Problem Description: Due to incorrect bounds checking Squid is vulnerable to a denial of service check during some cache update reply processing. Severity: This problem allows any client trusted to use the service to perform a denial of service attack on the Squid service. Updated Packages: This bug is fixed by Squid version 2.6.STABLE17 and by the November 28 snapshots of Squid-2 and Squid-3. In addition, a patch addressing this problem can be found in our patch archive for version Squid-2.6: http://www.squid-cache.org/Versions/v2/2.6/changesets/11780.patch And for Squid-3: http://www.squid-cache.org/Versions/v3/3.0/changesets/11211.patch If you are using a prepackaged version of Squid then please refer to the package vendor for availability information on updated packages. Reproducible: Always
maintainers - please provide an updated ebuild
I've added squid-2.6.17 to the tree and package masked version 3.0_rc1.
Arches, please test and mark stable net-proxy/squid-2.6.17. Target keywords : "alpha amd64 hppa ia64 ppc ppc64 sparc x86"
ppc64 stable
ppc stable
x86 stable
Compiles, merges, and works on amd64. emerge --info: Portage 2.1.3.19 (default-linux/amd64/2007.0, gcc-4.1.2, glibc-2.6.1-r0, 2.6.22-gentoo-r9 x86_64) ================================================================= System uname: 2.6.22-gentoo-r9 x86_64 Intel(R) Core(TM)2 CPU T7200 @ 2.00GHz Timestamp of tree: Tue, 04 Dec 2007 23:30:01 +0000 app-shells/bash: 3.2_p17 dev-java/java-config: 1.3.7, 2.0.33-r1 dev-lang/python: 2.4.4-r6, 2.5.1-r4 dev-python/pycrypto: 2.0.1-r6 sys-apps/baselayout: 1.12.9-r2 sys-apps/sandbox: 1.2.18.1-r2 sys-devel/autoconf: 2.13, 2.61-r1 sys-devel/automake: 1.4_p6, 1.5, 1.6.3, 1.7.9-r1, 1.8.5-r3, 1.9.6-r2, 1.10 sys-devel/binutils: 2.18-r1 sys-devel/gcc-config: 1.3.16 sys-devel/libtool: 1.5.24 virtual/os-headers: 2.6.22-r2 ACCEPT_KEYWORDS="amd64" CBUILD="x86_64-pc-linux-gnu" CFLAGS="-O2 -pipe -fomit-frame-pointer -march=nocona" CHOST="x86_64-pc-linux-gnu" CONFIG_PROTECT="/etc /usr/share/X11/xkb" CONFIG_PROTECT_MASK="/etc/env.d /etc/env.d/java/ /etc/fonts/fonts.conf /etc/gconf /etc/revdep-rebuild /etc/terminfo /etc/texmf/web2c /etc/udev/rules.d" CXXFLAGS="-O2 -pipe -fomit-frame-pointer -march=nocona" DISTDIR="/usr/portage/distfiles" FEATURES="collision-protect distlocks metadata-transfer multilib-strict parallel-fetch sandbox sfperms strict test unmerge-orphans userfetch" GENTOO_MIRRORS="http://gentoo.cites.uiuc.edu/pub/gentoo/" LINGUAS="en" MAKEOPTS="-j3" PKGDIR="/usr/portage/packages" PORTAGE_RSYNC_OPTS="--recursive --links --safe-links --perms --times --compress --force --whole-file --delete --delete-after --stats --timeout=180 --exclude=/distfiles --exclude=/local --exclude=/packages --filter=H_**/files/digest-*" PORTAGE_TMPDIR="/var/tmp" PORTDIR="/usr/portage" SYNC="rsync://rsync.gentoo.org/gentoo-portage" USE="X a52 aac acl acpi alsa amd64 berkdb bitmap-fonts cli cracklib crypt cups dri flac fortran gdbm gif gpm iconv ipv6 isdnlog jpeg midi mmx mp3 mudflap ncurses nls nptl nptlonly ogg opengl openmp pam pcre perl png pppd python readline reflection session spl sse sse2 ssl tcpd test truetype-fonts type1-fonts unicode vorbis xorg xv zlib" ALSA_CARDS="hda-intel" ALSA_PCM_PLUGINS="adpcm alaw asym copy dmix dshare dsnoop empty extplug file hooks iec958 ioplug ladspa lfloat linear meter mulaw multi null plug rate route share shm softvol" APACHE2_MODULES="actions alias auth_basic authn_alias authn_anon authn_dbm authn_default authn_file authz_dbm authz_default authz_groupfile authz_host authz_owner authz_user autoindex cache dav dav_fs dav_lock deflate dir disk_cache env expires ext_filter file_cache filter headers include info log_config logio mem_cache mime mime_magic negotiation rewrite setenvif speling status unique_id userdir usertrack vhost_alias" ELIBC="glibc" INPUT_DEVICES="evdev keyboard mouse synaptics" KERNEL="linux" LCD_DEVICES="bayrad cfontz cfontz633 glk hd44780 lb216 lcdm001 mtxorb ncurses text" LINGUAS="en" USERLAND="GNU" VIDEO_CARDS="i810 vesa vga" Unset: CPPFLAGS, CTARGET, EMERGE_DEFAULT_OPTS, INSTALL_MASK, LANG, LC_ALL, LDFLAGS, PORTAGE_COMPRESS, PORTAGE_COMPRESS_FLAGS, PORTAGE_RSYNC_EXTRA_OPTS, PORTDIR_OVERLAY
alpha/ia64/sparc stable
Stable for HPPA.
amd64 stable
this one is ready for glsa decision
voting NO since only a trusted client can cause a DoS.
trusted client means any client that can is trusted to use the proxy, which usually is a lot of clients. I vote YES here, even if it is only a memleak in the end. Proxy servers are designed to run for a while, and if one client can make my memory usage grow over time, until the server crashes, someone does have an issue.
i would suggest "Yes" because squid is often used to accellerate http-servers (you can just put a squid in front of you httpd and let it process the requests), and in such installations this vuln does matter because anyone in the net is a "trusted client" in that case.
FYI: squid-3.0.1 is now in the tree
(In reply to comment #14) > i would suggest "Yes" because squid is often used to accellerate http-servers > (you can just put a squid in front of you httpd and let it process the > requests), and in such installations this vuln does matter because anyone in > the net is a "trusted client" in that case. > Thanks for the info, changing my vote to YES and request filed.
rerating B3 as it is a dos
GLSA 200801-05
Does not affect current (2008.0) release. Removing release.