Merge ~sergiodj/ubuntu/+source/squid:merge-5.6-1-kinetic into ubuntu/+source/squid:debian/sid

Proposed by Sergio Durigan Junior
Status: Merged
Merge reported by: Sergio Durigan Junior
Merged at revision: caf7e094d6fb550a059dd6a7656ae819c0246259
Proposed branch: ~sergiodj/ubuntu/+source/squid:merge-5.6-1-kinetic
Merge into: ubuntu/+source/squid:debian/sid
Diff against target: 1142 lines (+976/-2)
9 files modified
debian/NEWS (+7/-0)
debian/changelog (+735/-0)
debian/control (+3/-2)
debian/patches/0009-Fix-Werror-alloc-size-larger-than-on-GCC-12.patch (+65/-0)
debian/patches/90-cf.data.ubuntu.patch (+22/-0)
debian/patches/99-ubuntu-ssl-cert-snakeoil.patch (+24/-0)
debian/patches/fix-max-pkt-sz-for-icmpEchoData-padding.patch (+89/-0)
debian/patches/series (+4/-0)
debian/usr.sbin.squid (+27/-0)
Reviewer Review Type Date Requested Status
Christian Ehrhardt  (community) Needs Fixing
Canonical Server Reporter Pending
Review via email: mp+428123@code.launchpad.net

Description of the change

This is the merge of squid 5.6-1 from Debian unstable.

The merge was relatively easy to perform, and I was able to drop 2 sets of changes from our delta:

1) A fix for CVE 2021-46784, which has been incorporated by upstream.

2) A set of patches that I had backported during the last cycle in order to implement support for OpenSSL 3.

The first drop is trivial, but the second is more involved.

Upstream spent quite a long time discussing the OpenSSL 3 support (for more details, see <https://github.com/squid-cache/squid/pull/694>). The made a bunch of attempts to get the patchset right, and by the time Jammy was being released they still hadn't reached a final version for this change. I was forced to backport and use the commits present in the PR at the time, and then deal with a possible MRE for squid on Jammy after upstream decided on the final version of the patch. This is still the plan, by the way...

A few weeks ago upstream finally merged the final version of the PR. Initially I thought that I'd be able to backport the commit to squid 5.6 (the latest version, also available in Debian) and be done with it, but unfortunately the situation is more complicated than that. The final patch makes use of a lot of new code that has been pushed after 5.6 was released, and the backport proved non-trivial (to say the least). So, my proposed solution here is: let's drop the OpenSSL 3 patches that I had backported for Jammy, let's use the (simpler) OpenSSL 3 patch that Debian has been carrying for a while, and let's postpone the backport of upstream's official commit to next cycle. By then, we may not even have to worry about backporting anything because I believe upstream will release a new version of squid soon.

Finally, I'm adding a minor delta needed to make the package build with GCC 12. I've forwarded the patch upstream as well, so it should be possible to remove it next cycle.

There's a PPA with the proposed changes here:

https://launchpad.net/~sergiodj/+archive/ubuntu/squid/+packages

Builds are still happening; I will post the autopkgtest results ASAP.

To post a comment you must log in.
Revision history for this message
Simon Déziel (sdeziel) wrote :

I like your proposed plan.

Tiny nitpick, there is a double "/" in: "d//p/0009-Fix-Werror-alloc-size-larger-than-on-GCC-12.patch"

Revision history for this message
Sergio Durigan Junior (sergiodj) wrote :

On Wednesday, August 10 2022, Simon Déziel wrote:

> I like your proposed plan.

Thanks, Simon.

> Tiny nitpick, there is a double "/" in: "d//p/0009-Fix-Werror-alloc-size-larger-than-on-GCC-12.patch"

Ops, good catch. Fixed now.

--
Sergio
GPG key ID: E92F D0B3 6B14 F1F4 D8E0 EB2F 106D A1C8 C3CB BF14

Revision history for this message
Christian Ehrhardt  (paelzer) wrote :

FYI - Cleared a few bugs linked here not addressed by this MR

Revision history for this message
Christian Ehrhardt  (paelzer) wrote :
Download full text (4.3 KiB)

One finding so far

Logical LGTM when reading and on comparison
$ git diff sergiodj/logical/5.2-1ubuntu5..pkg/ubuntu/kinetic-devel | diffstat
 changelog | 689 +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
 control | 3
 2 files changed, 691 insertions(+), 1 deletion(-)

Comparing changelog to git range-diff sergiodj/old/debian..sergiodj/logical/5.2-1ubuntu5 sergiodj/new/debian..f5afde0918221ef801fed0e08b0731d4bb77a2c6

1: e8aa00ea58 = 1: b61bbdbef6 - d/usr.sbin.squid: Add sections for squid-deb-proxy and squidguard
=> equal and in changelog

2: 37cc10db0e ! 2: 5fcec25f2e - d/p/90-cf.data.ubuntu.patch: Add refresh patterns for deb packaging
=> just noise in d/p/series and in changelog

3: 7caf6552cf ! 3: 796331ccb0 - Use snakeoil certificates: + d/control: add ssl-cert to dependencies + d/p/99-ubuntu-ssl-cert-snakeoil.patch: add a note about ssl to
=> had noise anyway and needed to be refreshed, done so with better quilt config and in changelog

4: 3de0e9ea5f = 4: 9f67994339 - d/rules, d/NEWS: drop the NIS basic auth helper (LP: #1895694)
=> equal and in changelog

5: de801abcee ! 5: b5a471d3d0 - Fix FTBFS with GCC 11 (LP: #1939352) + d/p/expand-max-pkt-sz-accomodate-icmphdr.patch: Expand MAX_PKT{4,6}_SZ to accomodate for icmp{,6_}hd
=> partially dropped as it is upstream, correct to do so

xxx
=> But I miss mentioning now dropping d/p/workaround-gcc11-wstringop-overread-bug.patch in changelog (easy to fix for you)
xxx

6: 32bdc5f5d6 < -: ---------- * Fix FTBFS with OpenSSL 3.0 (LP: #1946205). The following new patches have been added: - d/p/openssl3-Declaration-of-CRYPTO_EX_dup-changed-again-in-3.0.patch. - d/p/openssl3-Detect-and-default-enable-OpenSSL-3.patch. - d/p/openssl3-Fix-EVP_PKEY_get0_RSA-is-deprecated.patch. - d/p/openssl3-Initial-DH-conversion-to-EVP_PKEY.patch. - d/p/openssl3-Refactor-Ssl-createSslPrivateKey.patch. - d/p/openssl3-Remove-stale-TODO-and-comment.patch. - d/p/openssl3-SSL_OP_-macro-definitions-changed-in-3.0.patch. - d/p/openssl3-Switch-to-BN_rand.patch. - d/p/openssl3-TODO-Upgrade-API-calls-verifying-loaded-DH-params-fi.patch. - d/p/openssl3-Tweak-RSA-key-generator.patch. - d/p/openssl3-Update-ECDH-key-settings.patch. - d/p/openssl3-Update-license-disclaimer.patch.
7: 1bbcea11c5 < -: ---------- * Do not enable openssl as a default. This hinders packaging since we ship squid in two different flavours (gnutls and openssl). Drop d/p/openssl3-Detect-and-default-enable-OpenSSL-3.patch. (LP: #1968200)
8: 8573392502 < -: ---------- * SECURITY UPDATE: Denial of Service in Gopher Processing - debian/patches/CVE-2021-46784.patch: improve handling of Gopher responses in src/gopher.cc.
-: ---------- > 6: 91eb5d18f2 * Drop changes: - Fix FTBFS with OpenSSL 3.0 (LP: #1946205). The following new patches have been added: + d/p/openssl3-Declaration-of-CRYPTO_EX_dup-changed-again-in-3.0.patch. + d/p/openssl3-Detect-...

Read more...

review: Needs Fixing
Revision history for this message
Christian Ehrhardt  (paelzer) wrote :

FYI - no autopkgtests ran so far, I've scheduled them now

Running:
    time pkg release arch ppa trigger
    30 squid kinetic s390x sergiodj/squid squid/5.6-1ubuntu1~ppa5
Waiting:
    Q-num pkg release arch ppa trigger
    1 squid kinetic ppc64el sergiodj/squid squid/5.6-1ubuntu1~ppa5
    1 squid kinetic arm64 sergiodj/squid squid/5.6-1ubuntu1~ppa5
    1 squid kinetic armhf sergiodj/squid squid/5.6-1ubuntu1~ppa5
    1 squid kinetic amd64 sergiodj/squid squid/5.6-1ubuntu1~ppa5

Revision history for this message
Christian Ehrhardt  (paelzer) wrote :

launchpadlibrarian.net was down so I couldn't check the build log.
But the resulting debs seemed ok for me in a quick test.

Revision history for this message
Christian Ehrhardt  (paelzer) wrote :

Summary:
- a little nit pick of a forgotten changelog entry
- waiting for the autopkgtest results

Once both are fixed consider this approved.
If you want explicit re-checking then let me know.

review: Needs Fixing
b26282e... by Sergio Durigan Junior

    - Fix FTBFS with GCC 11 (LP #1939352)
      + d/p/workaround-gcc11-wstringop-overread-bug.patch: Workaround
        GCC 11 -Wstringop-overread bug.
      [ Not needed anymore. ]

d85920c... by Sergio Durigan Junior

merge-changelogs

c8bb7bd... by Sergio Durigan Junior

reconstruct-changelog

caf7e09... by Sergio Durigan Junior

update-maintainer

Revision history for this message
Sergio Durigan Junior (sergiodj) wrote :

Thank you for the review, Christian.

