Merge ~sergiodj/ubuntu/+source/squid:merge-5.6-1-kinetic into ubuntu/+source/squid:debian/sid
- Git
- lp:~sergiodj/ubuntu/+source/squid
- merge-5.6-1-kinetic
- Merge into debian/sid
Status: | Merged | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Merge reported by: | Sergio Durigan Junior | ||||||||||||||||
Merged at revision: | caf7e094d6fb550a059dd6a7656ae819c0246259 | ||||||||||||||||
Proposed branch: | ~sergiodj/ubuntu/+source/squid:merge-5.6-1-kinetic | ||||||||||||||||
Merge into: | ubuntu/+source/squid:debian/sid | ||||||||||||||||
Diff against target: |
1142 lines (+976/-2) 9 files modified
debian/NEWS (+7/-0) debian/changelog (+735/-0) debian/control (+3/-2) debian/patches/0009-Fix-Werror-alloc-size-larger-than-on-GCC-12.patch (+65/-0) debian/patches/90-cf.data.ubuntu.patch (+22/-0) debian/patches/99-ubuntu-ssl-cert-snakeoil.patch (+24/-0) debian/patches/fix-max-pkt-sz-for-icmpEchoData-padding.patch (+89/-0) debian/patches/series (+4/-0) debian/usr.sbin.squid (+27/-0) |
||||||||||||||||
Related bugs: |
|
Reviewer | Review Type | Date Requested | Status |
---|---|---|---|
Christian Ehrhardt (community) | Needs Fixing | ||
Canonical Server Reporter | Pending | ||
Review via email: mp+428123@code.launchpad.net |
Commit message
Description of the change
This is the merge of squid 5.6-1 from Debian unstable.
The merge was relatively easy to perform, and I was able to drop 2 sets of changes from our delta:
1) A fix for CVE 2021-46784, which has been incorporated by upstream.
2) A set of patches that I had backported during the last cycle in order to implement support for OpenSSL 3.
The first drop is trivial, but the second is more involved.
Upstream spent quite a long time discussing the OpenSSL 3 support (for more details, see <https:/
A few weeks ago upstream finally merged the final version of the PR. Initially I thought that I'd be able to backport the commit to squid 5.6 (the latest version, also available in Debian) and be done with it, but unfortunately the situation is more complicated than that. The final patch makes use of a lot of new code that has been pushed after 5.6 was released, and the backport proved non-trivial (to say the least). So, my proposed solution here is: let's drop the OpenSSL 3 patches that I had backported for Jammy, let's use the (simpler) OpenSSL 3 patch that Debian has been carrying for a while, and let's postpone the backport of upstream's official commit to next cycle. By then, we may not even have to worry about backporting anything because I believe upstream will release a new version of squid soon.
Finally, I'm adding a minor delta needed to make the package build with GCC 12. I've forwarded the patch upstream as well, so it should be possible to remove it next cycle.
There's a PPA with the proposed changes here:
https:/
Builds are still happening; I will post the autopkgtest results ASAP.
Simon Déziel (sdeziel) wrote : | # |
Sergio Durigan Junior (sergiodj) wrote : | # |
On Wednesday, August 10 2022, Simon Déziel wrote:
> I like your proposed plan.
Thanks, Simon.
> Tiny nitpick, there is a double "/" in: "d//p/0009-
Ops, good catch. Fixed now.
--
Sergio
GPG key ID: E92F D0B3 6B14 F1F4 D8E0 EB2F 106D A1C8 C3CB BF14
Christian Ehrhardt (paelzer) wrote : | # |
FYI - Cleared a few bugs linked here not addressed by this MR
Christian Ehrhardt (paelzer) wrote : | # |
One finding so far
Logical LGTM when reading and on comparison
$ git diff sergiodj/
changelog | 689 +++++++
control | 3
2 files changed, 691 insertions(+), 1 deletion(-)
Comparing changelog to git range-diff sergiodj/
1: e8aa00ea58 = 1: b61bbdbef6 - d/usr.sbin.squid: Add sections for squid-deb-proxy and squidguard
=> equal and in changelog
2: 37cc10db0e ! 2: 5fcec25f2e - d/p/90-
=> just noise in d/p/series and in changelog
3: 7caf6552cf ! 3: 796331ccb0 - Use snakeoil certificates: + d/control: add ssl-cert to dependencies + d/p/99-
=> had noise anyway and needed to be refreshed, done so with better quilt config and in changelog
4: 3de0e9ea5f = 4: 9f67994339 - d/rules, d/NEWS: drop the NIS basic auth helper (LP: #1895694)
=> equal and in changelog
5: de801abcee ! 5: b5a471d3d0 - Fix FTBFS with GCC 11 (LP: #1939352) + d/p/expand-
=> partially dropped as it is upstream, correct to do so
xxx
=> But I miss mentioning now dropping d/p/workaround-
xxx
6: 32bdc5f5d6 < -: ---------- * Fix FTBFS with OpenSSL 3.0 (LP: #1946205). The following new patches have been added: - d/p/openssl3-
7: 1bbcea11c5 < -: ---------- * Do not enable openssl as a default. This hinders packaging since we ship squid in two different flavours (gnutls and openssl). Drop d/p/openssl3-
8: 8573392502 < -: ---------- * SECURITY UPDATE: Denial of Service in Gopher Processing - debian/
-: ---------- > 6: 91eb5d18f2 * Drop changes: - Fix FTBFS with OpenSSL 3.0 (LP: #1946205). The following new patches have been added: + d/p/openssl3-
Christian Ehrhardt (paelzer) wrote : | # |
FYI - no autopkgtests ran so far, I've scheduled them now
Running:
time pkg release arch ppa trigger
30 squid kinetic s390x sergiodj/squid squid/5.
Waiting:
Q-num pkg release arch ppa trigger
1 squid kinetic ppc64el sergiodj/squid squid/5.
1 squid kinetic arm64 sergiodj/squid squid/5.
1 squid kinetic armhf sergiodj/squid squid/5.
1 squid kinetic amd64 sergiodj/squid squid/5.
Christian Ehrhardt (paelzer) wrote : | # |
launchpadlibrar
But the resulting debs seemed ok for me in a quick test.
Christian Ehrhardt (paelzer) wrote : | # |
Summary:
- a little nit pick of a forgotten changelog entry
- waiting for the autopkgtest results
Once both are fixed consider this approved.
If you want explicit re-checking then let me know.
- b26282e... by Sergio Durigan Junior
-
- Fix FTBFS with GCC 11 (LP #1939352)
+ d/p/workaround-gcc11-wstringop -overread- bug.patch: Workaround
GCC 11 -Wstringop-overread bug.
[ Not needed anymore. ] - d85920c... by Sergio Durigan Junior
-
merge-changelogs
- c8bb7bd... by Sergio Durigan Junior
-
reconstruct-
changelog - caf7e09... by Sergio Durigan Junior
-
update-maintainer
Sergio Durigan Junior (sergiodj) wrote : | # |
Thank you for the review, Christian.
I've updated the changelog entry to reflect the dropped patch; thanks for catching this.
I have the autopkgtest results now; only armhf is failing, but that seems like a flaky failure. I've retriggered the test and will upload as soon as it succeeds.
Sergio Durigan Junior (sergiodj) wrote : | # |
I just noticed that the armhf dep8 test is already failing against migration-
Thanks again.
$ dput squid_5.
Trying to upload package to ubuntu
Checking signature on .changes
gpg: /home/sergio/
Checking signature on .dsc
gpg: /home/sergio/
Uploading to ubuntu (via ftp to upload.ubuntu.com):
Uploading squid_5.
Uploading squid_5.
Uploading squid_5.
Uploading squid_5.
Uploading squid_5.
Uploading squid_5.
Successfully uploaded packages.
