The NetBSD Project

CVS log for pkgsrc/www/squid4/distinfo

[BACK] Up to [cvs.NetBSD.org] / pkgsrc / www / squid4

Request diff between arbitrary revisions


Default branch: MAIN


Revision 1.9 / (download) - annotate - [select for diffs], Sun Aug 23 09:51:35 2020 UTC (3 months ago) by taca
Branch: MAIN
CVS Tags: pkgsrc-2020Q3-base, pkgsrc-2020Q3, HEAD
Changes since 1.8: +5 -5 lines
Diff to previous 1.8 (colored)

www/squid4: update to 4.13

Update squid4 to 4.13 (Squid 4.13).

Here is release announce:

The Squid HTTP Proxy team is very pleased to announce the availability
of the Squid-4.13 release!


This release is a security release resolving several issues found in
the prior Squid releases.


The major changes to be aware of:

 * SQUID-2020:8 HTTP(S) Request Splitting
   (CVE-2020-15811)

This problem is serious because it allows any client, including
browser scripts, to bypass local security and poison the browser
cache and any downstream caches with content from an arbitrary
source.

See the advisory for patches:
 <https://github.com/squid-cache/squid/security/advisories/GHSA-c7p8-xqhm-49wv>


 * SQUID-2020:9 Denial of Service processing Cache Digest Response
   (CVE pending allocation)

This problem allows a trusted peer to deliver to perform Denial
of Service by consuming all available CPU cycles on the machine
running Squid when handling a crafted Cache Digest response
message.

This attack is limited to Squid using cache_peer with cache
digests feature.

See the advisory for patches:
 <https://github.com/squid-cache/squid/security/advisories/GHSA-vvj7-xjgq-g2jg>


 * SQUID-2020:10 HTTP(S) Request Smuggling
   (CVE-2020-15810)

This problem is serious because it allows any client, including
browser scripts, to bypass local security and poison the proxy
cache and any downstream caches with content from an arbitrary
source.


See the advisory for patches:
 <https://github.com/squid-cache/squid/security/advisories/GHSA-3365-q9qx-f98m>


 * Bug 5051: Some collapsed revalidation responses never expire

This bug appears as a 4xx or 5xx status response becoming the only
response delivered by Squid to a URL when Collapsed Forwarding
feature is used.

It primarily affects Squid which are caching the 4xx/5xx status
object since Bug 5030 fix in Squid-4.11. But may have been
occurring for short times on any proxy with Collapsed Forwarding.



 * SSL-Bump: Support parsing GREASEd (and future) TLS handshakes

Chrome Browser intentionally sends random garbage values in the
TLS handshake to force TLS implementations to cope with future TLS
extensions cleanly. The changes in Squid-4.12 to disable TLS/1.3
caused our parser to be extra strict and reject this TLS garbage.

This release adds explicit support for Chrome, or any other TLS
agent performing these "GREASE" behaviours.


 * Honor on_unsupported_protocol for intercepted https_port

This behaviour was one of the intended use-cases for unsupported
protocol handling, but somehow was not enabled earlier.

Squid should now be able to perform the on_unsupported_protocol
selected action for any traffic handled by SSL-Bump.


  All users of Squid are urged to upgrade as soon as possible.


See the ChangeLog for the full list of changes in this and earlier
releases.

Please refer to the release notes at
http://www.squid-cache.org/Versions/v4/RELEASENOTES.html
when you are ready to make the switch to Squid-4

Revision 1.8 / (download) - annotate - [select for diffs], Thu Jul 9 20:57:11 2020 UTC (4 months, 2 weeks ago) by otis
Branch: MAIN
Changes since 1.7: +3 -1 lines
Diff to previous 1.7 (colored)

squid4: Fix build and SSL handshake on Chromium-based browsers

Changes:
- Fix an error where strings.h was not properly included
- Add SMF support on apropriate platforms
- Backport https://github.com/squid-cache/squid/pull/663:
  SslBump: Support parsing GREASEd (and future) TLS handshakes

Revision 1.7 / (download) - annotate - [select for diffs], Fri Jun 19 13:44:28 2020 UTC (5 months, 1 week ago) by taca
Branch: MAIN
CVS Tags: pkgsrc-2020Q2-base, pkgsrc-2020Q2
Changes since 1.6: +6 -8 lines
Diff to previous 1.6 (colored)

www/squid4: update to 4.12

Update squid4 to 4.12 (Squid 4.12).  This release includes fix for
CVE-2020-14058:   <http://www.squid-cache.org/Advisories/SQUID-2020_6.txt>.


