278599e00
-SHA256 (squid3.0/squid-3.0.STABLE16.tar.bz2) = a1da48a7b9824f05b67b900ff1317e755e7749a545db0c62db45219bf0f6ae3e
-SIZE (squid3.0/squid-3.0.STABLE16.tar.bz2) = 1796458
-MD5 (squid3.0/b9052.patch) = 8039be92fb6ca5a71dd11b7d99c841fa
-SHA256 (squid3.0/b9052.patch) = dc78622e992816f8808d83c79045eec6f64fc7c7fe5cd2bb593613af655d56be
-SIZE (squid3.0/b9052.patch) = 1488
+MD5 (squid3.0/squid-3.0.STABLE17.tar.bz2) = 68b4cdb2590f36e9475e7a8c1c4a4046
+SHA256 (squid3.0/squid-3.0.STABLE17.tar.bz2) = 78d31501933b8a9e63d143838703c1eabb03e933665c723f59c8909115b96c5e
+SIZE (squid3.0/squid-3.0.STABLE17.tar.bz2) = 1798957
	


>Release-Note:
>Audit-Trail:
>Unformatted:



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200907271812.n6RICn5d066307>