- ------------------------------------------------------------------------
Debian Security Advisory DSA-1732                    security@debian.org
http://www.debian.org/security/                           Steffen Joeris
March 03, 2009                        http://www.debian.org/security/faq
- ------------------------------------------------------------------------

Package        : squid3
Vulnerability  : denial of service
Problem type   : remote
Debian-specific: no
CVE Id(s)      : CVE-2009-0478

Joshua Morin, Mikko Varpiola and Jukka Taimisto discovered an assertion
error in squid3, a full featured Web Proxy cache, which could lead to
a denial of service attack.


For the stable distribution (lenny), this problem has been fixed in
version 3.0.STABLE8-3, which was already included in the lenny release.

For the oldstable distribution (etch), this problem has been fixed in
version 3.0.PRE5-5+etch1.

For the testing distribution (squeeze) and the unstable distribution
(sid), this problem has been fixed in version 3.0.STABLE8-3.

Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 4.0 alias etch
- -------------------------------

Debian (oldstable)
- ------------------

Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

      Size/MD5 checksum:  3061614 35cc83c17afb17c4718ffc8d0d71bcae
      Size/MD5 checksum:    13354 4993554616685c3596d9f96eb12d53c1
      Size/MD5 checksum:      735 98fac484b56ec7ee5f69ad6336656e28

Architecture independent packages:

      Size/MD5 checksum:   248732 2b26e7e28cefe82d5c7a94d7cdb73c74

alpha architecture (DEC Alpha)

      Size/MD5 checksum:    66928 73ba707ff043dabf778d8839591ff00c
      Size/MD5 checksum:   887986 246a0992ee6867cba9b5bd90ae3bb167
      Size/MD5 checksum:    71404 11af955fd5604bd2595fcce41e6d4632

amd64 architecture (AMD x86_64 (AMD64))

      Size/MD5 checksum:    64534 3bb28edd86a31e8fdfb37551631f3da8
      Size/MD5 checksum:    68328 798fa101699710b329935a78bf0cd0ea
      Size/MD5 checksum:   792302 78aa4fae02843d22ee8784e5f1ee87cb

arm architecture (ARM)

      Size/MD5 checksum:    63484 d6f2107d20788bf7dd07abb9b206172c
      Size/MD5 checksum:   769738 10d6ac7123424be28690c2030cbf5eb7
      Size/MD5 checksum:    67272 2fdd845095b8fa0cb3d9574e5fdb4bcd

hppa architecture (HP PA RISC)

      Size/MD5 checksum:    69974 604c4c10f65c185b89d1cff91136a32e
      Size/MD5 checksum:   929058 a90594d57f20ea12d7f1cd05fab538a4
      Size/MD5 checksum:    66514 961004e071bff449058b1fcbbf11910c

i386 architecture (Intel ia32)

      Size/MD5 checksum:    64442 8f93ed7979e6346f09240bda0f8397fb
      Size/MD5 checksum:   743098 85d673af4e6a9451acca3e519a057727
      Size/MD5 checksum:    68450 b4b71002a819ed312b5049f52f6b26af

ia64 architecture (Intel ia64)

      Size/MD5 checksum:  1185186 d0a0f2f96cdcaa68f64fb712e60e388a
      Size/MD5 checksum:    76120 59e1000682f659bd8c279cdbb03aabbe
      Size/MD5 checksum:    70344 70082e6f0d055c6fbc5bb659d291a59c

mipsel architecture (MIPS (Little Endian))

      Size/MD5 checksum:    70014 2776662dce0de56454d4e19525c616fa
      Size/MD5 checksum:   911840 16122bd2616f77ac6019dc142fe64157
      Size/MD5 checksum:    66332 1e67fe985396c482e963876626975523

powerpc architecture (PowerPC)

      Size/MD5 checksum:    69072 311a6d89f5e29f14319fde9d7aee364c
      Size/MD5 checksum:   819050 28e74d4371d39fa553c1ecacb282c7a3
      Size/MD5 checksum:    64818 35cbc5e8ebd78dc0294750d2e2d32d7a

s390 architecture (IBM S/390)

      Size/MD5 checksum:   787254 1303b619f1b56d7908fea5308c88669c
      Size/MD5 checksum:    65164 cc13b2a7b237ff84219a65760a8cca95
      Size/MD5 checksum:    69104 de5334329dbad3f151a6322b9ec6d2d0


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp:  dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and http://packages.debian.org/

Debian: DSA-1732-1: New squid3 packages fix denial of service

March 3, 2009
Joshua Morin, Mikko Varpiola and Jukka Taimisto discovered an assertion error in squid3, a full featured Web Proxy cache, which could lead to a denial of service attack

Summary


For the stable distribution (lenny), this problem has been fixed in
version 3.0.STABLE8-3, which was already included in the lenny release.