Changes to squid-4.12 (05 Jun 2020):

	- Regression Fix: Revert to slow search for new SMP shm pages
	- Bug 5045: ext_edirectory_userip_acl is missing include files
	- Bug 5041: Missing Debug::Extra breaks build on hosts with systemd
	- Bug 5030: Negative responses are never cached
	- HTTP: validate Content-Length value prefix
	- HTTP: add flexible RFC 3986 URI encoder
	- SslBump: disable OpenSSL TLSv1.3 support for older TLS traffic
	- Tests: Support passing a custom config.cache to test builds
	- Fix IPFilter IPv6 detection, especially on NetBSD
	- Fix stall if transaction overwrites a recently active cache entry
	- ... and some compile fixes

Revision 1.3.2.1 / (download) - annotate - [select for diffs], Thu Apr 30 08:35:50 2020 UTC (6 months, 4 weeks ago) by bsiegert
Branch: pkgsrc-2020Q1
Changes since 1.3: +8 -6 lines
Diff to previous 1.3 (colored) next main 1.4 (colored)

Pullup ticket #6179 - requested by taca
www/squid4: security fix

Revisions pulled up:
- www/squid4/Makefile                                           1.6-1.7
- www/squid4/distinfo                                           1.4-1.6
- www/squid4/patches/patch-acinclude_os-deps.m4                 1.1-1.2
- www/squid4/patches/patch-configure                            1.3-1.5
- www/squid4/patches/patch-src_ip_Intercept.cc                  1.1

---
   Module Name:	pkgsrc
   Committed By:	sborrill
   Date:		Thu Apr  9 09:45:20 UTC 2020

   Modified Files:
   	pkgsrc/www/squid4: Makefile distinfo
   	pkgsrc/www/squid4/patches: patch-configure
   Added Files:
   	pkgsrc/www/squid4/patches: patch-acinclude_os-deps.m4
   	    patch-src_ip_Intercept.cc

   Log Message:
   Fix IPFilter transparent proxy support by:
   - including correct headers in configure tests
   - using correct autoconf value output by configure

   Bump PKGREVISION

---
   Module Name:	pkgsrc
   Committed By:	sborrill
   Date:		Thu Apr  9 16:27:15 UTC 2020

   Modified Files:
   	pkgsrc/www/squid4: distinfo
   	pkgsrc/www/squid4/patches: patch-acinclude_os-deps.m4 patch-configure

   Log Message:
   Generate correct #defines for the IPFilter IPv6 detection with no trailing
   underscores

---
   Module Name:	pkgsrc
   Committed By:	mef
   Date:		Thu Apr 23 13:52:24 UTC 2020

   Modified Files:
   	pkgsrc/www/squid4: Makefile distinfo
   	pkgsrc/www/squid4/patches: patch-configure

   Log Message:
   (www/squid4) Updated to 4.10 (and clear pkglint one point in patch)

   Changes to squid-4.11 (18 Apr 2020):

           - Bug 5036: capital 'L's in logs when daemon queue overflows
           - Bug 5022: Reconfigure kills Coordinator in SMP+ufs configurations
           - Bug 5016: systemd thinks Squid is ready before Squid listens
           - kerberos_ldap_group: fix encryption type for cross realm check
           - HTTP: Ignore malformed Host header in intercept and reverse proxy mode
           - Fix Digest authentication nonce handling
           - Supply ALE to request_header_add/reply_header_add
           - ... and some documentation updates
           - ... and some compile fixes

Revision 1.6 / (download) - annotate - [select for diffs], Thu Apr 23 13:52:24 2020 UTC (7 months ago) by mef
Branch: MAIN
Changes since 1.5: +6 -6 lines
Diff to previous 1.5 (colored)

(www/squid4) Updated to 4.10 (and clear pkglint one point in patch)

Changes to squid-4.11 (18 Apr 2020):

        - Bug 5036: capital 'L's in logs when daemon queue overflows
        - Bug 5022: Reconfigure kills Coordinator in SMP+ufs configurations
        - Bug 5016: systemd thinks Squid is ready before Squid listens
        - kerberos_ldap_group: fix encryption type for cross realm check
        - HTTP: Ignore malformed Host header in intercept and reverse proxy mode
        - Fix Digest authentication nonce handling
        - Supply ALE to request_header_add/reply_header_add
        - ... and some documentation updates
        - ... and some compile fixes

Revision 1.5 / (download) - annotate - [select for diffs], Thu Apr 9 16:27:15 2020 UTC (7 months, 2 weeks ago) by sborrill
Branch: MAIN
Changes since 1.4: +2 -2 lines
Diff to previous 1.4 (colored)

Generate correct #defines for the IPFilter IPv6 detection with no trailing
underscores

Revision 1.4 / (download) - annotate - [select for diffs], Thu Apr 9 09:45:19 2020 UTC (7 months, 2 weeks ago) by sborrill
Branch: MAIN
Changes since 1.3: +4 -2 lines
Diff to previous 1.3 (colored)

Fix IPFilter transparent proxy support by:
- including correct headers in configure tests
- using correct autoconf value output by configure

Bump PKGREVISION

Revision 1.3 / (download) - annotate - [select for diffs], Tue Feb 4 03:03:48 2020 UTC (9 months, 3 weeks ago) by taca
Branch: MAIN
CVS Tags: pkgsrc-2020Q1-base
Branch point for: pkgsrc-2020Q1
Changes since 1.2: +6 -7 lines
Diff to previous 1.2 (colored)

www/squid4: update to 4.10

pkgsrc changes: clean up PKG_OPTIONS and enable several backends default.