I've updated the changelog entry to reflect the dropped patch; thanks for catching this.

I have the autopkgtest results now; only armhf is failing, but that seems like a flaky failure. I've retriggered the test and will upload as soon as it succeeds.

Revision history for this message
Sergio Durigan Junior (sergiodj) wrote :

I just noticed that the armhf dep8 test is already failing against migration-reference/0, so I will go ahead and upload what I have here.

Thanks again.

$ dput squid_5.6-1ubuntu1_source.changes
Trying to upload package to ubuntu
Checking signature on .changes
gpg: /home/sergio/work/squid/squid_5.6-1ubuntu1_source.changes: Valid signature from 106DA1C8C3CBBF14
Checking signature on .dsc
gpg: /home/sergio/work/squid/squid_5.6-1ubuntu1.dsc: Valid signature from 106DA1C8C3CBBF14
Uploading to ubuntu (via ftp to upload.ubuntu.com):
  Uploading squid_5.6-1ubuntu1.dsc: done.
  Uploading squid_5.6.orig.tar.xz: done.
  Uploading squid_5.6.orig.tar.xz.asc: done.
  Uploading squid_5.6-1ubuntu1.debian.tar.xz: done.
  Uploading squid_5.6-1ubuntu1_source.buildinfo: done.
  Uploading squid_5.6-1ubuntu1_source.changes: done.
Successfully uploaded packages.