Preview Diff
1 | diff --git a/debian/NEWS b/debian/NEWS |
2 | index 1ac410c..83136fb 100644 |
3 | --- a/debian/NEWS |
4 | +++ b/debian/NEWS |
5 | @@ -37,6 +37,13 @@ squid (4.13-2) unstable; urgency=high |
6 | |
7 | -- Santiago Garcia Mantinan <manty@debian.org> Sun, 07 Feb 2021 01:43:37 +0100 |
8 | |
9 | +squid (4.13-1ubuntu2) groovy; urgency=medium |
10 | + |
11 | + Disable the NIS basic authentication helper, as it no longer builds with |
12 | + glibc 2.32. |
13 | + |
14 | + -- Andreas Hasenack <andreas@canonical.com> Thu, 17 Sep 2020 18:17:53 -0300 |
15 | + |
16 | squid (4.1-1) unstable; urgency=medium |
17 | |
18 | Starting from this release support for systemd init has been added to the |
19 | diff --git a/debian/changelog b/debian/changelog |
20 | index 47a68d3..724392b 100644 |
21 | --- a/debian/changelog |
22 | +++ b/debian/changelog |
23 | @@ -1,3 +1,49 @@ |
24 | +squid (5.6-1ubuntu1) kinetic; urgency=medium |
25 | + |
26 | + * Merge with Debian unstable (LP: #1971325). Remaining changes: |
27 | + - d/usr.sbin.squid: Add sections for squid-deb-proxy and |
28 | + squidguard |
29 | + - d/p/90-cf.data.ubuntu.patch: Add refresh patterns for deb |
30 | + packaging |
31 | + - Use snakeoil certificates: |
32 | + + d/control: add ssl-cert to dependencies |
33 | + + d/p/99-ubuntu-ssl-cert-snakeoil.patch: add a note about ssl |
34 | + to the default config file |
35 | + - d/rules, d/NEWS: drop the NIS basic auth helper (LP #1895694) |
36 | + - Fix FTBFS with GCC 11 (LP #1939352) |
37 | + + d/p/fix-max-pkt-sz-for-icmpEchoData-padding.patch: Fix |
38 | + MAX_PKT{4,6}_SZ to account for icmpEchoData padding. |
39 | + * Drop changes: |
40 | + - Fix FTBFS with OpenSSL 3.0 (LP #1946205). The following new |
41 | + patches have been added: |
42 | + + d/p/openssl3-Declaration-of-CRYPTO_EX_dup-changed-again-in-3.0.patch. |
43 | + + d/p/openssl3-Detect-and-default-enable-OpenSSL-3.patch. |
44 | + + d/p/openssl3-Fix-EVP_PKEY_get0_RSA-is-deprecated.patch. |
45 | + + d/p/openssl3-Initial-DH-conversion-to-EVP_PKEY.patch. |
46 | + + d/p/openssl3-Refactor-Ssl-createSslPrivateKey.patch. |
47 | + + d/p/openssl3-Remove-stale-TODO-and-comment.patch. |
48 | + + d/p/openssl3-SSL_OP_-macro-definitions-changed-in-3.0.patch. |
49 | + + d/p/openssl3-Switch-to-BN_rand.patch. |
50 | + + d/p/openssl3-TODO-Upgrade-API-calls-verifying-loaded-DH-params-fi.patch. |
51 | + + d/p/openssl3-Tweak-RSA-key-generator.patch. |
52 | + + d/p/openssl3-Update-ECDH-key-settings.patch. |
53 | + + d/p/openssl3-Update-license-disclaimer.patch. |
54 | + [ Incorporated by Debian. ] |
55 | + - SECURITY UPDATE: Denial of Service in Gopher Processing |
56 | + + debian/patches/CVE-2021-46784.patch: improve handling of Gopher |
57 | + responses in src/gopher.cc. |
58 | + [ Incorporated by upstream. ] |
59 | + - Fix FTBFS with GCC 11 (LP #1939352) |
60 | + + d/p/workaround-gcc11-wstringop-overread-bug.patch: Workaround |
61 | + GCC 11 -Wstringop-overread bug. |
62 | + [ Not needed anymore. ] |
63 | + * Add changes: |
64 | + - d/p/0009-Fix-Werror-alloc-size-larger-than-on-GCC-12.patch: |
65 | + Fix FTBFS due to -Werror=alloc-size-larger-than on GCC 12. |
66 | + [ Forwarded upstream ] |
67 | + |
68 | + -- Sergio Durigan Junior <sergio.durigan@canonical.com> Thu, 11 Aug 2022 17:13:45 -0400 |
69 | + |
70 | squid (5.6-1) unstable; urgency=high |
71 | |
72 | * Urgency high due to security fixes |
73 | @@ -38,6 +84,87 @@ squid (5.5-1) unstable; urgency=medium |
74 | |
75 | -- Luigi Gangitano <luigi@debian.org> Fri, 15 Apr 2022 14:39:54 +0200 |
76 | |
77 | +squid (5.2-1ubuntu5) kinetic; urgency=medium |
78 | + |
79 | + * SECURITY UPDATE: Denial of Service in Gopher Processing |
80 | + - debian/patches/CVE-2021-46784.patch: improve handling of Gopher |
81 | + responses in src/gopher.cc. |
82 | + - CVE-2021-46784 |
83 | + |
84 | + -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Tue, 21 Jun 2022 13:38:17 -0400 |
85 | + |
86 | +squid (5.2-1ubuntu4) jammy; urgency=medium |
87 | + |
88 | + * Do not enable openssl as a default. This hinders packaging since we ship |
89 | + squid in two different flavours (gnutls and openssl). Drop |
90 | + d/p/openssl3-Detect-and-default-enable-OpenSSL-3.patch. (LP: #1968200) |
91 | + |
92 | + -- Athos Ribeiro <athos.ribeiro@canonical.com> Tue, 12 Apr 2022 23:41:41 -0300 |
93 | + |
94 | +squid (5.2-1ubuntu3) jammy; urgency=medium |
95 | + |
96 | + * Fix FTBFS with OpenSSL 3.0 (LP: #1946205). The following new |
97 | + patches have been added: |
98 | + - d/p/openssl3-Declaration-of-CRYPTO_EX_dup-changed-again-in-3.0.patch. |
99 | + - d/p/openssl3-Detect-and-default-enable-OpenSSL-3.patch. |
100 | + - d/p/openssl3-Fix-EVP_PKEY_get0_RSA-is-deprecated.patch. |
101 | + - d/p/openssl3-Initial-DH-conversion-to-EVP_PKEY.patch. |
102 | + - d/p/openssl3-Refactor-Ssl-createSslPrivateKey.patch. |
103 | + - d/p/openssl3-Remove-stale-TODO-and-comment.patch. |
104 | + - d/p/openssl3-SSL_OP_-macro-definitions-changed-in-3.0.patch. |
105 | + - d/p/openssl3-Switch-to-BN_rand.patch. |
106 | + - d/p/openssl3-TODO-Upgrade-API-calls-verifying-loaded-DH-params-fi.patch. |
107 | + - d/p/openssl3-Tweak-RSA-key-generator.patch. |
108 | + - d/p/openssl3-Update-ECDH-key-settings.patch. |
109 | + - d/p/openssl3-Update-license-disclaimer.patch. |
110 | + |
111 | + -- Sergio Durigan Junior <sergio.durigan@canonical.com> Tue, 08 Feb 2022 17:15:20 -0500 |
112 | + |
113 | +squid (5.2-1ubuntu2) jammy; urgency=medium |
114 | + |
115 | + * No-change rebuild against libssl3 |
116 | + |
117 | + -- Steve Langasek <steve.langasek@ubuntu.com> Thu, 09 Dec 2021 00:19:10 +0000 |
118 | + |
119 | +squid (5.2-1ubuntu1) jammy; urgency=medium |
120 | + |
121 | + * Merge with Debian unstable (LP: #1946903). Remaining changes: |
122 | + - d/usr.sbin.squid: Add sections for squid-deb-proxy and |
123 | + squidguard |
124 | + - d/p/90-cf.data.ubuntu.patch: Add refresh patterns for deb |
125 | + packaging |
126 | + - Use snakeoil certificates: |
127 | + + d/control: add ssl-cert to dependencies |
128 | + + d/p/99-ubuntu-ssl-cert-snakeoil.patch: add a note about ssl |
129 | + to the default config file |
130 | + - d/rules, d/NEWS: drop the NIS basic auth helper (LP #1895694) |
131 | + - Fix FTBFS with GCC 11 (LP #1939352) |
132 | + + d/p/expand-max-pkt-sz-accomodate-icmphdr.patch: Expand |
133 | + MAX_PKT{4,6}_SZ to accomodate for icmp{,6_}hdr. |
134 | + + d/p/workaround-gcc11-wstringop-overread-bug.patch: Workaround |
135 | + GCC 11 -Wstringop-overread bug. |
136 | + * Dropped changes: |
137 | + - d/p/0008-Fix-free-nonheap-object-warning-error-on-snmp_core.c.patch: |
138 | + Fix call to free on nonheap-object in snmpCreateOidFromStr |
139 | + [ Incorporated by upstream. ] |
140 | + - Fix failure to build on RISC-V (LP #1934891) |
141 | + [ Incorporated by upstream. ] |
142 | + - SECURITY UPDATE: information disclosure via OOB read in WCCP protocol |
143 | + + debian/patches/CVE-2021-28116.patch: validate packets better in |
144 | + src/wccp2.cc. |
145 | + + CVE-2021-28116 |
146 | + [ Incorporated by upstream. ] |
147 | + - Fix FTBFS with GCC 11 (LP #1939352) |
148 | + + d/p/replace-cbdata-offset-hack-with-offsetof.patch: Replace |
149 | + cbdata::Offset hack with offsetof(). |
150 | + + d/p/add-missing-limits-include-connmark.patch: Add missing |
151 | + <limits> include to src/acl/ConnMark.cc. |
152 | + [ Incorporated by upstream. This is a partial drop; the other |
153 | + two patches that compose this fix are still present in this |
154 | + release. ] |
155 | + |
156 | + -- Sergio Durigan Junior <sergio.durigan@canonical.com> Mon, 01 Nov 2021 18:19:59 -0400 |
157 | + |
158 | squid (5.2-1) unstable; urgency=medium |
159 | |
160 | [ Amos Jeffries <amosjeffries@squid-cache.org> ] |
161 | @@ -78,6 +205,58 @@ squid (5.1-2) unstable; urgency=medium |
162 | |
163 | -- Luigi Gangitano <luigi@debian.org> Fri, 17 Sep 2021 09:27:54 +0200 |
164 | |
165 | +squid (4.13-10ubuntu5) impish; urgency=medium |