Quote from release announce:

This release is a security release resolving several issues found in
the prior Squid releases.

The major changes to be aware of:

 * SQUID-2020:1 Improper Input Validation issues in HTTP Request
   processing
   (CVE-2020-8449, CVE-2020-8450)

This issue allows attackers to perform denial of service on the
proxy and all clients using it.

This issue potentially allows attackers to bypass security access
controls in systems between client and proxy.

This issue potentially allows remote code execution under the
proxy low-privilege level. While restricted, it does have access
to a wide range of information about the network structure and
other clients using the proxy.

This issue is limited to Squid acting as a reverse-proxy. Some
effects also require allow_direct permissions.

See the advisory for updated patches:
 <http://www.squid-cache.org/Advisories/SQUID-2020_1.txt>

Please note that NTLM is a deprecated authentication mechanism.
All users of this tool are advised to plan migration to
Negotiate/Kerberos authentication.

 * SQUID-2020:2 Information Disclosure issue in FTP Gateway.
   (CVE-2019-12528)

Certain FTP server responses can result in Squid revealing
random amounts of memory content from heap.

When Squid mempools feature is enabled the leak is limited to
lines in FTP directory listings, possibly from other clients.

When mempools is disabled the information may be anything from
the heap area including information from other processes on the
machine.

See the advisory for more details:
 <http://www.squid-cache.org/Advisories/SQUID-2020_2.txt>

 * SQUID-2020:3 Buffer Overflow issue in ext_lm_group_acl helper.
   (CVE-2020-8517)

This problem is limited to installations using the ext_lm_group_acl
binary (previously shipped as mswin_check_lm_group).

Due to incorrect input validation the NTLM authentication
credentials parser in ext_lm_group_acl may write to memory
outside the credentials buffer.

On systems with memory access protections this can result in
the the helper process being terminated unexpectedly. Resulting
in Squid process also terminating and a denial of service for
all clients using the proxy.

See the advisory for more details:
 <http://www.squid-cache.org/Advisories/SQUID-2020_3.txt>

 * Bug 5008: SIGBUS in PagePool::level() with custom rock slot size

This shows up as SMP Squids crashing on arm64 with a SIGBUS error. The
issues was incorrect memory alignment with certain cache sizes. This
Squid release now forces alignment of the critical rock page details.

 * Bug 4735: Truncated chunked responses cached as whole

This bug shows up as clients getting the cached truncated response
objects until the cache object expires or is force removed.

In absence of partial-object caching this Squid release treats
incomplete responses as non-cacheable and prevents the chunked encoding
terminator chunk being delivered to the active client(s).

 * Fix server_cert_fingerprint on cert validator-reported errors

This bug shows up as a server_cert_fingerprint ACL mismatch when
sslproxy_cert_error directive was applied to validation errors reported
by the certificate validator, because the ACL could not find the server
certificate.

  All users of Squid are urged to upgrade as soon as possible.

Revision 1.2 / (download) - annotate - [select for diffs], Fri Jan 10 21:22:22 2020 UTC (10 months, 2 weeks ago) by joerg
Branch: MAIN
Changes since 1.1: +3 -2 lines
Diff to previous 1.1 (colored)

Fix kqueue fallout on NetBSD current.

Revision 1.1 / (download) - annotate - [select for diffs], Sat Jan 4 10:57:18 2020 UTC (10 months, 3 weeks ago) by taca
Branch: MAIN

www/squid4: Add squid4 package version 4.9

Add squid4 package version 4.9 based on wip/squid4 package.

Squid is a fully-featured HTTP/1.0 proxy with partial HTTP/1.1 support
The 4 series brings many new features and upgrades to the basic
networking protocols. A short list of the major new features is:

Squid 4 represents a new feature release above 3.5.

The most important of these new features are:

* Configurable helper queue size
* Helper concurrency channels changes
* SSL support removal
* Helper Binary Changes
* Secure ICAP
* Improved SMP support
* Improved process management
* Initial GnuTLS support
* ESI Custom Parser removal

This form allows you to request diff's between any two revisions of a file. You may select a symbolic revision name using the selection box or you may type in a numeric name using the type-in text box.




CVSweb <webmaster@jp.NetBSD.org>