Preview Diff

[H/L] Next/Prev Comment, [J/K] Next/Prev File, [N/P] Next/Prev Hunk
1diff --git a/debian/NEWS b/debian/NEWS
2index 1ac410c..83136fb 100644
3--- a/debian/NEWS
4+++ b/debian/NEWS
5@@ -37,6 +37,13 @@ squid (4.13-2) unstable; urgency=high
6
7 -- Santiago Garcia Mantinan <manty@debian.org> Sun, 07 Feb 2021 01:43:37 +0100
8
9+squid (4.13-1ubuntu2) groovy; urgency=medium
10+
11+ Disable the NIS basic authentication helper, as it no longer builds with
12+ glibc 2.32.
13+
14+ -- Andreas Hasenack <andreas@canonical.com> Thu, 17 Sep 2020 18:17:53 -0300
15+
16 squid (4.1-1) unstable; urgency=medium
17
18 Starting from this release support for systemd init has been added to the
19diff --git a/debian/changelog b/debian/changelog
20index 47a68d3..724392b 100644
21--- a/debian/changelog
22+++ b/debian/changelog
23@@ -1,3 +1,49 @@
24+squid (5.6-1ubuntu1) kinetic; urgency=medium
25+
26+ * Merge with Debian unstable (LP: #1971325). Remaining changes:
27+ - d/usr.sbin.squid: Add sections for squid-deb-proxy and
28+ squidguard
29+ - d/p/90-cf.data.ubuntu.patch: Add refresh patterns for deb
30+ packaging
31+ - Use snakeoil certificates:
32+ + d/control: add ssl-cert to dependencies
33+ + d/p/99-ubuntu-ssl-cert-snakeoil.patch: add a note about ssl
34+ to the default config file
35+ - d/rules, d/NEWS: drop the NIS basic auth helper (LP #1895694)
36+ - Fix FTBFS with GCC 11 (LP #1939352)
37+ + d/p/fix-max-pkt-sz-for-icmpEchoData-padding.patch: Fix
38+ MAX_PKT{4,6}_SZ to account for icmpEchoData padding.
39+ * Drop changes:
40+ - Fix FTBFS with OpenSSL 3.0 (LP #1946205). The following new
41+ patches have been added:
42+ + d/p/openssl3-Declaration-of-CRYPTO_EX_dup-changed-again-in-3.0.patch.
43+ + d/p/openssl3-Detect-and-default-enable-OpenSSL-3.patch.
44+ + d/p/openssl3-Fix-EVP_PKEY_get0_RSA-is-deprecated.patch.
45+ + d/p/openssl3-Initial-DH-conversion-to-EVP_PKEY.patch.
46+ + d/p/openssl3-Refactor-Ssl-createSslPrivateKey.patch.
47+ + d/p/openssl3-Remove-stale-TODO-and-comment.patch.
48+ + d/p/openssl3-SSL_OP_-macro-definitions-changed-in-3.0.patch.
49+ + d/p/openssl3-Switch-to-BN_rand.patch.
50+ + d/p/openssl3-TODO-Upgrade-API-calls-verifying-loaded-DH-params-fi.patch.
51+ + d/p/openssl3-Tweak-RSA-key-generator.patch.
52+ + d/p/openssl3-Update-ECDH-key-settings.patch.
53+ + d/p/openssl3-Update-license-disclaimer.patch.
54+ [ Incorporated by Debian. ]
55+ - SECURITY UPDATE: Denial of Service in Gopher Processing
56+ + debian/patches/CVE-2021-46784.patch: improve handling of Gopher
57+ responses in src/gopher.cc.
58+ [ Incorporated by upstream. ]
59+ - Fix FTBFS with GCC 11 (LP #1939352)
60+ + d/p/workaround-gcc11-wstringop-overread-bug.patch: Workaround
61+ GCC 11 -Wstringop-overread bug.
62+ [ Not needed anymore. ]
63+ * Add changes:
64+ - d/p/0009-Fix-Werror-alloc-size-larger-than-on-GCC-12.patch:
65+ Fix FTBFS due to -Werror=alloc-size-larger-than on GCC 12.
66+ [ Forwarded upstream ]
67+
68+ -- Sergio Durigan Junior <sergio.durigan@canonical.com> Thu, 11 Aug 2022 17:13:45 -0400
69+
70 squid (5.6-1) unstable; urgency=high
71
72 * Urgency high due to security fixes
73@@ -38,6 +84,87 @@ squid (5.5-1) unstable; urgency=medium
74
75 -- Luigi Gangitano <luigi@debian.org> Fri, 15 Apr 2022 14:39:54 +0200
76
77+squid (5.2-1ubuntu5) kinetic; urgency=medium
78+
79+ * SECURITY UPDATE: Denial of Service in Gopher Processing
80+ - debian/patches/CVE-2021-46784.patch: improve handling of Gopher
81+ responses in src/gopher.cc.
82+ - CVE-2021-46784
83+
84+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Tue, 21 Jun 2022 13:38:17 -0400
85+
86+squid (5.2-1ubuntu4) jammy; urgency=medium
87+
88+ * Do not enable openssl as a default. This hinders packaging since we ship
89+ squid in two different flavours (gnutls and openssl). Drop
90+ d/p/openssl3-Detect-and-default-enable-OpenSSL-3.patch. (LP: #1968200)
91+
92+ -- Athos Ribeiro <athos.ribeiro@canonical.com> Tue, 12 Apr 2022 23:41:41 -0300
93+
94+squid (5.2-1ubuntu3) jammy; urgency=medium
95+
96+ * Fix FTBFS with OpenSSL 3.0 (LP: #1946205). The following new
97+ patches have been added:
98+ - d/p/openssl3-Declaration-of-CRYPTO_EX_dup-changed-again-in-3.0.patch.
99+ - d/p/openssl3-Detect-and-default-enable-OpenSSL-3.patch.
100+ - d/p/openssl3-Fix-EVP_PKEY_get0_RSA-is-deprecated.patch.
101+ - d/p/openssl3-Initial-DH-conversion-to-EVP_PKEY.patch.
102+ - d/p/openssl3-Refactor-Ssl-createSslPrivateKey.patch.
103+ - d/p/openssl3-Remove-stale-TODO-and-comment.patch.
104+ - d/p/openssl3-SSL_OP_-macro-definitions-changed-in-3.0.patch.
105+ - d/p/openssl3-Switch-to-BN_rand.patch.
106+ - d/p/openssl3-TODO-Upgrade-API-calls-verifying-loaded-DH-params-fi.patch.
107+ - d/p/openssl3-Tweak-RSA-key-generator.patch.
108+ - d/p/openssl3-Update-ECDH-key-settings.patch.
109+ - d/p/openssl3-Update-license-disclaimer.patch.
110+
111+ -- Sergio Durigan Junior <sergio.durigan@canonical.com> Tue, 08 Feb 2022 17:15:20 -0500
112+
113+squid (5.2-1ubuntu2) jammy; urgency=medium
114+
115+ * No-change rebuild against libssl3
116+
117+ -- Steve Langasek <steve.langasek@ubuntu.com> Thu, 09 Dec 2021 00:19:10 +0000
118+
119+squid (5.2-1ubuntu1) jammy; urgency=medium
120+
121+ * Merge with Debian unstable (LP: #1946903). Remaining changes:
122+ - d/usr.sbin.squid: Add sections for squid-deb-proxy and
123+ squidguard
124+ - d/p/90-cf.data.ubuntu.patch: Add refresh patterns for deb
125+ packaging
126+ - Use snakeoil certificates:
127+ + d/control: add ssl-cert to dependencies
128+ + d/p/99-ubuntu-ssl-cert-snakeoil.patch: add a note about ssl
129+ to the default config file
130+ - d/rules, d/NEWS: drop the NIS basic auth helper (LP #1895694)
131+ - Fix FTBFS with GCC 11 (LP #1939352)
132+ + d/p/expand-max-pkt-sz-accomodate-icmphdr.patch: Expand
133+ MAX_PKT{4,6}_SZ to accomodate for icmp{,6_}hdr.
134+ + d/p/workaround-gcc11-wstringop-overread-bug.patch: Workaround
135+ GCC 11 -Wstringop-overread bug.
136+ * Dropped changes:
137+ - d/p/0008-Fix-free-nonheap-object-warning-error-on-snmp_core.c.patch:
138+ Fix call to free on nonheap-object in snmpCreateOidFromStr
139+ [ Incorporated by upstream. ]
140+ - Fix failure to build on RISC-V (LP #1934891)
141+ [ Incorporated by upstream. ]
142+ - SECURITY UPDATE: information disclosure via OOB read in WCCP protocol
143+ + debian/patches/CVE-2021-28116.patch: validate packets better in
144+ src/wccp2.cc.
145+ + CVE-2021-28116
146+ [ Incorporated by upstream. ]
147+ - Fix FTBFS with GCC 11 (LP #1939352)
148+ + d/p/replace-cbdata-offset-hack-with-offsetof.patch: Replace
149+ cbdata::Offset hack with offsetof().
150+ + d/p/add-missing-limits-include-connmark.patch: Add missing
151+ <limits> include to src/acl/ConnMark.cc.
152+ [ Incorporated by upstream. This is a partial drop; the other
153+ two patches that compose this fix are still present in this
154+ release. ]
155+
156+ -- Sergio Durigan Junior <sergio.durigan@canonical.com> Mon, 01 Nov 2021 18:19:59 -0400
157+
158 squid (5.2-1) unstable; urgency=medium
159
160 [ Amos Jeffries <amosjeffries@squid-cache.org> ]
161@@ -78,6 +205,58 @@ squid (5.1-2) unstable; urgency=medium
162
163 -- Luigi Gangitano <luigi@debian.org> Fri, 17 Sep 2021 09:27:54 +0200
164
165+squid (4.13-10ubuntu5) impish; urgency=medium
166+
167+ * SECURITY UPDATE: information disclosure via OOB read in WCCP protocol
168+ - debian/patches/CVE-2021-28116.patch: validate packets better in
169+ src/wccp2.cc.
170+ - CVE-2021-28116
171+
172+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Mon, 04 Oct 2021 08:20:07 -0400
173+
174+squid (4.13-10ubuntu4) impish; urgency=medium
175+
176+ * Fix FTBFS with GCC 11 (LP: #1939352)
177+ - d/p/add-missing-limits-include-connmark.patch: Add missing
178+ <limits> include to src/acl/ConnMark.cc.
179+ - d/p/fix-max-pkt-sz-for-icmpEchoData-padding.patch.patch: Expand
180+ MAX_PKT{4,6}_SZ to accomodate for icmp{,6_}hdr.
181+ - d/p/replace-cbdata-offset-hack-with-offsetof.patch: Replace
182+ cbdata::Offset hack with offsetof().
183+ - d/p/workaround-gcc11-wstringop-overread-bug.patch: Workaround
184+ GCC 11 -Wstringop-overread bug.
185+
186+ -- Sergio Durigan Junior <sergio.durigan@canonical.com> Fri, 20 Aug 2021 00:19:41 -0400
187+
188+squid (4.13-10ubuntu3) impish; urgency=medium
189+
190+ * Fix failure to build on RISC-V (LP: #1934891)
191+