166 | + |
167 | + * SECURITY UPDATE: information disclosure via OOB read in WCCP protocol |
168 | + - debian/patches/CVE-2021-28116.patch: validate packets better in |
169 | + src/wccp2.cc. |
170 | + - CVE-2021-28116 |
171 | + |
172 | + -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Mon, 04 Oct 2021 08:20:07 -0400 |
173 | + |
174 | +squid (4.13-10ubuntu4) impish; urgency=medium |
175 | + |
176 | + * Fix FTBFS with GCC 11 (LP: #1939352) |
177 | + - d/p/add-missing-limits-include-connmark.patch: Add missing |
178 | + <limits> include to src/acl/ConnMark.cc. |
179 | + - d/p/fix-max-pkt-sz-for-icmpEchoData-padding.patch.patch: Expand |
180 | + MAX_PKT{4,6}_SZ to accomodate for icmp{,6_}hdr. |
181 | + - d/p/replace-cbdata-offset-hack-with-offsetof.patch: Replace |
182 | + cbdata::Offset hack with offsetof(). |
183 | + - d/p/workaround-gcc11-wstringop-overread-bug.patch: Workaround |
184 | + GCC 11 -Wstringop-overread bug. |
185 | + |
186 | + -- Sergio Durigan Junior <sergio.durigan@canonical.com> Fri, 20 Aug 2021 00:19:41 -0400 |
187 | + |
188 | +squid (4.13-10ubuntu3) impish; urgency=medium |
189 | + |
190 | + * Fix failure to build on RISC-V (LP: #1934891) |
191 | + |
192 | + -- Heinrich Schuchardt <heinrich.schuchardt@canonical.com> Wed, 07 Jul 2021 14:11:51 +0200 |
193 | + |
194 | +squid (4.13-10ubuntu2) impish; urgency=medium |
195 | + |
196 | + * No-change rebuild due to OpenLDAP soname bump. |
197 | + |
198 | + -- Sergio Durigan Junior <sergio.durigan@canonical.com> Mon, 21 Jun 2021 18:09:05 -0400 |
199 | + |
200 | +squid (4.13-10ubuntu1) impish; urgency=medium |
201 | + |
202 | + * Merge with Debian unstable. Remaining changes: |
203 | + - d/usr.sbin.squid: Add sections for squid-deb-proxy and |
204 | + squidguard |
205 | + - d/p/90-cf.data.ubuntu.patch: Add refresh patterns for deb |
206 | + packaging |
207 | + - Use snakeoil certificates: |
208 | + + d/control: add ssl-cert to dependencies |
209 | + + d/p/99-ubuntu-ssl-cert-snakeoil.patch: add a note about ssl |
210 | + to the default config file |
211 | + - d/rules, d/NEWS: drop the NIS basic auth helper (LP: #1895694) |
212 | + - d/p/0008-Fix-free-nonheap-object-warning-error-on-snmp_core.c.patch: |
213 | + Fix call to free on nonheap-object in snmpCreateOidFromStr |
214 | + |
215 | + -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Fri, 04 Jun 2021 12:49:43 -0400 |
216 | + |
217 | squid (4.13-10) unstable; urgency=medium |
218 | |
219 | [ Francisco Vilmar Cardoso Ruviaro ] |
220 | @@ -96,6 +275,29 @@ squid (4.13-10) unstable; urgency=medium |
221 | |
222 | -- Santiago Garcia Mantinan <manty@debian.org> Fri, 28 May 2021 12:28:20 +0200 |
223 | |
224 | +squid (4.13-9ubuntu1) impish; urgency=medium |
225 | + |
226 | + * Merge with Debian unstable. Remaining changes: |
227 | + - d/usr.sbin.squid: Add sections for squid-deb-proxy and |
228 | + squidguard |
229 | + - d/p/90-cf.data.ubuntu.patch: Add refresh patterns for deb |
230 | + packaging |
231 | + - Use snakeoil certificates: |
232 | + + d/control: add ssl-cert to dependencies |
233 | + + d/p/99-ubuntu-ssl-cert-snakeoil.patch: add a note about ssl |
234 | + to the default config file |
235 | + - d/rules, d/NEWS: drop the NIS basic auth helper (LP: #1895694) |
236 | + - d/p/0008-Fix-free-nonheap-object-warning-error-on-snmp_core.c.patch: |
237 | + Fix call to free on nonheap-object in snmpCreateOidFromStr |
238 | + * Drop changes: |
239 | + - debian/patches/CVE-2020-25097.patch: Add slash prefix to path- |
240 | + rootless or path-noscheme URLs in src/anyp/Uri.cc. |
241 | + [Included in 4.13-8] |
242 | + - d/usr.sbin.squid: Add section for maas-proxy |
243 | + [maas-proxy is no longer shipped as a deb package] |
244 | + |
245 | + -- Athos Ribeiro <athos.ribeiro@canonical.com> Tue, 18 May 2021 10:51:16 -0300 |
246 | + |
247 | squid (4.13-9) unstable; urgency=medium |
248 | |
249 | * Clarify on NEWS and scripts that we no longer remove logs on purge. |
250 | @@ -156,6 +358,46 @@ squid (4.13-2) unstable; urgency=high |
251 | |
252 | -- Santiago Garcia Mantinan <manty@debian.org> Sun, 07 Feb 2021 01:39:45 +0100 |
253 | |
254 | +squid (4.13-1ubuntu4) hirsute; urgency=medium |
255 | + |
256 | + * d/p/0008-Fix-free-nonheap-object-warning-error-on-snmp_core.c.patch: |
257 | + Fix FTBFS on Hirsute s390x when compiling with GCC 10.2.0. |
258 | + |
259 | + -- Sergio Durigan Junior <sergio.durigan@canonical.com> Mon, 05 Apr 2021 12:00:02 -0400 |
260 | + |
261 | +squid (4.13-1ubuntu3) hirsute; urgency=medium |
262 | + |
263 | + * SECURITY UPDATE: HTTP Request Smuggling issue |
264 | + - debian/patches/CVE-2020-25097.patch: Add slash prefix to path- |
265 | + rootless or path-noscheme URLs in src/anyp/Uri.cc. |
266 | + - CVE-2020-25097 |
267 | + |
268 | + -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Thu, 25 Mar 2021 12:38:06 -0400 |
269 | + |
270 | +squid (4.13-1ubuntu2) groovy; urgency=medium |
271 | + |
272 | + * d/rules, d/NEWS: drop the NIS basic auth helper (LP: #1895694) |
273 | + |
274 | + -- Andreas Hasenack <andreas@canonical.com> Thu, 17 Sep 2020 18:19:42 -0300 |
275 | + |
276 | +squid (4.13-1ubuntu1) groovy; urgency=medium |
277 | + |
278 | + * Merge with Debian unstable. Remaining changes: |
279 | + - d/usr.sbin.squid: Add sections for maas-proxy, squid-deb-proxy |
280 | + squidguard |
281 | + - d/p/90-cf.data.ubuntu.patch: Add an example refresh pattern |
282 | + for debs. |
283 | + - Use snakeoil certificates: |
284 | + + d/control: add ssl-cert to dependencies |
285 | + + d/p/99-ubuntu-ssl-cert-snakeoil.patch: add a note about ssl |
286 | + to the default config file |
287 | + * Dropped changes: |
288 | + - d/p/0007-WCCP-Fix-GCC-10-Wstringop-truncation-failures.patch: |
289 | + Fix GCC-10 build failure due to -Wstringop-truncation warning. |
290 | + [ Accepted upstream. ] |
291 | + |
292 | + -- Sergio Durigan Junior <sergio.durigan@canonical.com> Tue, 25 Aug 2020 15:01:58 -0400 |
293 | + |
294 | squid (4.13-1) unstable; urgency=high |
295 | |
296 | [ Amos Jeffries <amosjeffries@squid-cache.org> ] |
297 | @@ -168,6 +410,43 @@ squid (4.13-1) unstable; urgency=high |
298 | |
299 | -- Luigi Gangitano <luigi@debian.org> Mon, 24 Aug 2020 17:27:54 +0200 |
300 | |
301 | +squid (4.12-1ubuntu1) groovy; urgency=medium |
302 | + |
303 | + * Merge with Debian unstable. Remaining changes: |
304 | + - d/usr.sbin.squid: Add sections for maas-proxy, squid-deb-proxy |
305 | + squidguard |
306 | + - d/p/90-cf.data.ubuntu.patch: Add an example refresh pattern |
307 | + for debs. |
308 | + - Use snakeoil certificates: |
309 | + + d/control: add ssl-cert to dependencies |
310 | + + d/p/99-ubuntu-ssl-cert-snakeoil.patch: add a note about ssl |
311 | + to the default config file |
312 | + * Dropped changes, not needed anymore: |
313 | + - d/rules: Add -Wno-format-truncation to CXXFLAGS as a workaround |
314 | + if building for ppc64el. On that arch, dpkg-buildflags sets -O3 |
315 | + instead of -O2 and that triggers a format-truncation error on |
316 | + pcon.cc. See https://bugs.squid-cache.org/show_bug.cgi?id=4875. |
317 | + [ Dropped because the build now passes on ppc64el ] |
318 | + * Dropped changes, incorporated by Debian: |
319 | + - Don't restart squid by hand on postinst script |
320 | + + d/squid.postinst: When installing/upgrading squid, the service |
321 | + is being restarted manually in the postinst script, which can |
322 | + break installations that have the squid apparmor enabled because |
323 | + it will try to restart the service before reloading the apparmor |
324 | + profile. There is no reason to restart squid manually, since the |
325 | + restart will be automatically performed later. |
326 | + - Drop conffile check for squid < 2.7 |
327 | + + d/squid.postinst: squid 2.7 is long, long gone, so it should be |
328 | + safe to drop the postinst code to make sure that |
329 | + /etc/squid/squid.conf was properly upgraded. |
