Skip to navigation

Bug Fix Advisory squid bug fix update

Advisory: RHBA-2012:1290-2
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-09-19
Last updated on: 2012-09-19
Affected Products: Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server EUS (v. 6.3.z)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated squid packages that fix several bugs are now available for Red Hat
Enterprise Linux 6.

[Updated 20th September 2012]
This advisory has been updated with an accurate description of the "http10"
option for BZ#852863. This update does not change the packages in any way.

Squid is a high-performance proxy caching server for web clients that supports
FTP, Gopher, and HTTP data objects.

This update fixes the following bugs:

* Due to a bug in the ConnStateData::noteMoreBodySpaceAvailable() function,
child processes of squid aborted upon encountering a failed assertion. An
upstream patch has been provided to address this issue and squid child processes
no longer abort in the described scenario. (BZ#853053)

* Due to an upstream patch, which renamed the HTTP header controlling persistent
connections from "Proxy-Connection" to "Connection", the NTLM pass-through
authentication does not work, thus preventing login. This update introduces the
new "http10" option to the squid.conf file, which can be used to enable the
change in the patch. This option is set to "off" by default. When set to "on",
the NTLM pass-through authentication works properly, thus allowing login
attempts to succeed. (BZ#852863)

* When the IPv6 protocol was disabled and squid tried to handle an HTTP GET
request containing an IPv6 address, the squid child process terminated due to
signal 6. This bug has been fixed and such requests are now handled as expected.
(BZ#852861)

* The old "stale if hit" logic did not account for cases where the stored stale
response became fresh due to a successful re-validation with the origin server.
Consequently, incorrect warning messages were returned. With this update, squid
no longer marks elements as stale in the described scenario, thus fixing this
bug. (BZ#855330)

All users of squid are advised to upgrade to these updated packages, which fix
these bugs.


Solution

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux Server (v. 6)

SRPMS:
squid-3.1.10-9.el6_3.src.rpm
File outdated by:  RHBA-2014:0048
    MD5: fdf66834fb77abe6549d9f942d703c6c
SHA-256: e9b545ef94c036eedd73607309fc9cf1273b91ce4b82bcb8183fc1045892aeaa
 
IA-32:
squid-3.1.10-9.el6_3.i686.rpm
File outdated by:  RHBA-2014:0048
    MD5: dc4d00232f75ff048334b11cc2fd679b
SHA-256: c4d4b09c1f37791d65b2c17245e4633e77149bf4ed85f4ed10b10c29a6361ab2
squid-debuginfo-3.1.10-9.el6_3.i686.rpm
File outdated by:  RHBA-2014:0048
    MD5: 50ded9edd4a0792d5093388a54d5f635
SHA-256: 1e81db34155e4d4291b65b03c5e3961f08cd82f6cf741fc8265d77059d39e2e1
 
PPC:
squid-3.1.10-9.el6_3.ppc64.rpm
File outdated by:  RHBA-2014:0048
    MD5: 0b7fc5196ec0bcc419ffa32bdcb8e6ac
SHA-256: 1ccbf8fc079f290a6e3872338b668d37bc3cb5fafd423f679a84f4fcdcea221a
squid-debuginfo-3.1.10-9.el6_3.ppc64.rpm
File outdated by:  RHBA-2014:0048
    MD5: a432ee9d30387bb2017068d49c544ea3
SHA-256: 3848312a24c276df6ee3fbf8365b25d8f9bc2a3bcc2229dd288a3391f31b20dd
 
s390x:
squid-3.1.10-9.el6_3.s390x.rpm
File outdated by:  RHBA-2014:0048
    MD5: b8005b965e13b46f079fcb208b4edf70
SHA-256: 7d79a446f2e27c397539a2b638caaff29b8e7fc3424ce8f44b9db4a774f605d1
squid-debuginfo-3.1.10-9.el6_3.s390x.rpm
File outdated by:  RHBA-2014:0048
    MD5: 275632a8e510a7e9eeb3d816f507eaeb
SHA-256: 29753a5d16df896d97f73717f0a1d7db0077832978ce168c5410731aeb656f79
 
x86_64:
squid-3.1.10-9.el6_3.x86_64.rpm
File outdated by:  RHBA-2014:0048
    MD5: fc0cd134070c835c18c42dc8e7b2ee73
SHA-256: 21d5b46f6111818abf989e2aa71dedccbf59307221048f1954ca24b1c1d570b9
squid-debuginfo-3.1.10-9.el6_3.x86_64.rpm
File outdated by:  RHBA-2014:0048
    MD5: 5bdc1689bd5de54d8046df3a16503a72
SHA-256: 75cb205cb0582c73ed94f37c29572b532576bc3914fbf9f0d6cf92a47cf6ddd0
 