192+ -- Heinrich Schuchardt <heinrich.schuchardt@canonical.com> Wed, 07 Jul 2021 14:11:51 +0200
193+
194+squid (4.13-10ubuntu2) impish; urgency=medium
195+
196+ * No-change rebuild due to OpenLDAP soname bump.
197+
198+ -- Sergio Durigan Junior <sergio.durigan@canonical.com> Mon, 21 Jun 2021 18:09:05 -0400
199+
200+squid (4.13-10ubuntu1) impish; urgency=medium
201+
202+ * Merge with Debian unstable. Remaining changes:
203+ - d/usr.sbin.squid: Add sections for squid-deb-proxy and
204+ squidguard
205+ - d/p/90-cf.data.ubuntu.patch: Add refresh patterns for deb
206+ packaging
207+ - Use snakeoil certificates:
208+ + d/control: add ssl-cert to dependencies
209+ + d/p/99-ubuntu-ssl-cert-snakeoil.patch: add a note about ssl
210+ to the default config file
211+ - d/rules, d/NEWS: drop the NIS basic auth helper (LP: #1895694)
212+ - d/p/0008-Fix-free-nonheap-object-warning-error-on-snmp_core.c.patch:
213+ Fix call to free on nonheap-object in snmpCreateOidFromStr
214+
215+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Fri, 04 Jun 2021 12:49:43 -0400
216+
217 squid (4.13-10) unstable; urgency=medium
218
219 [ Francisco Vilmar Cardoso Ruviaro ]
220@@ -96,6 +275,29 @@ squid (4.13-10) unstable; urgency=medium
221
222 -- Santiago Garcia Mantinan <manty@debian.org> Fri, 28 May 2021 12:28:20 +0200
223
224+squid (4.13-9ubuntu1) impish; urgency=medium
225+
226+ * Merge with Debian unstable. Remaining changes:
227+ - d/usr.sbin.squid: Add sections for squid-deb-proxy and
228+ squidguard
229+ - d/p/90-cf.data.ubuntu.patch: Add refresh patterns for deb
230+ packaging
231+ - Use snakeoil certificates:
232+ + d/control: add ssl-cert to dependencies
233+ + d/p/99-ubuntu-ssl-cert-snakeoil.patch: add a note about ssl
234+ to the default config file
235+ - d/rules, d/NEWS: drop the NIS basic auth helper (LP: #1895694)
236+ - d/p/0008-Fix-free-nonheap-object-warning-error-on-snmp_core.c.patch:
237+ Fix call to free on nonheap-object in snmpCreateOidFromStr
238+ * Drop changes:
239+ - debian/patches/CVE-2020-25097.patch: Add slash prefix to path-
240+ rootless or path-noscheme URLs in src/anyp/Uri.cc.
241+ [Included in 4.13-8]
242+ - d/usr.sbin.squid: Add section for maas-proxy
243+ [maas-proxy is no longer shipped as a deb package]
244+
245+ -- Athos Ribeiro <athos.ribeiro@canonical.com> Tue, 18 May 2021 10:51:16 -0300
246+
247 squid (4.13-9) unstable; urgency=medium
248
249 * Clarify on NEWS and scripts that we no longer remove logs on purge.
250@@ -156,6 +358,46 @@ squid (4.13-2) unstable; urgency=high
251
252 -- Santiago Garcia Mantinan <manty@debian.org> Sun, 07 Feb 2021 01:39:45 +0100
253
254+squid (4.13-1ubuntu4) hirsute; urgency=medium
255+
256+ * d/p/0008-Fix-free-nonheap-object-warning-error-on-snmp_core.c.patch:
257+ Fix FTBFS on Hirsute s390x when compiling with GCC 10.2.0.
258+
259+ -- Sergio Durigan Junior <sergio.durigan@canonical.com> Mon, 05 Apr 2021 12:00:02 -0400
260+
261+squid (4.13-1ubuntu3) hirsute; urgency=medium
262+
263+ * SECURITY UPDATE: HTTP Request Smuggling issue
264+ - debian/patches/CVE-2020-25097.patch: Add slash prefix to path-
265+ rootless or path-noscheme URLs in src/anyp/Uri.cc.
266+ - CVE-2020-25097
267+
268+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Thu, 25 Mar 2021 12:38:06 -0400
269+
270+squid (4.13-1ubuntu2) groovy; urgency=medium
271+
272+ * d/rules, d/NEWS: drop the NIS basic auth helper (LP: #1895694)
273+
274+ -- Andreas Hasenack <andreas@canonical.com> Thu, 17 Sep 2020 18:19:42 -0300
275+
276+squid (4.13-1ubuntu1) groovy; urgency=medium
277+
278+ * Merge with Debian unstable. Remaining changes:
279+ - d/usr.sbin.squid: Add sections for maas-proxy, squid-deb-proxy
280+ squidguard
281+ - d/p/90-cf.data.ubuntu.patch: Add an example refresh pattern
282+ for debs.
283+ - Use snakeoil certificates:
284+ + d/control: add ssl-cert to dependencies
285+ + d/p/99-ubuntu-ssl-cert-snakeoil.patch: add a note about ssl
286+ to the default config file
287+ * Dropped changes:
288+ - d/p/0007-WCCP-Fix-GCC-10-Wstringop-truncation-failures.patch:
289+ Fix GCC-10 build failure due to -Wstringop-truncation warning.
290+ [ Accepted upstream. ]
291+
292+ -- Sergio Durigan Junior <sergio.durigan@canonical.com> Tue, 25 Aug 2020 15:01:58 -0400
293+
294 squid (4.13-1) unstable; urgency=high
295
296 [ Amos Jeffries <amosjeffries@squid-cache.org> ]
297@@ -168,6 +410,43 @@ squid (4.13-1) unstable; urgency=high
298
299 -- Luigi Gangitano <luigi@debian.org> Mon, 24 Aug 2020 17:27:54 +0200
300
301+squid (4.12-1ubuntu1) groovy; urgency=medium
302+
303+ * Merge with Debian unstable. Remaining changes:
304+ - d/usr.sbin.squid: Add sections for maas-proxy, squid-deb-proxy
305+ squidguard
306+ - d/p/90-cf.data.ubuntu.patch: Add an example refresh pattern
307+ for debs.
308+ - Use snakeoil certificates:
309+ + d/control: add ssl-cert to dependencies
310+ + d/p/99-ubuntu-ssl-cert-snakeoil.patch: add a note about ssl
311+ to the default config file
312+ * Dropped changes, not needed anymore:
313+ - d/rules: Add -Wno-format-truncation to CXXFLAGS as a workaround
314+ if building for ppc64el. On that arch, dpkg-buildflags sets -O3
315+ instead of -O2 and that triggers a format-truncation error on
316+ pcon.cc. See https://bugs.squid-cache.org/show_bug.cgi?id=4875.
317+ [ Dropped because the build now passes on ppc64el ]
318+ * Dropped changes, incorporated by Debian:
319+ - Don't restart squid by hand on postinst script
320+ + d/squid.postinst: When installing/upgrading squid, the service
321+ is being restarted manually in the postinst script, which can
322+ break installations that have the squid apparmor enabled because
323+ it will try to restart the service before reloading the apparmor
324+ profile. There is no reason to restart squid manually, since the
325+ restart will be automatically performed later.
326+ - Drop conffile check for squid < 2.7
327+ + d/squid.postinst: squid 2.7 is long, long gone, so it should be
328+ safe to drop the postinst code to make sure that
329+ /etc/squid/squid.conf was properly upgraded.
330+ - d/tests/test-squid.py: Adjust 'pidfile' variable to reflect fact
331+ that we now store the pidfile under '/run/squid/'.
332+ * Added changes:
333+ - d/p/0007-WCCP-Fix-GCC-10-Wstringop-truncation-failures.patch:
334+ Fix GCC-10 build failure due to -Wstringop-truncation warning.
335+
336+ -- Sergio Durigan Junior <sergio.durigan@canonical.com> Mon, 10 Aug 2020 11:20:46 -0400
337+
338 squid (4.12-1) unstable; urgency=high
339
340 [ Sergio Durigan Junior <sergiodj@debian.org> ]
341@@ -203,6 +482,63 @@ squid (4.12-1) unstable; urgency=high
342
343 -- Luigi Gangitano <luigi@debian.org> Wed, 1 Jul 2020 10:52:54 +0200
344
345+squid (4.11-5ubuntu3) groovy; urgency=medium
346+
347+ * No change rebuild against new libnettle8 and libhogweed6 ABI.
348+
349+ -- Dimitri John Ledkov <xnox@ubuntu.com> Mon, 29 Jun 2020 22:38:13 +0100
350+
351+squid (4.11-5ubuntu2) groovy; urgency=medium
352+
353+ * d/tests/test-squid.py: Adjust 'pidfile' variable to reflect fact
354+ that we now store the pidfile under '/run/squid/'.
355+
356+ -- Sergio Durigan Junior <sergio.durigan@canonical.com> Wed, 20 May 2020 10:32:32 -0400
357+
358+squid (4.11-5ubuntu1) groovy; urgency=medium
359+
360+ * Merge with Debian unstable. Remaining changes:
361+ - d/usr.sbin.squid: Add sections for maas-proxy, squid-deb-proxy,
362+ squidguard
363+ - d/p/90-cf.data.ubuntu.patch: Add an example refresh pattern for
364+ debs.
365+ - Use snakeoil certificates:
366+ + d/control: add ssl-cert to dependencies
367+ + d/p/99-ubuntu-ssl-cert-snakeoil.patch: add a note about ssl to the
368+ default config file
369+ - d/rules: Add -Wno-format-truncation to CXXFLAGS as a workaround if
370+ building for ppc64el. On that arch, dpkg-buildflags sets -O3 instead
371+ of -O2 and that triggers a format-truncation error on pcon.cc. See See
372+ https://bugs.squid-cache.org/show_bug.cgi?id=4875
373+ * Dropped:
374+ - d/p/drop-sysctl_h.patch: no longer include sysctl.h as it was
375+ deprecated in glibc 2.30 (LP #1843325)
376+ [ In 4.11-4 ]
377+ - SECURITY UPDATE: multiple ESI issues
378+ + debian/patches/CVE-2019-12519_12521.patch: convert parse exceptions
379+ into 500 status response in src/esi/Context.h, src/esi/Esi.cc,
380+ src/esi/Esi.h, src/esi/Expression.cc.
381+ + CVE-2019-12519
382+ [ In 4.11-4 ]
383+ - SECURITY UPDATE: Digest Authentication nonce replay issue