330 | + - d/tests/test-squid.py: Adjust 'pidfile' variable to reflect fact |
331 | + that we now store the pidfile under '/run/squid/'. |
332 | + * Added changes: |
333 | + - d/p/0007-WCCP-Fix-GCC-10-Wstringop-truncation-failures.patch: |
334 | + Fix GCC-10 build failure due to -Wstringop-truncation warning. |
335 | + |
336 | + -- Sergio Durigan Junior <sergio.durigan@canonical.com> Mon, 10 Aug 2020 11:20:46 -0400 |
337 | + |
338 | squid (4.12-1) unstable; urgency=high |
339 | |
340 | [ Sergio Durigan Junior <sergiodj@debian.org> ] |
341 | @@ -203,6 +482,63 @@ squid (4.12-1) unstable; urgency=high |
342 | |
343 | -- Luigi Gangitano <luigi@debian.org> Wed, 1 Jul 2020 10:52:54 +0200 |
344 | |
345 | +squid (4.11-5ubuntu3) groovy; urgency=medium |
346 | + |
347 | + * No change rebuild against new libnettle8 and libhogweed6 ABI. |
348 | + |
349 | + -- Dimitri John Ledkov <xnox@ubuntu.com> Mon, 29 Jun 2020 22:38:13 +0100 |
350 | + |
351 | +squid (4.11-5ubuntu2) groovy; urgency=medium |
352 | + |
353 | + * d/tests/test-squid.py: Adjust 'pidfile' variable to reflect fact |
354 | + that we now store the pidfile under '/run/squid/'. |
355 | + |
356 | + -- Sergio Durigan Junior <sergio.durigan@canonical.com> Wed, 20 May 2020 10:32:32 -0400 |
357 | + |
358 | +squid (4.11-5ubuntu1) groovy; urgency=medium |
359 | + |
360 | + * Merge with Debian unstable. Remaining changes: |
361 | + - d/usr.sbin.squid: Add sections for maas-proxy, squid-deb-proxy, |
362 | + squidguard |
363 | + - d/p/90-cf.data.ubuntu.patch: Add an example refresh pattern for |
364 | + debs. |
365 | + - Use snakeoil certificates: |
366 | + + d/control: add ssl-cert to dependencies |
367 | + + d/p/99-ubuntu-ssl-cert-snakeoil.patch: add a note about ssl to the |
368 | + default config file |
369 | + - d/rules: Add -Wno-format-truncation to CXXFLAGS as a workaround if |
370 | + building for ppc64el. On that arch, dpkg-buildflags sets -O3 instead |
371 | + of -O2 and that triggers a format-truncation error on pcon.cc. See See |
372 | + https://bugs.squid-cache.org/show_bug.cgi?id=4875 |
373 | + * Dropped: |
374 | + - d/p/drop-sysctl_h.patch: no longer include sysctl.h as it was |
375 | + deprecated in glibc 2.30 (LP #1843325) |
376 | + [ In 4.11-4 ] |
377 | + - SECURITY UPDATE: multiple ESI issues |
378 | + + debian/patches/CVE-2019-12519_12521.patch: convert parse exceptions |
379 | + into 500 status response in src/esi/Context.h, src/esi/Esi.cc, |
380 | + src/esi/Esi.h, src/esi/Expression.cc. |
381 | + + CVE-2019-12519 |
382 | + [ In 4.11-4 ] |
383 | + - SECURITY UPDATE: Digest Authentication nonce replay issue |
384 | + + debian/patches/CVE-2020-11945.patch: fix auth digest refcount integer |
385 | + overflow in src/auth/digest/Config.cc. |
386 | + [ In 4.11-4 ] |
387 | + * Added: |
388 | + - Don't restart squid by hand on postinst script |
389 | + + d/squid.postinst: When installing/upgrading squid, the service |
390 | + is being restarted manually in the postinst script, which can |
391 | + break installations that have the squid apparmor enabled because |
392 | + it will try to restart the service before reloading the apparmor |
393 | + profile. There is no reason to restart squid manually, since the |
394 | + restart will be automatically performed later. |
395 | + - Drop conffile check for squid < 2.7 |
396 | + + d/squid.postinst: squid 2.7 is long, long gone, so it should be |
397 | + safe to drop the postinst code to make sure that |
398 | + /etc/squid/squid.conf was properly upgraded. |
399 | + |
400 | + -- Sergio Durigan Junior <sergio.durigan@canonical.com> Tue, 19 May 2020 14:43:04 -0400 |
401 | + |
402 | squid (4.11-5) unstable; urgency=medium |
403 | |
404 | [ Sergio Durigan Junior <sergiodj@debian.org> ] |
405 | @@ -281,6 +617,64 @@ squid (4.11-1) unstable; urgency=high |
406 | |
407 | -- Luigi Gangitano <luigi@debian.org> Thu, 23 Apr 2020 19:34:54 +0200 |
408 | |
409 | +squid (4.10-1ubuntu2) groovy; urgency=medium |
410 | + |
411 | + * SECURITY UPDATE: multiple ESI issues |
412 | + - debian/patches/CVE-2019-12519_12521.patch: convert parse exceptions |
413 | + into 500 status response in src/esi/Context.h, src/esi/Esi.cc, |
414 | + src/esi/Esi.h, src/esi/Expression.cc. |
415 | + - CVE-2019-12519 |
416 | + - CVE-2019-12521 |
417 | + * SECURITY UPDATE: Digest Authentication nonce replay issue |
418 | + - debian/patches/CVE-2020-11945.patch: fix auth digest refcount integer |
419 | + overflow in src/auth/digest/Config.cc. |
420 | + - CVE-2020-11945 |
421 | + |
422 | + -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Wed, 13 May 2020 09:51:10 -0400 |
423 | + |
424 | +squid (4.10-1ubuntu1) focal; urgency=medium |
425 | + |
426 | + * Merge with Debian unstable. Remaining changes: |
427 | + - d/usr.sbin.squid: Add sections for maas-proxy, squid-deb-proxy, |
428 | + squidguard |
429 | + - d/p/90-cf.data.ubuntu.patch: Add an example refresh pattern for debs. |
430 | + - Use snakeoil certificates: |
431 | + + d/control: add ssl-cert to dependencies |
432 | + + d/p/99-ubuntu-ssl-cert-snakeoil.patch: add a note about ssl |
433 | + to the default config file |
434 | + - d/rules: Add -Wno-format-truncation to CXXFLAGS as a workaround if |
435 | + building for ppc64el. On that arch, dpkg-buildflags sets -O3 instead of |
436 | + -O2 and that triggers a format-truncation error on pcon.cc. See |
437 | + See https://bugs.squid-cache.org/show_bug.cgi?id=4875 |
438 | + - d/p/drop-sysctl_h.patch: no longer include sysctl.h as it was |
439 | + deprecated in glibc 2.30 (LP #1843325) |
440 | + * Dropped: |
441 | + - d/t/control, d/t/test-squid.py: remove gopher tests, as pygopherd is |
442 | + no longer available in Focal (LP: #1858827) |
443 | + [In 4.10-1, undocumented] |
444 | + - d/t/test-squid.py, d/t/squid: switch to python3 |
445 | + [In 4.10-1, undocumented] |
446 | + - d/t/control: depend on python3-minimal |
447 | + [In 4.10-1, undocumented] |
448 | + - SECURITY UPDATE: info disclosure via FTP server |
449 | + + debian/patches/CVE-2019-12528.patch: fix FTP buffers handling in |
450 | + src/clients/FtpGateway.cc. |
451 | + + CVE-2019-12528 |
452 | + [Fixed upstream] |
453 | + - SECURITY UPDATE: incorrect input validation and buffer management |
454 | + + debian/patches/CVE-2020-84xx.patch: fix request URL generation in |
455 | + reverse proxy configurations in src/client_side.cc. |
456 | + + CVE-2020-8449 |
457 | + + CVE-2020-8450 |
458 | + [Fixed upstream] |
459 | + - SECURITY UPDATE: DoS in NTLM authentication |
460 | + + debian/patches/CVE-2020-8517.patch: improved username handling in |
461 | + src/acl/external/LM_group/ext_lm_group_acl.cc. |
462 | + + CVE-2020-8517 |
463 | + [Fixed upstream] |
464 | + |
465 | + -- Andreas Hasenack <andreas@canonical.com> Tue, 25 Feb 2020 15:37:55 -0300 |
466 | + |
467 | squid (4.10-1) unstable; urgency=high |
468 | |
469 | [ Amos Jeffries <amosjeffries@squid-cache.org> ] |
470 | @@ -302,6 +696,70 @@ squid (4.10-1) unstable; urgency=high |
471 | |
472 | -- Luigi Gangitano <luigi@debian.org> Tue, 10 Feb 2020 14:12:54 +0100 |
473 | |
474 | +squid (4.9-2ubuntu4) focal; urgency=medium |
475 | + |
476 | + * SECURITY UPDATE: info disclosure via FTP server |
477 | + - debian/patches/CVE-2019-12528.patch: fix FTP buffers handling in |
478 | + src/clients/FtpGateway.cc. |
479 | + - CVE-2019-12528 |
480 | + * SECURITY UPDATE: incorrect input validation and buffer management |
481 | + - debian/patches/CVE-2020-84xx.patch: fix request URL generation in |
482 | + reverse proxy configurations in src/client_side.cc. |
483 | + - CVE-2020-8449 |
484 | + - CVE-2020-8450 |
485 | + * SECURITY UPDATE: DoS in NTLM authentication |
486 | + - debian/patches/CVE-2020-8517.patch: improved username handling in |
487 | + src/acl/external/LM_group/ext_lm_group_acl.cc. |
488 | + - CVE-2020-8517 |
489 | + |
490 | + -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Wed, 19 Feb 2020 12:43:05 -0500 |
491 | + |