For the oldstable distribution (etch), this problem has been fixed in
version 3.0.PRE5-5+etch1.

For the testing distribution (squeeze) and the unstable distribution
(sid), this problem has been fixed in version 3.0.STABLE8-3.

Upgrade instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 4.0 alias etch

Debian (oldstable)
- ------------------

Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

Size/MD5 checksum: 3061614 35cc83c17afb17c4718ffc8d0d71bcae
Size/MD5 checksum: 13354 4993554616685c3596d9f96eb12d53c1
Size/MD5 checksum: 735 98fac484b56ec7ee5f69ad6336656e28

Architecture independent packages:

Size/MD5 checksum: 248732 2b26e7e28cefe82d5c7a94d7cdb73c74

alpha architecture (DEC Alpha)

Size/MD5 checksum: 66928 73ba707ff043dabf778d8839591ff00c
Size/MD5 checksum: 887986 246a0992ee6867cba9b5bd90ae3bb167
Size/MD5 checksum: 71404 11af955fd5604bd2595fcce41e6d4632

amd64 architecture (AMD x86_64 (AMD64))

Size/MD5 checksum: 64534 3bb28edd86a31e8fdfb37551631f3da8
Size/MD5 checksum: 68328 798fa101699710b329935a78bf0cd0ea
Size/MD5 checksum: 792302 78aa4fae02843d22ee8784e5f1ee87cb

arm architecture (ARM)

Size/MD5 checksum: 63484 d6f2107d20788bf7dd07abb9b206172c
Size/MD5 checksum: 769738 10d6ac7123424be28690c2030cbf5eb7
Size/MD5 checksum: 67272 2fdd845095b8fa0cb3d9574e5fdb4bcd

hppa architecture (HP PA RISC)

Size/MD5 checksum: 69974 604c4c10f65c185b89d1cff91136a32e
Size/MD5 checksum: 929058 a90594d57f20ea12d7f1cd05fab538a4
Size/MD5 checksum: 66514 961004e071bff449058b1fcbbf11910c

i386 architecture (Intel ia32)

Size/MD5 checksum: 64442 8f93ed7979e6346f09240bda0f8397fb
Size/MD5 checksum: 743098 85d673af4e6a9451acca3e519a057727
Size/MD5 checksum: 68450 b4b71002a819ed312b5049f52f6b26af

ia64 architecture (Intel ia64)

Size/MD5 checksum: 1185186 d0a0f2f96cdcaa68f64fb712e60e388a
Size/MD5 checksum: 76120 59e1000682f659bd8c279cdbb03aabbe
Size/MD5 checksum: 70344 70082e6f0d055c6fbc5bb659d291a59c

mipsel architecture (MIPS (Little Endian))

Size/MD5 checksum: 70014 2776662dce0de56454d4e19525c616fa
Size/MD5 checksum: 911840 16122bd2616f77ac6019dc142fe64157
Size/MD5 checksum: 66332 1e67fe985396c482e963876626975523

powerpc architecture (PowerPC)

Size/MD5 checksum: 69072 311a6d89f5e29f14319fde9d7aee364c
Size/MD5 checksum: 819050 28e74d4371d39fa553c1ecacb282c7a3
Size/MD5 checksum: 64818 35cbc5e8ebd78dc0294750d2e2d32d7a

s390 architecture (IBM S/390)

Size/MD5 checksum: 787254 1303b619f1b56d7908fea5308c88669c
Size/MD5 checksum: 65164 cc13b2a7b237ff84219a65760a8cca95
Size/MD5 checksum: 69104 de5334329dbad3f151a6322b9ec6d2d0


These files will probably be moved into the stable distribution on
its next update.

For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and http://packages.debian.org/


Severity
Joshua Morin, Mikko Varpiola and Jukka Taimisto discovered an assertion
error in squid3, a full featured Web Proxy cache, which could lead to
a denial of service attack.

Related News