384+ + debian/patches/CVE-2020-11945.patch: fix auth digest refcount integer
385+ overflow in src/auth/digest/Config.cc.
386+ [ In 4.11-4 ]
387+ * Added:
388+ - Don't restart squid by hand on postinst script
389+ + d/squid.postinst: When installing/upgrading squid, the service
390+ is being restarted manually in the postinst script, which can
391+ break installations that have the squid apparmor enabled because
392+ it will try to restart the service before reloading the apparmor
393+ profile. There is no reason to restart squid manually, since the
394+ restart will be automatically performed later.
395+ - Drop conffile check for squid < 2.7
396+ + d/squid.postinst: squid 2.7 is long, long gone, so it should be
397+ safe to drop the postinst code to make sure that
398+ /etc/squid/squid.conf was properly upgraded.
399+
400+ -- Sergio Durigan Junior <sergio.durigan@canonical.com> Tue, 19 May 2020 14:43:04 -0400
401+
402 squid (4.11-5) unstable; urgency=medium
403
404 [ Sergio Durigan Junior <sergiodj@debian.org> ]
405@@ -281,6 +617,64 @@ squid (4.11-1) unstable; urgency=high
406
407 -- Luigi Gangitano <luigi@debian.org> Thu, 23 Apr 2020 19:34:54 +0200
408
409+squid (4.10-1ubuntu2) groovy; urgency=medium
410+
411+ * SECURITY UPDATE: multiple ESI issues
412+ - debian/patches/CVE-2019-12519_12521.patch: convert parse exceptions
413+ into 500 status response in src/esi/Context.h, src/esi/Esi.cc,
414+ src/esi/Esi.h, src/esi/Expression.cc.
415+ - CVE-2019-12519
416+ - CVE-2019-12521
417+ * SECURITY UPDATE: Digest Authentication nonce replay issue
418+ - debian/patches/CVE-2020-11945.patch: fix auth digest refcount integer
419+ overflow in src/auth/digest/Config.cc.
420+ - CVE-2020-11945
421+
422+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Wed, 13 May 2020 09:51:10 -0400
423+
424+squid (4.10-1ubuntu1) focal; urgency=medium
425+
426+ * Merge with Debian unstable. Remaining changes:
427+ - d/usr.sbin.squid: Add sections for maas-proxy, squid-deb-proxy,
428+ squidguard
429+ - d/p/90-cf.data.ubuntu.patch: Add an example refresh pattern for debs.
430+ - Use snakeoil certificates:
431+ + d/control: add ssl-cert to dependencies
432+ + d/p/99-ubuntu-ssl-cert-snakeoil.patch: add a note about ssl
433+ to the default config file
434+ - d/rules: Add -Wno-format-truncation to CXXFLAGS as a workaround if
435+ building for ppc64el. On that arch, dpkg-buildflags sets -O3 instead of
436+ -O2 and that triggers a format-truncation error on pcon.cc. See
437+ See https://bugs.squid-cache.org/show_bug.cgi?id=4875
438+ - d/p/drop-sysctl_h.patch: no longer include sysctl.h as it was
439+ deprecated in glibc 2.30 (LP #1843325)
440+ * Dropped:
441+ - d/t/control, d/t/test-squid.py: remove gopher tests, as pygopherd is
442+ no longer available in Focal (LP: #1858827)
443+ [In 4.10-1, undocumented]
444+ - d/t/test-squid.py, d/t/squid: switch to python3
445+ [In 4.10-1, undocumented]
446+ - d/t/control: depend on python3-minimal
447+ [In 4.10-1, undocumented]
448+ - SECURITY UPDATE: info disclosure via FTP server
449+ + debian/patches/CVE-2019-12528.patch: fix FTP buffers handling in
450+ src/clients/FtpGateway.cc.
451+ + CVE-2019-12528
452+ [Fixed upstream]
453+ - SECURITY UPDATE: incorrect input validation and buffer management
454+ + debian/patches/CVE-2020-84xx.patch: fix request URL generation in
455+ reverse proxy configurations in src/client_side.cc.
456+ + CVE-2020-8449
457+ + CVE-2020-8450
458+ [Fixed upstream]
459+ - SECURITY UPDATE: DoS in NTLM authentication
460+ + debian/patches/CVE-2020-8517.patch: improved username handling in
461+ src/acl/external/LM_group/ext_lm_group_acl.cc.
462+ + CVE-2020-8517
463+ [Fixed upstream]
464+
465+ -- Andreas Hasenack <andreas@canonical.com> Tue, 25 Feb 2020 15:37:55 -0300
466+
467 squid (4.10-1) unstable; urgency=high
468
469 [ Amos Jeffries <amosjeffries@squid-cache.org> ]
470@@ -302,6 +696,70 @@ squid (4.10-1) unstable; urgency=high
471
472 -- Luigi Gangitano <luigi@debian.org> Tue, 10 Feb 2020 14:12:54 +0100
473
474+squid (4.9-2ubuntu4) focal; urgency=medium
475+
476+ * SECURITY UPDATE: info disclosure via FTP server
477+ - debian/patches/CVE-2019-12528.patch: fix FTP buffers handling in
478+ src/clients/FtpGateway.cc.
479+ - CVE-2019-12528
480+ * SECURITY UPDATE: incorrect input validation and buffer management
481+ - debian/patches/CVE-2020-84xx.patch: fix request URL generation in
482+ reverse proxy configurations in src/client_side.cc.
483+ - CVE-2020-8449
484+ - CVE-2020-8450
485+ * SECURITY UPDATE: DoS in NTLM authentication
486+ - debian/patches/CVE-2020-8517.patch: improved username handling in
487+ src/acl/external/LM_group/ext_lm_group_acl.cc.
488+ - CVE-2020-8517
489+
490+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Wed, 19 Feb 2020 12:43:05 -0500
491+
492+squid (4.9-2ubuntu3) focal; urgency=medium
493+
494+ * No-change rebuild with fixed binutils on arm64.
495+
496+ -- Matthias Klose <doko@ubuntu.com> Sat, 08 Feb 2020 11:20:19 +0000
497+
498+squid (4.9-2ubuntu2) focal; urgency=medium
499+
500+ * d/t/control, d/t/test-squid.py: remove gopher tests, as pygopherd is
501+ no longer available in Focal (LP: #1858827)
502+ * d/t/test-squid.py, d/t/squid: switch to python3
503+ * d/t/control: depend on python3-minimal
504+
505+ -- Andreas Hasenack <andreas@canonical.com> Wed, 08 Jan 2020 15:52:32 -0300
506+
507+squid (4.9-2ubuntu1) focal; urgency=medium
508+
509+ * Merge with Debian unstable. Remaining changes:
510+ - Use snakeoil certificates.
511+ - Add an example refresh pattern for debs.
512+ - d/usr.sbin.squid: Add sections for maas-proxy, squid-deb-proxy,
513+ squidguard
514+ - d/rules: Add -Wno-format-truncation to CXXFLAGS as a workaround if
515+ building for ppc64el. On that arch, dpkg-buildflags sets -O3 instead of
516+ -O2 and that triggers a format-truncation error on pcon.cc. See
517+ See https://bugs.squid-cache.org/show_bug.cgi?id=4875
518+ - d/p/drop-sysctl_h.patch: no longer include sysctl.h as it was
519+ deprecated in glibc 2.30 (LP #1843325)
520+ * Dropped:
521+ - d/rules: Only use -latomic with the intended architectures, instead of
522+ all of them. This matches what was suggested in
523+ https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907106#5
524+ [Fixed upstream]
525+ - d/NEWS.debian: rename d/NEWS.debian to d/NEWS so that
526+ dh_installchangelogs can pick it up. dh_installchangelogs handles
527+ d/NEWS or d/<package>.NEWS, but not NEWS.debian.
528+ [Fixed upstream]
529+ - debian/patches/more-gcc-9-fixes.patch: switch to xstrncpy in
530+ lib/smblib/smblib-util.c. (LP #1835831)
531+ [Fixed upstream]
532+ - d/t/test-squid.py: test_zz_apparmor(): bail early if securityfs isn't
533+ mounted
534+ [Fixed upstream]
535+
536+ -- Lucas Kanashiro <lucas.kanashiro@canonical.com> Thu, 14 Nov 2019 16:33:10 -0300
537+
538 squid (4.9-2) unstable; urgency=medium
539
540 [ Andreas Hasenack <andreas@canonical.com> ]
541@@ -358,6 +816,73 @@ squid (4.9-1) unstable; urgency=high
542
543 -- Luigi Gangitano <luigi@debian.org> Sun, 10 Nov 2019 20:28:15 +0100
544
545+squid (4.8-1ubuntu3) focal; urgency=medium
546+
547+ * No-change rebuild against libnettle7
548+
549+ -- Steve Langasek <steve.langasek@ubuntu.com> Thu, 31 Oct 2019 22:15:39 +0000
550+
551+squid (4.8-1ubuntu2) eoan; urgency=medium
552+
553+ * d/p/drop-sysctl_h.patch: no longer include sysctl.h as it was
554+ deprecated in glibc 2.30 (LP: #1843325)
555+
556+ -- Andreas Hasenack <andreas@canonical.com> Mon, 09 Sep 2019 17:31:45 -0300
557+
558+squid (4.8-1ubuntu1) eoan; urgency=medium
559+
560+ * Merge with Debian unstable. Remaining changes:
561+ - Use snakeoil certificates.
562+ - Add an example refresh pattern for debs.
563+ - d/usr.sbin.squid: Add sections for maas-proxy, squid-deb-proxy,
564+ squidguard
565+ - d/rules: Add -Wno-format-truncation to CXXFLAGS as a workaround if
566+ building for ppc64el. On that arch, dpkg-buildflags sets -O3 instead of
567+ -O2 and that triggers a format-truncation error on pcon.cc. See
568+ See https://bugs.squid-cache.org/show_bug.cgi?id=4875
569+ - d/rules: Only use -latomic with the intended architectures, instead of
570+ all of them. This matches what was suggested in
571+ https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907106#5
572+ - d/NEWS.debian: rename d/NEWS.debian to d/NEWS so that