492 | +squid (4.9-2ubuntu3) focal; urgency=medium |
493 | + |
494 | + * No-change rebuild with fixed binutils on arm64. |
495 | + |
496 | + -- Matthias Klose <doko@ubuntu.com> Sat, 08 Feb 2020 11:20:19 +0000 |
497 | + |
498 | +squid (4.9-2ubuntu2) focal; urgency=medium |
499 | + |
500 | + * d/t/control, d/t/test-squid.py: remove gopher tests, as pygopherd is |
501 | + no longer available in Focal (LP: #1858827) |
502 | + * d/t/test-squid.py, d/t/squid: switch to python3 |
503 | + * d/t/control: depend on python3-minimal |
504 | + |
505 | + -- Andreas Hasenack <andreas@canonical.com> Wed, 08 Jan 2020 15:52:32 -0300 |
506 | + |
507 | +squid (4.9-2ubuntu1) focal; urgency=medium |
508 | + |
509 | + * Merge with Debian unstable. Remaining changes: |
510 | + - Use snakeoil certificates. |
511 | + - Add an example refresh pattern for debs. |
512 | + - d/usr.sbin.squid: Add sections for maas-proxy, squid-deb-proxy, |
513 | + squidguard |
514 | + - d/rules: Add -Wno-format-truncation to CXXFLAGS as a workaround if |
515 | + building for ppc64el. On that arch, dpkg-buildflags sets -O3 instead of |
516 | + -O2 and that triggers a format-truncation error on pcon.cc. See |
517 | + See https://bugs.squid-cache.org/show_bug.cgi?id=4875 |
518 | + - d/p/drop-sysctl_h.patch: no longer include sysctl.h as it was |
519 | + deprecated in glibc 2.30 (LP #1843325) |
520 | + * Dropped: |
521 | + - d/rules: Only use -latomic with the intended architectures, instead of |
522 | + all of them. This matches what was suggested in |
523 | + https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907106#5 |
524 | + [Fixed upstream] |
525 | + - d/NEWS.debian: rename d/NEWS.debian to d/NEWS so that |
526 | + dh_installchangelogs can pick it up. dh_installchangelogs handles |
527 | + d/NEWS or d/<package>.NEWS, but not NEWS.debian. |
528 | + [Fixed upstream] |
529 | + - debian/patches/more-gcc-9-fixes.patch: switch to xstrncpy in |
530 | + lib/smblib/smblib-util.c. (LP #1835831) |
531 | + [Fixed upstream] |
532 | + - d/t/test-squid.py: test_zz_apparmor(): bail early if securityfs isn't |
533 | + mounted |
534 | + [Fixed upstream] |
535 | + |
536 | + -- Lucas Kanashiro <lucas.kanashiro@canonical.com> Thu, 14 Nov 2019 16:33:10 -0300 |
537 | + |
538 | squid (4.9-2) unstable; urgency=medium |
539 | |
540 | [ Andreas Hasenack <andreas@canonical.com> ] |
541 | @@ -358,6 +816,73 @@ squid (4.9-1) unstable; urgency=high |
542 | |
543 | -- Luigi Gangitano <luigi@debian.org> Sun, 10 Nov 2019 20:28:15 +0100 |
544 | |
545 | +squid (4.8-1ubuntu3) focal; urgency=medium |
546 | + |
547 | + * No-change rebuild against libnettle7 |
548 | + |
549 | + -- Steve Langasek <steve.langasek@ubuntu.com> Thu, 31 Oct 2019 22:15:39 +0000 |
550 | + |
551 | +squid (4.8-1ubuntu2) eoan; urgency=medium |
552 | + |
553 | + * d/p/drop-sysctl_h.patch: no longer include sysctl.h as it was |
554 | + deprecated in glibc 2.30 (LP: #1843325) |
555 | + |
556 | + -- Andreas Hasenack <andreas@canonical.com> Mon, 09 Sep 2019 17:31:45 -0300 |
557 | + |
558 | +squid (4.8-1ubuntu1) eoan; urgency=medium |
559 | + |
560 | + * Merge with Debian unstable. Remaining changes: |
561 | + - Use snakeoil certificates. |
562 | + - Add an example refresh pattern for debs. |
563 | + - d/usr.sbin.squid: Add sections for maas-proxy, squid-deb-proxy, |
564 | + squidguard |
565 | + - d/rules: Add -Wno-format-truncation to CXXFLAGS as a workaround if |
566 | + building for ppc64el. On that arch, dpkg-buildflags sets -O3 instead of |
567 | + -O2 and that triggers a format-truncation error on pcon.cc. See |
568 | + See https://bugs.squid-cache.org/show_bug.cgi?id=4875 |
569 | + - d/rules: Only use -latomic with the intended architectures, instead of |
570 | + all of them. This matches what was suggested in |
571 | + https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907106#5 |
572 | + - d/NEWS.debian: rename d/NEWS.debian to d/NEWS so that |
573 | + dh_installchangelogs can pick it up. dh_installchangelogs handles |
574 | + d/NEWS or d/<package>.NEWS, but not NEWS.debian. |
575 | + - debian/patches/more-gcc-9-fixes.patch: switch to xstrncpy in |
576 | + lib/smblib/smblib-util.c. (LP #1835831) |
577 | + * Dropped: |
578 | + - d/p/fix-rotate-assertion.patch: Fix assertion error when rotating logs. |
579 | + Thanks to Vitaly Lavrov <vel21ripn@gmail.com>. (LP #1794553) |
580 | + [Fixed upstream] |
581 | + - debian/patches/413.patch: Fix gcc-9 build issues with upstream merged |
582 | + patch |
583 | + [Fixed upstream] |
584 | + - SECURITY UPDATE: incorrect digest auth parameter parsing |
585 | + + debian/patches/CVE-2019-12525.patch: check length in |
586 | + src/auth/digest/Config.cc. |
587 | + + CVE-2019-12525 |
588 | + [Fixed upstream] |
589 | + - SECURITY UPDATE: buffer overflow in basic auth decoding |
590 | + + debian/patches/CVE-2019-12527.patch: switch to SBuf in |
591 | + src/HttpHeader.cc, src/HttpHeader.h, src/cache_manager.cc, |
592 | + src/clients/FtpGateway.cc. |
593 | + + CVE-2019-12527 |
594 | + [Fixed upstream] |
595 | + - SECURITY UPDATE: basic auth uudecode length issue |
596 | + + debian/patches/CVE-2019-12529.patch: replace uudecode with libnettle |
597 | + base64 decoder in lib/Makefile.*, src/auth/basic/Config.cc, |
598 | + include/uudecode.h, lib/uudecode.c. |
599 | + + CVE-2019-12529 |
600 | + [Fixed upstream] |
601 | + - SECURITY UPDATE: XSS issues in cachemgr.cgi |
602 | + + debian/patches/CVE-2019-13345.patch: properly escape values in |
603 | + tools/cachemgr.cc. |
604 | + + CVE-2019-13345 |
605 | + [Fixed upstream] |
606 | + * Added: |
607 | + - d/t/test-squid.py: test_zz_apparmor(): bail early if securityfs isn't |
608 | + mounted |
609 | + |
610 | + -- Andreas Hasenack <andreas@canonical.com> Wed, 24 Jul 2019 16:38:59 -0300 |
611 | + |
612 | squid (4.8-1) unstable; urgency=high |
613 | |
614 | [ Amos Jeffries <amosjeffries@squid-cache.org> ] |
615 | @@ -376,6 +901,86 @@ squid (4.8-1) unstable; urgency=high |
616 | |
617 | -- Luigi Gangitano <luigi@debian.org> Thu, 18 Jul 2019 22:28:15 +0200 |
618 | |
619 | +squid (4.6-2ubuntu4) eoan; urgency=medium |
620 | + |
621 | + * Fix gcc-9 issues (LP: #1835831) |
622 | + - Remove -Wno-sizeof-pointer-memaccess -Wno-stringop-truncation |
623 | + - debian/patches/more-gcc-9-fixes.patch: switch to xstrncpy in |
624 | + lib/smblib/smblib-util.c. |
625 | + * SECURITY UPDATE: incorrect digest auth parameter parsing |
626 | + - debian/patches/CVE-2019-12525.patch: check length in |
627 | + src/auth/digest/Config.cc. |
628 | + - CVE-2019-12525 |
629 | + * SECURITY UPDATE: buffer overflow in basic auth decoding |
630 | + - debian/patches/CVE-2019-12527.patch: switch to SBuf in |
631 | + src/HttpHeader.cc, src/HttpHeader.h, src/cache_manager.cc, |
632 | + src/clients/FtpGateway.cc. |
633 | + - CVE-2019-12527 |
634 | + * SECURITY UPDATE: basic auth uudecode length issue |
635 | + - debian/patches/CVE-2019-12529.patch: replace uudecode with libnettle |
636 | + base64 decoder in lib/Makefile.*, src/auth/basic/Config.cc, |
637 | + include/uudecode.h, lib/uudecode.c. |
638 | + - CVE-2019-12529 |
639 | + * SECURITY UPDATE: XSS issues in cachemgr.cgi |
640 | + - debian/patches/CVE-2019-13345.patch: properly escape values in |
641 | + tools/cachemgr.cc. |
642 | + - CVE-2019-13345 |
643 | + |
644 | + -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Fri, 19 Jul 2019 08:01:58 -0400 |
645 | + |
646 | +squid (4.6-2ubuntu3) eoan; urgency=medium |
647 | + |
648 | + * Override newly added gcc-9 flags: |
649 | + -Wno-sizeof-pointer-memaccess -Wno-stringop-truncation |
650 | + NOTE: Overriding those flags is a possible security |
651 | + asked for info on the gcc-9 issue bug tracker: |
652 | + https://github.com/squid-cache/squid/pull/413#issuecomment-511314076 |
653 | + |
654 | + -- Gianfranco Costamagna <locutusofborg@debian.org> Mon, 15 Jul 2019 10:21:47 +0200 |
655 | + |
656 | +squid (4.6-2ubuntu2) eoan; urgency=medium |
657 | + |