Red Hat Enterprise Linux Server EUS (v. 6.3.z)

SRPMS:
squid-3.1.10-9.el6_3.src.rpm
File outdated by:  RHBA-2014:0048
    MD5: fdf66834fb77abe6549d9f942d703c6c
SHA-256: e9b545ef94c036eedd73607309fc9cf1273b91ce4b82bcb8183fc1045892aeaa
 
IA-32:
squid-3.1.10-9.el6_3.i686.rpm     MD5: dc4d00232f75ff048334b11cc2fd679b
SHA-256: c4d4b09c1f37791d65b2c17245e4633e77149bf4ed85f4ed10b10c29a6361ab2
squid-debuginfo-3.1.10-9.el6_3.i686.rpm     MD5: 50ded9edd4a0792d5093388a54d5f635
SHA-256: 1e81db34155e4d4291b65b03c5e3961f08cd82f6cf741fc8265d77059d39e2e1
 
PPC:
squid-3.1.10-9.el6_3.ppc64.rpm     MD5: 0b7fc5196ec0bcc419ffa32bdcb8e6ac
SHA-256: 1ccbf8fc079f290a6e3872338b668d37bc3cb5fafd423f679a84f4fcdcea221a
squid-debuginfo-3.1.10-9.el6_3.ppc64.rpm     MD5: a432ee9d30387bb2017068d49c544ea3
SHA-256: 3848312a24c276df6ee3fbf8365b25d8f9bc2a3bcc2229dd288a3391f31b20dd
 
s390x:
squid-3.1.10-9.el6_3.s390x.rpm     MD5: b8005b965e13b46f079fcb208b4edf70
SHA-256: 7d79a446f2e27c397539a2b638caaff29b8e7fc3424ce8f44b9db4a774f605d1
squid-debuginfo-3.1.10-9.el6_3.s390x.rpm     MD5: 275632a8e510a7e9eeb3d816f507eaeb
SHA-256: 29753a5d16df896d97f73717f0a1d7db0077832978ce168c5410731aeb656f79
 
x86_64:
squid-3.1.10-9.el6_3.x86_64.rpm     MD5: fc0cd134070c835c18c42dc8e7b2ee73
SHA-256: 21d5b46f6111818abf989e2aa71dedccbf59307221048f1954ca24b1c1d570b9
squid-debuginfo-3.1.10-9.el6_3.x86_64.rpm     MD5: 5bdc1689bd5de54d8046df3a16503a72
SHA-256: 75cb205cb0582c73ed94f37c29572b532576bc3914fbf9f0d6cf92a47cf6ddd0
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
squid-3.1.10-9.el6_3.src.rpm
File outdated by:  RHBA-2014:0048
    MD5: fdf66834fb77abe6549d9f942d703c6c
SHA-256: e9b545ef94c036eedd73607309fc9cf1273b91ce4b82bcb8183fc1045892aeaa
 
IA-32:
squid-3.1.10-9.el6_3.i686.rpm
File outdated by:  RHBA-2014:0048
    MD5: dc4d00232f75ff048334b11cc2fd679b
SHA-256: c4d4b09c1f37791d65b2c17245e4633e77149bf4ed85f4ed10b10c29a6361ab2
squid-debuginfo-3.1.10-9.el6_3.i686.rpm
File outdated by:  RHBA-2014:0048
    MD5: 50ded9edd4a0792d5093388a54d5f635
SHA-256: 1e81db34155e4d4291b65b03c5e3961f08cd82f6cf741fc8265d77059d39e2e1
 
x86_64:
squid-3.1.10-9.el6_3.x86_64.rpm
File outdated by:  RHBA-2014:0048
    MD5: fc0cd134070c835c18c42dc8e7b2ee73
SHA-256: 21d5b46f6111818abf989e2aa71dedccbf59307221048f1954ca24b1c1d570b9
squid-debuginfo-3.1.10-9.el6_3.x86_64.rpm
File outdated by:  RHBA-2014:0048
    MD5: 5bdc1689bd5de54d8046df3a16503a72
SHA-256: 75cb205cb0582c73ed94f37c29572b532576bc3914fbf9f0d6cf92a47cf6ddd0
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

852861 - Squid exits due to signal 6 when IPv6 is disabled and HTTP GET request contains IPv6 address
852863 - The NTLM pass-through authentication doesn't work via squid-3.1.10
855330 - squid incorrectly marks elements as stale when the client uses If-Modified-Since and If-None-Match headers



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/