573+ dh_installchangelogs can pick it up. dh_installchangelogs handles
574+ d/NEWS or d/<package>.NEWS, but not NEWS.debian.
575+ - debian/patches/more-gcc-9-fixes.patch: switch to xstrncpy in
576+ lib/smblib/smblib-util.c. (LP #1835831)
577+ * Dropped:
578+ - d/p/fix-rotate-assertion.patch: Fix assertion error when rotating logs.
579+ Thanks to Vitaly Lavrov <vel21ripn@gmail.com>. (LP #1794553)
580+ [Fixed upstream]
581+ - debian/patches/413.patch: Fix gcc-9 build issues with upstream merged
582+ patch
583+ [Fixed upstream]
584+ - SECURITY UPDATE: incorrect digest auth parameter parsing
585+ + debian/patches/CVE-2019-12525.patch: check length in
586+ src/auth/digest/Config.cc.
587+ + CVE-2019-12525
588+ [Fixed upstream]
589+ - SECURITY UPDATE: buffer overflow in basic auth decoding
590+ + debian/patches/CVE-2019-12527.patch: switch to SBuf in
591+ src/HttpHeader.cc, src/HttpHeader.h, src/cache_manager.cc,
592+ src/clients/FtpGateway.cc.
593+ + CVE-2019-12527
594+ [Fixed upstream]
595+ - SECURITY UPDATE: basic auth uudecode length issue
596+ + debian/patches/CVE-2019-12529.patch: replace uudecode with libnettle
597+ base64 decoder in lib/Makefile.*, src/auth/basic/Config.cc,
598+ include/uudecode.h, lib/uudecode.c.
599+ + CVE-2019-12529
600+ [Fixed upstream]
601+ - SECURITY UPDATE: XSS issues in cachemgr.cgi
602+ + debian/patches/CVE-2019-13345.patch: properly escape values in
603+ tools/cachemgr.cc.
604+ + CVE-2019-13345
605+ [Fixed upstream]
606+ * Added:
607+ - d/t/test-squid.py: test_zz_apparmor(): bail early if securityfs isn't
608+ mounted
609+
610+ -- Andreas Hasenack <andreas@canonical.com> Wed, 24 Jul 2019 16:38:59 -0300
611+
612 squid (4.8-1) unstable; urgency=high
613
614 [ Amos Jeffries <amosjeffries@squid-cache.org> ]
615@@ -376,6 +901,86 @@ squid (4.8-1) unstable; urgency=high
616
617 -- Luigi Gangitano <luigi@debian.org> Thu, 18 Jul 2019 22:28:15 +0200
618
619+squid (4.6-2ubuntu4) eoan; urgency=medium
620+
621+ * Fix gcc-9 issues (LP: #1835831)
622+ - Remove -Wno-sizeof-pointer-memaccess -Wno-stringop-truncation
623+ - debian/patches/more-gcc-9-fixes.patch: switch to xstrncpy in
624+ lib/smblib/smblib-util.c.
625+ * SECURITY UPDATE: incorrect digest auth parameter parsing
626+ - debian/patches/CVE-2019-12525.patch: check length in
627+ src/auth/digest/Config.cc.
628+ - CVE-2019-12525
629+ * SECURITY UPDATE: buffer overflow in basic auth decoding
630+ - debian/patches/CVE-2019-12527.patch: switch to SBuf in
631+ src/HttpHeader.cc, src/HttpHeader.h, src/cache_manager.cc,
632+ src/clients/FtpGateway.cc.
633+ - CVE-2019-12527
634+ * SECURITY UPDATE: basic auth uudecode length issue
635+ - debian/patches/CVE-2019-12529.patch: replace uudecode with libnettle
636+ base64 decoder in lib/Makefile.*, src/auth/basic/Config.cc,
637+ include/uudecode.h, lib/uudecode.c.
638+ - CVE-2019-12529
639+ * SECURITY UPDATE: XSS issues in cachemgr.cgi
640+ - debian/patches/CVE-2019-13345.patch: properly escape values in
641+ tools/cachemgr.cc.
642+ - CVE-2019-13345
643+
644+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Fri, 19 Jul 2019 08:01:58 -0400
645+
646+squid (4.6-2ubuntu3) eoan; urgency=medium
647+
648+ * Override newly added gcc-9 flags:
649+ -Wno-sizeof-pointer-memaccess -Wno-stringop-truncation
650+ NOTE: Overriding those flags is a possible security
651+ asked for info on the gcc-9 issue bug tracker:
652+ https://github.com/squid-cache/squid/pull/413#issuecomment-511314076
653+
654+ -- Gianfranco Costamagna <locutusofborg@debian.org> Mon, 15 Jul 2019 10:21:47 +0200
655+
656+squid (4.6-2ubuntu2) eoan; urgency=medium
657+
658+ * Fix gcc-9 build issues with upstream merged patch
659+
660+ -- Gianfranco Costamagna <locutusofborg@debian.org> Sun, 14 Jul 2019 14:41:16 +0200
661+
662+squid (4.6-2ubuntu1) eoan; urgency=medium
663+
664+ * Merge with Debian unstable. Remaining changes:
665+ - Use snakeoil certificates.
666+ - Add an example refresh pattern for debs.
667+ - d/usr.sbin.squid: Add sections for maas-proxy, squid-deb-proxy,
668+ squidguard
669+ - d/rules: Add -Wno-format-truncation to CXXFLAGS as a workaround if
670+ building for ppc64el. On that arch, dpkg-buildflags sets -O3 instead of
671+ -O2 and that triggers a format-truncation error on pcon.cc. See
672+ See https://bugs.squid-cache.org/show_bug.cgi?id=4875
673+ - d/p/fix-rotate-assertion.patch: Fix assertion error when rotating logs.
674+ Thanks to Vitaly Lavrov <vel21ripn@gmail.com>. (LP #1794553)
675+ [Added Applied-Upstream header]
676+ - d/rules: Only use -latomic with the intended architectures, instead of
677+ all of them. This matches what was suggested in
678+ https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907106#5
679+ - d/NEWS.debian: rename d/NEWS.debian to d/NEWS so that
680+ dh_installchangelogs can pick it up. dh_installchangelogs handles
681+ d/NEWS or d/<package>.NEWS, but not NEWS.debian.
682+ * Dropped:
683+ - d/squid.tmpfile: add tmpfiles configuration to handle /var/run/squid
684+ at boot. Thanks to Luigi Gangitano <luigi@debian.org> (LP #1816006)
685+ [Fixed in 4.5-2]
686+ - d/p/fix-uninitialized-var.patch: Workaround gcc's maybe-unitialized
687+ error in parse_time_t, triggered on ppc64el due to the build using -O3
688+ in that architecture.
689+ [Fixed upstream]
690+ - Add disabled by default AppArmor profile.
691+ [Added by Debian in 4.6-2]
692+ - d/usr.sbin.squid: fix the apparmor profile (LP #1796189):
693+ + allow net_admin capability
694+ + add attach_disconnected flag
695+ [Fixed in 4.6-2]
696+
697+ -- Andreas Hasenack <andreas@canonical.com> Sat, 18 May 2019 14:39:09 -0300
698+
699 squid (4.6-2) unstable; urgency=high
700
701 [ Andreas Hasenack <andreas@canonical.com> ]
702@@ -436,6 +1041,57 @@ squid (4.5-1) unstable; urgency=medium
703
704 -- Luigi Gangitano <luigi@debian.org> Wed, 20 Feb 2019 11:57:15 +0100
705
706+squid (4.4-1ubuntu2) disco; urgency=medium
707+
708+ * d/squid.tmpfile: add tmpfiles configuration to handle /var/run/squid
709+ at boot. Thanks to Luigi Gangitano <luigi@debian.org> (LP: #1816006)
710+
711+ -- Andreas Hasenack <andreas@canonical.com> Wed, 27 Feb 2019 08:54:45 -0300
712+
713+squid (4.4-1ubuntu1) disco; urgency=medium
714+
715+ * Merge with Debian unstable. Remaining changes:
716+ - Use snakeoil certificates.
717+ - Add an example refresh pattern for debs.
718+ - Add disabled by default AppArmor profile.
719+ - d/p/fix-uninitialized-var.patch: Workaround gcc's maybe-unitialized
720+ error in parse_time_t, triggered on ppc64el due to the build using -O3
721+ in that architecture.
722+ - d/rules: Add -Wno-format-truncation to CXXFLAGS as a workaround if
723+ building for ppc64el. On that arch, dpkg-buildflags sets -O3 instead of
724+ -O2 and that triggers a format-truncation error on pcon.cc. See
725+ See https://bugs.squid-cache.org/show_bug.cgi?id=4875
726+ - d/p/fix-rotate-assertion.patch: Fix assertion error when rotating logs.
727+ Thanks to Vitaly Lavrov <vel21ripn@gmail.com>. (LP #1794553)
728+ * Drop:
729+ - d/rules: enable cdbs parallel build
730+ [Fixed in 4.2-1]
731+ - d/t/test-squid.py: fix apparmor profile filename
732+ [Fixed in 4.2-1]
733+ - d/t/test-squid.py: fix the process name. The PID points at the parent.
734+ [Fixed in 4.2-1]
735+ - d/t/upstream-test-suite: also make libmem.la, needed by the tests.
736+ [Fixed in 4.2-1]
737+ - d/t/0003-installed-binary-for-debian-ci.patch: use the squid
738+ binary from the system, instead of the one from the source tree.
739+ [Fixed in 4.2-1]
740+ - d/t/upstream-test-suite: drop the sed line, since patch
741+ 0003-installed-binary-for-debian-ci.patch is doing this work now.
742+ (https://salsa.debian.org/squid-team/squid/commit/ad4372b444ba8b1587839)
743+ [Fixed in 4.2-1]
744+ * Added changes:
745+ - d/rules: Only use -latomic with the intended architectures, instead of
746+ all of them. This matches what was suggested in
747+ https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907106#5
748+ - d/NEWS.debian: rename d/NEWS.debian to d/NEWS so that
749+ dh_installchangelogs can pick it up. dh_installchangelogs handles
750+ d/NEWS or d/<package>.NEWS, but not NEWS.debian.
751+ - d/usr.sbin.squid: fix the apparmor profile (LP: #1796189):
752+ + allow net_admin capability
753+ + add attach_disconnected flag
754+
755+ -- Andreas Hasenack <andreas@canonical.com> Mon, 19 Nov 2018 10:51:18 -0200