658 | + * Fix gcc-9 build issues with upstream merged patch |
659 | + |
660 | + -- Gianfranco Costamagna <locutusofborg@debian.org> Sun, 14 Jul 2019 14:41:16 +0200 |
661 | + |
662 | +squid (4.6-2ubuntu1) eoan; urgency=medium |
663 | + |
664 | + * Merge with Debian unstable. Remaining changes: |
665 | + - Use snakeoil certificates. |
666 | + - Add an example refresh pattern for debs. |
667 | + - d/usr.sbin.squid: Add sections for maas-proxy, squid-deb-proxy, |
668 | + squidguard |
669 | + - d/rules: Add -Wno-format-truncation to CXXFLAGS as a workaround if |
670 | + building for ppc64el. On that arch, dpkg-buildflags sets -O3 instead of |
671 | + -O2 and that triggers a format-truncation error on pcon.cc. See |
672 | + See https://bugs.squid-cache.org/show_bug.cgi?id=4875 |
673 | + - d/p/fix-rotate-assertion.patch: Fix assertion error when rotating logs. |
674 | + Thanks to Vitaly Lavrov <vel21ripn@gmail.com>. (LP #1794553) |
675 | + [Added Applied-Upstream header] |
676 | + - d/rules: Only use -latomic with the intended architectures, instead of |
677 | + all of them. This matches what was suggested in |
678 | + https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907106#5 |
679 | + - d/NEWS.debian: rename d/NEWS.debian to d/NEWS so that |
680 | + dh_installchangelogs can pick it up. dh_installchangelogs handles |
681 | + d/NEWS or d/<package>.NEWS, but not NEWS.debian. |
682 | + * Dropped: |
683 | + - d/squid.tmpfile: add tmpfiles configuration to handle /var/run/squid |
684 | + at boot. Thanks to Luigi Gangitano <luigi@debian.org> (LP #1816006) |
685 | + [Fixed in 4.5-2] |
686 | + - d/p/fix-uninitialized-var.patch: Workaround gcc's maybe-unitialized |
687 | + error in parse_time_t, triggered on ppc64el due to the build using -O3 |
688 | + in that architecture. |
689 | + [Fixed upstream] |
690 | + - Add disabled by default AppArmor profile. |
691 | + [Added by Debian in 4.6-2] |
692 | + - d/usr.sbin.squid: fix the apparmor profile (LP #1796189): |
693 | + + allow net_admin capability |
694 | + + add attach_disconnected flag |
695 | + [Fixed in 4.6-2] |
696 | + |
697 | + -- Andreas Hasenack <andreas@canonical.com> Sat, 18 May 2019 14:39:09 -0300 |
698 | + |
699 | squid (4.6-2) unstable; urgency=high |
700 | |
701 | [ Andreas Hasenack <andreas@canonical.com> ] |
702 | @@ -436,6 +1041,57 @@ squid (4.5-1) unstable; urgency=medium |
703 | |
704 | -- Luigi Gangitano <luigi@debian.org> Wed, 20 Feb 2019 11:57:15 +0100 |
705 | |
706 | +squid (4.4-1ubuntu2) disco; urgency=medium |
707 | + |
708 | + * d/squid.tmpfile: add tmpfiles configuration to handle /var/run/squid |
709 | + at boot. Thanks to Luigi Gangitano <luigi@debian.org> (LP: #1816006) |
710 | + |
711 | + -- Andreas Hasenack <andreas@canonical.com> Wed, 27 Feb 2019 08:54:45 -0300 |
712 | + |
713 | +squid (4.4-1ubuntu1) disco; urgency=medium |
714 | + |
715 | + * Merge with Debian unstable. Remaining changes: |
716 | + - Use snakeoil certificates. |
717 | + - Add an example refresh pattern for debs. |
718 | + - Add disabled by default AppArmor profile. |
719 | + - d/p/fix-uninitialized-var.patch: Workaround gcc's maybe-unitialized |
720 | + error in parse_time_t, triggered on ppc64el due to the build using -O3 |
721 | + in that architecture. |
722 | + - d/rules: Add -Wno-format-truncation to CXXFLAGS as a workaround if |
723 | + building for ppc64el. On that arch, dpkg-buildflags sets -O3 instead of |
724 | + -O2 and that triggers a format-truncation error on pcon.cc. See |
725 | + See https://bugs.squid-cache.org/show_bug.cgi?id=4875 |
726 | + - d/p/fix-rotate-assertion.patch: Fix assertion error when rotating logs. |
727 | + Thanks to Vitaly Lavrov <vel21ripn@gmail.com>. (LP #1794553) |
728 | + * Drop: |
729 | + - d/rules: enable cdbs parallel build |
730 | + [Fixed in 4.2-1] |
731 | + - d/t/test-squid.py: fix apparmor profile filename |
732 | + [Fixed in 4.2-1] |
733 | + - d/t/test-squid.py: fix the process name. The PID points at the parent. |
734 | + [Fixed in 4.2-1] |
735 | + - d/t/upstream-test-suite: also make libmem.la, needed by the tests. |
736 | + [Fixed in 4.2-1] |
737 | + - d/t/0003-installed-binary-for-debian-ci.patch: use the squid |
738 | + binary from the system, instead of the one from the source tree. |
739 | + [Fixed in 4.2-1] |
740 | + - d/t/upstream-test-suite: drop the sed line, since patch |
741 | + 0003-installed-binary-for-debian-ci.patch is doing this work now. |
742 | + (https://salsa.debian.org/squid-team/squid/commit/ad4372b444ba8b1587839) |
743 | + [Fixed in 4.2-1] |
744 | + * Added changes: |
745 | + - d/rules: Only use -latomic with the intended architectures, instead of |
746 | + all of them. This matches what was suggested in |
747 | + https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907106#5 |
748 | + - d/NEWS.debian: rename d/NEWS.debian to d/NEWS so that |
749 | + dh_installchangelogs can pick it up. dh_installchangelogs handles |
750 | + d/NEWS or d/<package>.NEWS, but not NEWS.debian. |
751 | + - d/usr.sbin.squid: fix the apparmor profile (LP: #1796189): |
752 | + + allow net_admin capability |
753 | + + add attach_disconnected flag |
754 | + |
755 | + -- Andreas Hasenack <andreas@canonical.com> Mon, 19 Nov 2018 10:51:18 -0200 |
756 | + |
757 | squid (4.4-1) unstable; urgency=high |
758 | |
759 | * Urgency high due to security fixes |
760 | @@ -500,6 +1156,85 @@ squid (4.2-1) unstable; urgency=high |
761 | |
762 | -- Luigi Gangitano <luigi@debian.org> Wed, 22 Aug 2018 13:57:15 +0200 |
763 | |
764 | +squid (4.1-1ubuntu3) cosmic; urgency=medium |
765 | + |
766 | + * d/p/fix-rotate-assertion.patch: Fix assertion error when rotating logs. |
767 | + Thanks to Vitaly Lavrov <vel21ripn@gmail.com>. (LP: #1794553) |
768 | + |
769 | + -- Andreas Hasenack <andreas@canonical.com> Tue, 09 Oct 2018 14:00:36 -0300 |
770 | + |
771 | +squid (4.1-1ubuntu2) cosmic; urgency=medium |
772 | + |
773 | + * d/usr.sbin.squid: Update apparmor profile to grant read access to squid |
774 | + binary (LP: #1792728) |
775 | + |
776 | + -- Simon Deziel <simon@sdeziel.info> Sat, 15 Sep 2018 13:55:32 -0400 |
777 | + |
778 | +squid (4.1-1ubuntu1) cosmic; urgency=medium |
779 | + |
780 | + * Merged with Debian unstable (LP: #1780944, LP: #1097032, LP: #16669). |
781 | + Remaining changes: |
782 | + - Use snakeoil certificates. |
783 | + [Updated to use the correct config setting names] |
784 | + - Add an example refresh pattern for debs. |
785 | + [Improved the refresh patterns based on the configuration from |
786 | + squid-deb-proxy package] |
787 | + - Add disabled by default AppArmor profile. |
788 | + [Updated to include the ssl_certs abstraction and suggestions on how to |
789 | + deal with the snakeoil private key and other keys in /etc/ssl.] |
790 | + * Dropped changes: |
791 | + - Add additional dep8 tests. |
792 | + [Adopted in 4.0.21-1~exp5, albeit a stripped down version] |
793 | + - Correct attribution and add explanatory note in d/NEWS.debian. |
794 | + [That particular upgrade path has happened long ago.] |
795 | + - Drop wrong short-circuiting of various invocations; we always want to |
796 | + call the debhelper block. |
797 | + [This was for the transitional squid3 package, and that transition has |
798 | + already happened.] |
799 | + - Revert "Set pidfile for systemd's sysv-generator" from Debian. |
800 | + [Not needed anymore since we have a native systemd service file |
801 | + and no longer rely on the generator.] |
802 | + - Enable autoreconf. This is no longer required for the security updates, |
803 | + but is needed for the seddery of test-suite/Makefile.am in |
804 | + d/t/upstream-test-suite. |
805 | + [Replaced by patch 0003-installed-binary-for-debian-ci.patch] |
806 | + - Adjust seddery for upstream test squid binary location. |
807 | + [sed no longer necessary since patch, |
808 | + 0003-installed-binary-for-debian-ci.patch, will be dropped |
809 | + entirely.] |
810 | + - Drop Conflicts/Replaces of squid against squid3. In Ubuntu, the migration |
811 | + happened in Xenial, so no upgrade path still requires this code. This |
812 | + reduces upgrade ordering difficulty. |
813 | + [Again we have a migration, but this time from squid3 to squid, so we |
814 | + need this]. |
815 | + - GCC7 FTBFS fixes (LP: #1712668): |
816 | + + d/rules: don't error when hitting the "deprecated" and |
817 | + "format-truncation" gcc7 warnings. Upstream 3.5.27 has fixes for these, |
818 | + but one in Format.cc that affects 32bit builds was deemed too intrusive |
819 | + for the 3.5 stable series and is only in squid 4.x |
820 | + [No longer needed with squid 4.x] |
821 | + - Do not force gcc-6 |
822 | + [It was a temporary workaround in Debian that got dropped] |
823 | + * Added changes: |
824 | + - d/rules: enable cdbs parallel build |
825 | + - d/t/test-squid.py: fix apparmor profile filename |
826 | + - d/t/test-squid.py: fix the process name. The PID points at the parent. |
827 | + - d/t/upstream-test-suite: also make libmem.la, needed by the tests. |
828 | + - d/t/0003-installed-binary-for-debian-ci.patch: use the squid |
829 | + binary from the system, instead of the one from the source tree. |
830 | + - d/p/fix-uninitialized-var.patch: Workaround gcc's maybe-unitialized |
831 | + error in parse_time_t, triggered on ppc64el due to the build using -O3 |
832 | + in that architecture. |
833 | + - d/rules: Add -Wno-format-truncation to CXXFLAGS as a workaround if |
834 | + building for ppc64el. On that arch, dpkg-buildflags sets -O3 instead of |
835 | + -O2 and that triggers a format-truncation error on pcon.cc. See |
836 | + See https://bugs.squid-cache.org/show_bug.cgi?id=4875 |
837 | + - d/t/upstream-test-suite: drop the sed line, since patch |
838 | + 0003-installed-binary-for-debian-ci.patch is doing this work now. |
839 | + (https://salsa.debian.org/squid-team/squid/commit/ad4372b444ba8b1587839) |
840 | + |
841 | + -- Andreas Hasenack <andreas@canonical.com> Thu, 16 Aug 2018 12:33:17 -0300 |
842 | + |
843 | squid (4.1-1) unstable; urgency=high |
844 | |
845 | * New Upstream Release (Closes: #896120) |
846 | diff --git a/debian/control b/debian/control |
847 | index 629cbbe..a5305c0 100644 |
848 | --- a/debian/control |
849 | +++ b/debian/control |
850 | @@ -1,7 +1,8 @@ |
851 | Source: squid |
852 | Section: web |
853 | Priority: optional |
854 | -Maintainer: Luigi Gangitano <luigi@debian.org> |
855 | +Maintainer: Ubuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com> |
856 | +XSBC-Original-Maintainer: Luigi Gangitano <luigi@debian.org> |
857 | Uploaders: Santiago Garcia Mantinan <manty@debian.org> |
858 | Homepage: http://www.squid-cache.org |
859 | Standards-Version: 4.6.0 |
860 | @@ -32,7 +33,7 @@ Build-Depends: ed, libltdl-dev, pkg-config |
861 | Package: squid |
862 | Architecture: any |
863 | Pre-Depends: ${misc:Pre-Depends}, adduser |
864 | -Depends: ${shlibs:Depends}, ${misc:Depends}, netbase, logrotate (>= 3.5.4-1), squid-common (>= ${source:Version}), lsb-base, libdbi-perl |
865 | +Depends: ${shlibs:Depends}, ${misc:Depends}, netbase, logrotate (>= 3.5.4-1), squid-common (>= ${source:Version}), lsb-base, libdbi-perl, ssl-cert |
866 | Suggests: squidclient, squid-cgi, squid-purge, resolvconf (>= 0.40), smbclient, ufw, winbind, apparmor |
867 | Recommends: libcap2-bin [linux-any], ca-certificates |
868 | Conflicts: squid-openssl |
869 | diff --git a/debian/patches/0009-Fix-Werror-alloc-size-larger-than-on-GCC-12.patch b/debian/patches/0009-Fix-Werror-alloc-size-larger-than-on-GCC-12.patch |
870 | new file mode 100644 |
871 | index 0000000..df677d8 |
872 | --- /dev/null |
873 | +++ b/debian/patches/0009-Fix-Werror-alloc-size-larger-than-on-GCC-12.patch |
874 | @@ -0,0 +1,65 @@ |
875 | +From: Sergio Durigan Junior <sergio.durigan@canonical.com> |
876 | +Date: Tue, 9 Aug 2022 17:49:23 -0400 |
877 | +Subject: Fix -Werror=alloc-size-larger-than on GCC 12 |
878 | + |
879 | +Author: Sergio Durigan Junior <sergiodj@ubuntu.com> |
880 | +Forwarded: yes, https://github.com/squid-cache/squid/pull/1118 |
881 | +--- |
882 | + src/SquidConfig.h | 2 +- |
883 | + src/pconn.cc | 2 +- |
884 | + src/pconn.h | 2 +- |
885 | + src/store/Disks.cc | 2 +- |
886 | + 4 files changed, 4 insertions(+), 4 deletions(-) |
887 | + |
888 | +diff --git a/src/SquidConfig.h b/src/SquidConfig.h |
889 | +index feabdf1..6b3cca5 100644 |
890 | +--- a/src/SquidConfig.h |
891 | ++++ b/src/SquidConfig.h |
892 | +@@ -61,7 +61,7 @@ public: |
893 | + ~DiskConfig() { delete[] swapDirs; } |
894 | + |
895 | + RefCount<SwapDir> *swapDirs = nullptr; |
896 | +- int n_allocated = 0; |
897 | ++ unsigned int n_allocated = 0; |
898 | + int n_configured = 0; |
899 | + /// number of disk processes required to support all cache_dirs |
900 | + int n_strands = 0; |
901 | +diff --git a/src/pconn.cc b/src/pconn.cc |
902 | +index 62e5411..d30726d 100644 |
903 | +--- a/src/pconn.cc |
904 | ++++ b/src/pconn.cc |
905 | +@@ -167,7 +167,7 @@ IdleConnList::clearHandlers(const Comm::ConnectionPointer &conn) |
906 | + void |
907 | + IdleConnList::push(const Comm::ConnectionPointer &conn) |
908 | + { |
909 | +- if (size_ == capacity_) { |
910 | ++ if ((unsigned int) size_ == capacity_) { |
911 | + debugs(48, 3, HERE << "growing idle Connection array"); |
912 | + capacity_ <<= 1; |
913 | + const Comm::ConnectionPointer *oldList = theList_; |
914 | +diff --git a/src/pconn.h b/src/pconn.h |
915 | +index 85e44e5..b8f07d9 100644 |
916 | +--- a/src/pconn.h |
917 | ++++ b/src/pconn.h |
918 | +@@ -80,7 +80,7 @@ private: |
919 | + Comm::ConnectionPointer *theList_; |
920 | + |
921 | + /// Number of entries theList can currently hold without re-allocating (capacity). |
922 | +- int capacity_; |
923 | ++ unsigned int capacity_; |
924 | + ///< Number of in-use entries in theList |
925 | + int size_; |
926 | + |
927 | +diff --git a/src/store/Disks.cc b/src/store/Disks.cc |
928 | +index 4e8710a..f9c3171 100644 |
929 | +--- a/src/store/Disks.cc |
930 | ++++ b/src/store/Disks.cc |
931 | +@@ -685,7 +685,7 @@ allocate_new_swapdir(Store::DiskConfig *swap) |
932 | + swap->swapDirs = new SwapDir::Pointer[swap->n_allocated]; |
933 | + } |
934 | + |
935 | +- if (swap->n_allocated == swap->n_configured) { |
936 | ++ if (swap->n_allocated == (size_t) swap->n_configured) { |
937 | + swap->n_allocated <<= 1; |
938 | + const auto tmp = new SwapDir::Pointer[swap->n_allocated]; |
939 | + for (int i = 0; i < swap->n_configured; ++i) { |
940 | diff --git a/debian/patches/90-cf.data.ubuntu.patch b/debian/patches/90-cf.data.ubuntu.patch |
941 | new file mode 100644 |
942 | index 0000000..68ef5bc |
943 | --- /dev/null |
944 | +++ b/debian/patches/90-cf.data.ubuntu.patch |
945 | @@ -0,0 +1,22 @@ |
946 | +Description: Add refresh patterns for deb packaging |
947 | + |
948 | +Reviewed-By: Sergio Durigan Junior <sergio.durigan@canonical.com> |
949 | +Last-Updated: 2021-05-11 |
950 | +Forwarded: https://salsa.debian.org/squid-team/squid/-/merge_requests/15 |
951 | + |
952 | +--- a/src/cf.data.pre |
953 | ++++ b/src/cf.data.pre |
954 | +@@ -5859,6 +5862,12 @@ NOCOMMENT_START |
955 | + refresh_pattern ^ftp: 1440 20% 10080 |
956 | + refresh_pattern ^gopher: 1440 0% 1440 |
957 | + refresh_pattern -i (/cgi-bin/|\?) 0 0% 0 |
958 | ++refresh_pattern \/(Packages|Sources)(|\.bz2|\.gz|\.xz)$ 0 0% 0 refresh-ims |
959 | ++refresh_pattern \/Release(|\.gpg)$ 0 0% 0 refresh-ims |
960 | ++refresh_pattern \/InRelease$ 0 0% 0 refresh-ims |
961 | ++refresh_pattern \/(Translation-.*)(|\.bz2|\.gz|\.xz)$ 0 0% 0 refresh-ims |
962 | ++# example pattern for deb packages |
963 | ++#refresh_pattern (\.deb|\.udeb)$ 129600 100% 129600 |
964 | + refresh_pattern . 0 20% 4320 |
965 | + NOCOMMENT_END |
966 | + DOC_END |
967 | + |
968 | diff --git a/debian/patches/99-ubuntu-ssl-cert-snakeoil.patch b/debian/patches/99-ubuntu-ssl-cert-snakeoil.patch |
969 | new file mode 100644 |
970 | index 0000000..adfc2ee |
971 | --- /dev/null |