756+
757 squid (4.4-1) unstable; urgency=high
758
759 * Urgency high due to security fixes
760@@ -500,6 +1156,85 @@ squid (4.2-1) unstable; urgency=high
761
762 -- Luigi Gangitano <luigi@debian.org> Wed, 22 Aug 2018 13:57:15 +0200
763
764+squid (4.1-1ubuntu3) cosmic; urgency=medium
765+
766+ * d/p/fix-rotate-assertion.patch: Fix assertion error when rotating logs.
767+ Thanks to Vitaly Lavrov <vel21ripn@gmail.com>. (LP: #1794553)
768+
769+ -- Andreas Hasenack <andreas@canonical.com> Tue, 09 Oct 2018 14:00:36 -0300
770+
771+squid (4.1-1ubuntu2) cosmic; urgency=medium
772+
773+ * d/usr.sbin.squid: Update apparmor profile to grant read access to squid
774+ binary (LP: #1792728)
775+
776+ -- Simon Deziel <simon@sdeziel.info> Sat, 15 Sep 2018 13:55:32 -0400
777+
778+squid (4.1-1ubuntu1) cosmic; urgency=medium
779+
780+ * Merged with Debian unstable (LP: #1780944, LP: #1097032, LP: #16669).
781+ Remaining changes:
782+ - Use snakeoil certificates.
783+ [Updated to use the correct config setting names]
784+ - Add an example refresh pattern for debs.
785+ [Improved the refresh patterns based on the configuration from
786+ squid-deb-proxy package]
787+ - Add disabled by default AppArmor profile.
788+ [Updated to include the ssl_certs abstraction and suggestions on how to
789+ deal with the snakeoil private key and other keys in /etc/ssl.]
790+ * Dropped changes:
791+ - Add additional dep8 tests.
792+ [Adopted in 4.0.21-1~exp5, albeit a stripped down version]
793+ - Correct attribution and add explanatory note in d/NEWS.debian.
794+ [That particular upgrade path has happened long ago.]
795+ - Drop wrong short-circuiting of various invocations; we always want to
796+ call the debhelper block.
797+ [This was for the transitional squid3 package, and that transition has
798+ already happened.]
799+ - Revert "Set pidfile for systemd's sysv-generator" from Debian.
800+ [Not needed anymore since we have a native systemd service file
801+ and no longer rely on the generator.]
802+ - Enable autoreconf. This is no longer required for the security updates,
803+ but is needed for the seddery of test-suite/Makefile.am in
804+ d/t/upstream-test-suite.
805+ [Replaced by patch 0003-installed-binary-for-debian-ci.patch]
806+ - Adjust seddery for upstream test squid binary location.
807+ [sed no longer necessary since patch,
808+ 0003-installed-binary-for-debian-ci.patch, will be dropped
809+ entirely.]
810+ - Drop Conflicts/Replaces of squid against squid3. In Ubuntu, the migration
811+ happened in Xenial, so no upgrade path still requires this code. This
812+ reduces upgrade ordering difficulty.
813+ [Again we have a migration, but this time from squid3 to squid, so we
814+ need this].
815+ - GCC7 FTBFS fixes (LP: #1712668):
816+ + d/rules: don't error when hitting the "deprecated" and
817+ "format-truncation" gcc7 warnings. Upstream 3.5.27 has fixes for these,
818+ but one in Format.cc that affects 32bit builds was deemed too intrusive
819+ for the 3.5 stable series and is only in squid 4.x
820+ [No longer needed with squid 4.x]
821+ - Do not force gcc-6
822+ [It was a temporary workaround in Debian that got dropped]
823+ * Added changes:
824+ - d/rules: enable cdbs parallel build
825+ - d/t/test-squid.py: fix apparmor profile filename
826+ - d/t/test-squid.py: fix the process name. The PID points at the parent.
827+ - d/t/upstream-test-suite: also make libmem.la, needed by the tests.
828+ - d/t/0003-installed-binary-for-debian-ci.patch: use the squid
829+ binary from the system, instead of the one from the source tree.
830+ - d/p/fix-uninitialized-var.patch: Workaround gcc's maybe-unitialized
831+ error in parse_time_t, triggered on ppc64el due to the build using -O3
832+ in that architecture.
833+ - d/rules: Add -Wno-format-truncation to CXXFLAGS as a workaround if
834+ building for ppc64el. On that arch, dpkg-buildflags sets -O3 instead of
835+ -O2 and that triggers a format-truncation error on pcon.cc. See
836+ See https://bugs.squid-cache.org/show_bug.cgi?id=4875
837+ - d/t/upstream-test-suite: drop the sed line, since patch
838+ 0003-installed-binary-for-debian-ci.patch is doing this work now.
839+ (https://salsa.debian.org/squid-team/squid/commit/ad4372b444ba8b1587839)
840+
841+ -- Andreas Hasenack <andreas@canonical.com> Thu, 16 Aug 2018 12:33:17 -0300
842+
843 squid (4.1-1) unstable; urgency=high
844
845 * New Upstream Release (Closes: #896120)
846diff --git a/debian/control b/debian/control
847index 629cbbe..a5305c0 100644
848--- a/debian/control
849+++ b/debian/control
850@@ -1,7 +1,8 @@
851 Source: squid
852 Section: web
853 Priority: optional
854-Maintainer: Luigi Gangitano <luigi@debian.org>
855+Maintainer: Ubuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
856+XSBC-Original-Maintainer: Luigi Gangitano <luigi@debian.org>
857 Uploaders: Santiago Garcia Mantinan <manty@debian.org>
858 Homepage: http://www.squid-cache.org
859 Standards-Version: 4.6.0
860@@ -32,7 +33,7 @@ Build-Depends: ed, libltdl-dev, pkg-config
861 Package: squid
862 Architecture: any
863 Pre-Depends: ${misc:Pre-Depends}, adduser
864-Depends: ${shlibs:Depends}, ${misc:Depends}, netbase, logrotate (>= 3.5.4-1), squid-common (>= ${source:Version}), lsb-base, libdbi-perl
865+Depends: ${shlibs:Depends}, ${misc:Depends}, netbase, logrotate (>= 3.5.4-1), squid-common (>= ${source:Version}), lsb-base, libdbi-perl, ssl-cert
866 Suggests: squidclient, squid-cgi, squid-purge, resolvconf (>= 0.40), smbclient, ufw, winbind, apparmor
867 Recommends: libcap2-bin [linux-any], ca-certificates
868 Conflicts: squid-openssl
869diff --git a/debian/patches/0009-Fix-Werror-alloc-size-larger-than-on-GCC-12.patch b/debian/patches/0009-Fix-Werror-alloc-size-larger-than-on-GCC-12.patch
870new file mode 100644
871index 0000000..df677d8
872--- /dev/null
873+++ b/debian/patches/0009-Fix-Werror-alloc-size-larger-than-on-GCC-12.patch
874@@ -0,0 +1,65 @@
875+From: Sergio Durigan Junior <sergio.durigan@canonical.com>
876+Date: Tue, 9 Aug 2022 17:49:23 -0400
877+Subject: Fix -Werror=alloc-size-larger-than on GCC 12
878+
879+Author: Sergio Durigan Junior <sergiodj@ubuntu.com>
880+Forwarded: yes, https://github.com/squid-cache/squid/pull/1118
881+---
882+ src/SquidConfig.h | 2 +-
883+ src/pconn.cc | 2 +-
884+ src/pconn.h | 2 +-
885+ src/store/Disks.cc | 2 +-
886+ 4 files changed, 4 insertions(+), 4 deletions(-)
887+
888+diff --git a/src/SquidConfig.h b/src/SquidConfig.h
889+index feabdf1..6b3cca5 100644
890+--- a/src/SquidConfig.h
891++++ b/src/SquidConfig.h
892+@@ -61,7 +61,7 @@ public:
893+ ~DiskConfig() { delete[] swapDirs; }
894+
895+ RefCount<SwapDir> *swapDirs = nullptr;
896+- int n_allocated = 0;
897++ unsigned int n_allocated = 0;
898+ int n_configured = 0;
899+ /// number of disk processes required to support all cache_dirs
900+ int n_strands = 0;
901+diff --git a/src/pconn.cc b/src/pconn.cc
902+index 62e5411..d30726d 100644
903+--- a/src/pconn.cc
904++++ b/src/pconn.cc
905+@@ -167,7 +167,7 @@ IdleConnList::clearHandlers(const Comm::ConnectionPointer &conn)
906+ void
907+ IdleConnList::push(const Comm::ConnectionPointer &conn)
908+ {
909+- if (size_ == capacity_) {
910++ if ((unsigned int) size_ == capacity_) {
911+ debugs(48, 3, HERE << "growing idle Connection array");
912+ capacity_ <<= 1;
913+ const Comm::ConnectionPointer *oldList = theList_;
914+diff --git a/src/pconn.h b/src/pconn.h
915+index 85e44e5..b8f07d9 100644
916+--- a/src/pconn.h
917++++ b/src/pconn.h
918+@@ -80,7 +80,7 @@ private:
919+ Comm::ConnectionPointer *theList_;
920+
921+ /// Number of entries theList can currently hold without re-allocating (capacity).
922+- int capacity_;
923++ unsigned int capacity_;
924+ ///< Number of in-use entries in theList
925+ int size_;
926+
927+diff --git a/src/store/Disks.cc b/src/store/Disks.cc
928+index 4e8710a..f9c3171 100644
929+--- a/src/store/Disks.cc
930++++ b/src/store/Disks.cc
931+@@ -685,7 +685,7 @@ allocate_new_swapdir(Store::DiskConfig *swap)
932+ swap->swapDirs = new SwapDir::Pointer[swap->n_allocated];
933+ }
934+
935+- if (swap->n_allocated == swap->n_configured) {
936++ if (swap->n_allocated == (size_t) swap->n_configured) {
937+ swap->n_allocated <<= 1;
938+ const auto tmp = new SwapDir::Pointer[swap->n_allocated];
939+ for (int i = 0; i < swap->n_configured; ++i) {