972 | +++ b/debian/patches/99-ubuntu-ssl-cert-snakeoil.patch |
973 | @@ -0,0 +1,24 @@ |
974 | +Index: squid/src/cf.data.pre |
975 | +=================================================================== |
976 | +--- squid.orig/src/cf.data.pre 2022-07-18 07:49:02.052257318 -0400 |
977 | ++++ squid/src/cf.data.pre 2022-07-18 07:51:17.843207049 -0400 |
978 | +@@ -3742,6 +3742,19 @@ |
979 | + A client X.509 certificate to use when connecting to |
980 | + this peer. |
981 | + |
982 | ++ Notes: |
983 | ++ |
984 | ++ On Debian/Ubuntu systems a default snakeoil certificate is |
985 | ++ available in /etc/ssl and users can set: |
986 | ++ |
987 | ++ sslcert=/etc/ssl/certs/ssl-cert-snakeoil.pem |
988 | ++ |
989 | ++ and |
990 | ++ |
991 | ++ sslkey=/etc/ssl/private/ssl-cert-snakeoil.key |
992 | ++ |
993 | ++ for testing. |
994 | ++ |
995 | + sslkey=/path/to/ssl/key |
996 | + The private key corresponding to sslcert above. |
997 | + |
998 | diff --git a/debian/patches/fix-max-pkt-sz-for-icmpEchoData-padding.patch b/debian/patches/fix-max-pkt-sz-for-icmpEchoData-padding.patch |
999 | new file mode 100644 |
1000 | index 0000000..0480de4 |
1001 | --- /dev/null |
1002 | +++ b/debian/patches/fix-max-pkt-sz-for-icmpEchoData-padding.patch |
1003 | @@ -0,0 +1,89 @@ |
1004 | +From 78708065e8aa4f882848befe8fa04bf1a04f1c9b Mon Sep 17 00:00:00 2001 |
1005 | +From: Sergio Durigan Junior <sergiodj@sergiodj.net> |
1006 | +Date: Thu, 19 Aug 2021 18:56:50 -0400 |
1007 | +Subject: [PATCH 1/3] Fix MAX_PKT{4,6}_SZ to account for icmpEchoData padding |
1008 | + |
1009 | +The bug was exposed by GCC v11 on Ubuntu Impish: |
1010 | + |
1011 | +Icmp4.cc:116:11: error: array subscript icmpEchoData[0] is partly |
1012 | + outside array bounds of char[282] [-Werror=array-bounds] |
1013 | + echo->opcode = (unsigned char) opcode; |
1014 | + |
1015 | +The array the compiler is talking about is the pkt buffer. That buffer |
1016 | +size (i.e. MAX_PKT4_SZ) was calculated under the faulty assumption that |
1017 | +a compiler cannot add padding after icmphdr (when doing "icmp+1") and/or |
1018 | +between icmpEchoData data members. When compiler padded, the old |
1019 | +MAX_PKT4_SZ math stopped working. |
1020 | + |
1021 | +Same for ICMPv6. |
1022 | + |
1023 | +Signed-off-by: Sergio Durigan Junior <sergiodj@sergiodj.net> |
1024 | + |
1025 | +Author: Sergio Durigan Junior <sergiodj@sergiodj.net> |
1026 | +Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/squid/+bug/1939352 |
1027 | +Forwarded: yes, https://github.com/squid-cache/squid/pull/887 |
1028 | +--- |
1029 | + src/icmp/Icmp.h | 4 ++-- |
1030 | + src/icmp/Icmp4.cc | 4 +++- |
1031 | + src/icmp/Icmp6.cc | 4 +++- |
1032 | + 3 files changed, 8 insertions(+), 4 deletions(-) |
1033 | + |
1034 | +diff --git a/src/icmp/Icmp.h b/src/icmp/Icmp.h |
1035 | +index c9cada3..b8cdf77 100644 |
1036 | +--- a/src/icmp/Icmp.h |
1037 | ++++ b/src/icmp/Icmp.h |
1038 | +@@ -16,8 +16,8 @@ |
1039 | + #define PINGER_PAYLOAD_SZ 8192 |
1040 | + |
1041 | + #define MAX_PAYLOAD 256 // WAS: SQUIDHOSTNAMELEN |
1042 | +-#define MAX_PKT4_SZ (MAX_PAYLOAD + sizeof(struct timeval) + sizeof (char) + sizeof(struct icmphdr) + 1) |
1043 | +-#define MAX_PKT6_SZ (MAX_PAYLOAD + sizeof(struct timeval) + sizeof (char) + sizeof(struct icmp6_hdr) + 1) |
1044 | ++#define MAX_PKT4_SZ (sizeof(struct icmpEchoData) + sizeof(struct icmphdr) + 1) |
1045 | ++#define MAX_PKT6_SZ (sizeof(struct icmpEchoData) + sizeof(struct icmp6_hdr) + 1) |
1046 | + |
1047 | + #if USE_ICMP |
1048 | + |
1049 | +diff --git a/src/icmp/Icmp4.cc b/src/icmp/Icmp4.cc |
1050 | +index 9500215..687d8d3 100644 |
1051 | +--- a/src/icmp/Icmp4.cc |
1052 | ++++ b/src/icmp/Icmp4.cc |
1053 | +@@ -91,6 +91,8 @@ Icmp4::SendEcho(Ip::Address &to, int opcode, const char *payload, int len) |
1054 | + size_t icmp_pktsize = sizeof(struct icmphdr); |
1055 | + struct addrinfo *S = NULL; |
1056 | + |
1057 | ++ static_assert(sizeof(*icmp) + sizeof(*echo) <= sizeof(pkt), "our custom ICMPv4 Echo payload fits the packet buffer"); |
1058 | ++ |
1059 | + memset(pkt, '\0', MAX_PKT4_SZ); |
1060 | + |
1061 | + icmp = (struct icmphdr *) (void *) pkt; |
1062 | +@@ -112,7 +114,7 @@ Icmp4::SendEcho(Ip::Address &to, int opcode, const char *payload, int len) |
1063 | + ++icmp_pkts_sent; |
1064 | + |
1065 | + // Construct ICMP packet data content |
1066 | +- echo = (icmpEchoData *) (icmp + 1); |
1067 | ++ echo = reinterpret_cast<icmpEchoData *>(reinterpret_cast<char *>(pkt) + sizeof(*icmp)); |
1068 | + echo->opcode = (unsigned char) opcode; |
1069 | + memcpy(&echo->tv, ¤t_time, sizeof(struct timeval)); |
1070 | + |
1071 | +diff --git a/src/icmp/Icmp6.cc b/src/icmp/Icmp6.cc |
1072 | +index 4bbd47a..a6ea79e 100644 |
1073 | +--- a/src/icmp/Icmp6.cc |
1074 | ++++ b/src/icmp/Icmp6.cc |
1075 | +@@ -125,6 +125,8 @@ Icmp6::SendEcho(Ip::Address &to, int opcode, const char *payload, int len) |
1076 | + struct addrinfo *S = NULL; |
1077 | + size_t icmp6_pktsize = 0; |
1078 | + |
1079 | ++ static_assert(sizeof(*icmp) + sizeof(*echo) <= sizeof(pkt), "our custom ICMPv6 Echo payload fits the packet buffer"); |
1080 | ++ |
1081 | + memset(pkt, '\0', MAX_PKT6_SZ); |
1082 | + icmp = (struct icmp6_hdr *)pkt; |
1083 | + |
1084 | +@@ -147,7 +149,7 @@ Icmp6::SendEcho(Ip::Address &to, int opcode, const char *payload, int len) |
1085 | + icmp6_pktsize = sizeof(struct icmp6_hdr); |
1086 | + |
1087 | + // Fill Icmp6 ECHO data content |
1088 | +- echo = (icmpEchoData *) (pkt + sizeof(icmp6_hdr)); |
1089 | ++ echo = reinterpret_cast<icmpEchoData *>(reinterpret_cast<char *>(pkt) + sizeof(*icmp)); |
1090 | + echo->opcode = (unsigned char) opcode; |
1091 | + memcpy(&echo->tv, ¤t_time, sizeof(struct timeval)); |
1092 | + |
1093 | diff --git a/debian/patches/series b/debian/patches/series |
1094 | index 5438215..95d949e 100644 |
1095 | --- a/debian/patches/series |
1096 | +++ b/debian/patches/series |
1097 | @@ -3,3 +3,7 @@ |
1098 | 0003-installed-binary-for-debian-ci.patch |
1099 | 0005-Use-RuntimeDirectory-to-create-run-squid.patch |
1100 | 0006-Fix-build-against-OpenSSL-3-0.patch |
1101 | +90-cf.data.ubuntu.patch |
1102 | +99-ubuntu-ssl-cert-snakeoil.patch |
1103 | +fix-max-pkt-sz-for-icmpEchoData-padding.patch |
1104 | +0009-Fix-Werror-alloc-size-larger-than-on-GCC-12.patch |
1105 | diff --git a/debian/usr.sbin.squid b/debian/usr.sbin.squid |
1106 | index d01bcd0..a34487a 100644 |
1107 | --- a/debian/usr.sbin.squid |
1108 | +++ b/debian/usr.sbin.squid |
1109 | @@ -51,6 +51,33 @@ |
1110 | # squid-langpack |
1111 | /usr/share/squid-langpack/** r, |
1112 | |
1113 | + # squid-deb-proxy |
1114 | + /etc/squid-deb-proxy/** r, |
1115 | + /{,var/}run/squid-deb-proxy.pid rwk, |
1116 | + /var/cache/squid-deb-proxy/ r, |
1117 | + /var/cache/squid-deb-proxy/** rwk, |
1118 | + /var/log/squid-deb-proxy/* rw, |
1119 | + |
1120 | + # squidguard |
1121 | + /usr/bin/squidGuard Cx -> squidguard, |
1122 | + profile squidguard { |
1123 | + #include <abstractions/base> |
1124 | + |
1125 | + /etc/squid/squidGuard.conf r, |
1126 | + /var/log/squid{,3}/squidGuard.log w, |
1127 | + /var/lib/squidguard/** rw, |
1128 | + |
1129 | + # squidguard by default uses /var/log/squid as its logdir, however, we |
1130 | + # don't want it to access squid's logs, only its own. Explicitly deny |
1131 | + # access to squid's files but allow all others since the user may specify |
1132 | + # anything for the squidGurad 'log' directive. |
1133 | + /var/log/squid{,3}/* rw, |
1134 | + audit deny /var/log/squid{,3}/{access,cache,store}.log* rw, |
1135 | + |
1136 | + # Site-specific additions and overrides. See local/README for details. |
1137 | + #include <local/usr.sbin.squid> |
1138 | + } |
1139 | + |
1140 | # Site-specific additions and overrides. See local/README for details. |
1141 | #include <local/usr.sbin.squid> |
1142 | } |
I like your proposed plan.
Tiny nitpick, there is a double "/" in: "d//p/0009- Fix-Werror- alloc-size- larger- than-on- GCC-12. patch"