940diff --git a/debian/patches/90-cf.data.ubuntu.patch b/debian/patches/90-cf.data.ubuntu.patch
941new file mode 100644
942index 0000000..68ef5bc
943--- /dev/null
944+++ b/debian/patches/90-cf.data.ubuntu.patch
945@@ -0,0 +1,22 @@
946+Description: Add refresh patterns for deb packaging
947+
948+Reviewed-By: Sergio Durigan Junior <sergio.durigan@canonical.com>
949+Last-Updated: 2021-05-11
950+Forwarded: https://salsa.debian.org/squid-team/squid/-/merge_requests/15
951+
952+--- a/src/cf.data.pre
953++++ b/src/cf.data.pre
954+@@ -5859,6 +5862,12 @@ NOCOMMENT_START
955+ refresh_pattern ^ftp: 1440 20% 10080
956+ refresh_pattern ^gopher: 1440 0% 1440
957+ refresh_pattern -i (/cgi-bin/|\?) 0 0% 0
958++refresh_pattern \/(Packages|Sources)(|\.bz2|\.gz|\.xz)$ 0 0% 0 refresh-ims
959++refresh_pattern \/Release(|\.gpg)$ 0 0% 0 refresh-ims
960++refresh_pattern \/InRelease$ 0 0% 0 refresh-ims
961++refresh_pattern \/(Translation-.*)(|\.bz2|\.gz|\.xz)$ 0 0% 0 refresh-ims
962++# example pattern for deb packages
963++#refresh_pattern (\.deb|\.udeb)$ 129600 100% 129600
964+ refresh_pattern . 0 20% 4320
965+ NOCOMMENT_END
966+ DOC_END
967+
968diff --git a/debian/patches/99-ubuntu-ssl-cert-snakeoil.patch b/debian/patches/99-ubuntu-ssl-cert-snakeoil.patch
969new file mode 100644
970index 0000000..adfc2ee
971--- /dev/null
972+++ b/debian/patches/99-ubuntu-ssl-cert-snakeoil.patch
973@@ -0,0 +1,24 @@
974+Index: squid/src/cf.data.pre
975+===================================================================
976+--- squid.orig/src/cf.data.pre 2022-07-18 07:49:02.052257318 -0400
977++++ squid/src/cf.data.pre 2022-07-18 07:51:17.843207049 -0400
978+@@ -3742,6 +3742,19 @@
979+ A client X.509 certificate to use when connecting to
980+ this peer.
981+
982++ Notes:
983++
984++ On Debian/Ubuntu systems a default snakeoil certificate is
985++ available in /etc/ssl and users can set:
986++
987++ sslcert=/etc/ssl/certs/ssl-cert-snakeoil.pem
988++
989++ and
990++
991++ sslkey=/etc/ssl/private/ssl-cert-snakeoil.key
992++
993++ for testing.
994++
995+ sslkey=/path/to/ssl/key
996+ The private key corresponding to sslcert above.
997+
998diff --git a/debian/patches/fix-max-pkt-sz-for-icmpEchoData-padding.patch b/debian/patches/fix-max-pkt-sz-for-icmpEchoData-padding.patch
999new file mode 100644
1000index 0000000..0480de4
1001--- /dev/null
1002+++ b/debian/patches/fix-max-pkt-sz-for-icmpEchoData-padding.patch
1003@@ -0,0 +1,89 @@
1004+From 78708065e8aa4f882848befe8fa04bf1a04f1c9b Mon Sep 17 00:00:00 2001
1005+From: Sergio Durigan Junior <sergiodj@sergiodj.net>
1006+Date: Thu, 19 Aug 2021 18:56:50 -0400
1007+Subject: [PATCH 1/3] Fix MAX_PKT{4,6}_SZ to account for icmpEchoData padding
1008+
1009+The bug was exposed by GCC v11 on Ubuntu Impish:
1010+
1011+Icmp4.cc:116:11: error: array subscript icmpEchoData[0] is partly
1012+ outside array bounds of char[282] [-Werror=array-bounds]
1013+ echo->opcode = (unsigned char) opcode;
1014+
1015+The array the compiler is talking about is the pkt buffer. That buffer
1016+size (i.e. MAX_PKT4_SZ) was calculated under the faulty assumption that
1017+a compiler cannot add padding after icmphdr (when doing "icmp+1") and/or
1018+between icmpEchoData data members. When compiler padded, the old
1019+MAX_PKT4_SZ math stopped working.
1020+
1021+Same for ICMPv6.
1022+
1023+Signed-off-by: Sergio Durigan Junior <sergiodj@sergiodj.net>
1024+
1025+Author: Sergio Durigan Junior <sergiodj@sergiodj.net>
1026+Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/squid/+bug/1939352
1027+Forwarded: yes, https://github.com/squid-cache/squid/pull/887
1028+---
1029+ src/icmp/Icmp.h | 4 ++--
1030+ src/icmp/Icmp4.cc | 4 +++-
1031+ src/icmp/Icmp6.cc | 4 +++-
1032+ 3 files changed, 8 insertions(+), 4 deletions(-)
1033+
1034+diff --git a/src/icmp/Icmp.h b/src/icmp/Icmp.h
1035+index c9cada3..b8cdf77 100644
1036+--- a/src/icmp/Icmp.h
1037++++ b/src/icmp/Icmp.h
1038+@@ -16,8 +16,8 @@
1039+ #define PINGER_PAYLOAD_SZ 8192
1040+
1041+ #define MAX_PAYLOAD 256 // WAS: SQUIDHOSTNAMELEN
1042+-#define MAX_PKT4_SZ (MAX_PAYLOAD + sizeof(struct timeval) + sizeof (char) + sizeof(struct icmphdr) + 1)
1043+-#define MAX_PKT6_SZ (MAX_PAYLOAD + sizeof(struct timeval) + sizeof (char) + sizeof(struct icmp6_hdr) + 1)
1044++#define MAX_PKT4_SZ (sizeof(struct icmpEchoData) + sizeof(struct icmphdr) + 1)
1045++#define MAX_PKT6_SZ (sizeof(struct icmpEchoData) + sizeof(struct icmp6_hdr) + 1)
1046+
1047+ #if USE_ICMP
1048+
1049+diff --git a/src/icmp/Icmp4.cc b/src/icmp/Icmp4.cc
1050+index 9500215..687d8d3 100644
1051+--- a/src/icmp/Icmp4.cc
1052++++ b/src/icmp/Icmp4.cc
1053+@@ -91,6 +91,8 @@ Icmp4::SendEcho(Ip::Address &to, int opcode, const char *payload, int len)
1054+ size_t icmp_pktsize = sizeof(struct icmphdr);
1055+ struct addrinfo *S = NULL;
1056+
1057++ static_assert(sizeof(*icmp) + sizeof(*echo) <= sizeof(pkt), "our custom ICMPv4 Echo payload fits the packet buffer");
1058++
1059+ memset(pkt, '\0', MAX_PKT4_SZ);
1060+
1061+ icmp = (struct icmphdr *) (void *) pkt;
1062+@@ -112,7 +114,7 @@ Icmp4::SendEcho(Ip::Address &to, int opcode, const char *payload, int len)
1063+ ++icmp_pkts_sent;
1064+
1065+ // Construct ICMP packet data content
1066+- echo = (icmpEchoData *) (icmp + 1);
1067++ echo = reinterpret_cast<icmpEchoData *>(reinterpret_cast<char *>(pkt) + sizeof(*icmp));
1068+ echo->opcode = (unsigned char) opcode;
1069+ memcpy(&echo->tv, &current_time, sizeof(struct timeval));
1070+
1071+diff --git a/src/icmp/Icmp6.cc b/src/icmp/Icmp6.cc
1072+index 4bbd47a..a6ea79e 100644
1073+--- a/src/icmp/Icmp6.cc
1074++++ b/src/icmp/Icmp6.cc
1075+@@ -125,6 +125,8 @@ Icmp6::SendEcho(Ip::Address &to, int opcode, const char *payload, int len)
1076+ struct addrinfo *S = NULL;
1077+ size_t icmp6_pktsize = 0;
1078+
1079++ static_assert(sizeof(*icmp) + sizeof(*echo) <= sizeof(pkt), "our custom ICMPv6 Echo payload fits the packet buffer");
1080++
1081+ memset(pkt, '\0', MAX_PKT6_SZ);
1082+ icmp = (struct icmp6_hdr *)pkt;
1083+
1084+@@ -147,7 +149,7 @@ Icmp6::SendEcho(Ip::Address &to, int opcode, const char *payload, int len)
1085+ icmp6_pktsize = sizeof(struct icmp6_hdr);
1086+
1087+ // Fill Icmp6 ECHO data content
1088+- echo = (icmpEchoData *) (pkt + sizeof(icmp6_hdr));
1089++ echo = reinterpret_cast<icmpEchoData *>(reinterpret_cast<char *>(pkt) + sizeof(*icmp));
1090+ echo->opcode = (unsigned char) opcode;
1091+ memcpy(&echo->tv, &current_time, sizeof(struct timeval));
1092+
1093diff --git a/debian/patches/series b/debian/patches/series
1094index 5438215..95d949e 100644
1095--- a/debian/patches/series
1096+++ b/debian/patches/series
1097@@ -3,3 +3,7 @@
1098 0003-installed-binary-for-debian-ci.patch
1099 0005-Use-RuntimeDirectory-to-create-run-squid.patch
1100 0006-Fix-build-against-OpenSSL-3-0.patch
1101+90-cf.data.ubuntu.patch
1102+99-ubuntu-ssl-cert-snakeoil.patch
1103+fix-max-pkt-sz-for-icmpEchoData-padding.patch
1104+0009-Fix-Werror-alloc-size-larger-than-on-GCC-12.patch
1105diff --git a/debian/usr.sbin.squid b/debian/usr.sbin.squid
1106index d01bcd0..a34487a 100644
1107--- a/debian/usr.sbin.squid
1108+++ b/debian/usr.sbin.squid
1109@@ -51,6 +51,33 @@
1110 # squid-langpack
1111 /usr/share/squid-langpack/** r,
1112
1113+ # squid-deb-proxy
1114+ /etc/squid-deb-proxy/** r,
1115+ /{,var/}run/squid-deb-proxy.pid rwk,
1116+ /var/cache/squid-deb-proxy/ r,
1117+ /var/cache/squid-deb-proxy/** rwk,
1118+ /var/log/squid-deb-proxy/* rw,
1119+
1120+ # squidguard
1121+ /usr/bin/squidGuard Cx -> squidguard,
1122+ profile squidguard {
1123+ #include <abstractions/base>
1124+
1125+ /etc/squid/squidGuard.conf r,
1126+ /var/log/squid{,3}/squidGuard.log w,
1127+ /var/lib/squidguard/** rw,
1128+
1129+ # squidguard by default uses /var/log/squid as its logdir, however, we
1130+ # don't want it to access squid's logs, only its own. Explicitly deny
1131+ # access to squid's files but allow all others since the user may specify
1132+ # anything for the squidGurad 'log' directive.
1133+ /var/log/squid{,3}/* rw,
1134+ audit deny /var/log/squid{,3}/{access,cache,store}.log* rw,
1135+
1136+ # Site-specific additions and overrides. See local/README for details.
1137+ #include <local/usr.sbin.squid>
1138+ }
1139+
1140 # Site-specific additions and overrides. See local/README for details.
1141 #include <local/usr.sbin.squid>
1142 }

Subscribers

People subscribed via source and target branches