Package: squid Version: 3.5.23-5+deb9u2.1 Severity: important File: /usr/sbin/squid
Dear Maintainer, We installed the security update deb9u2 and learned that no more http-access (with icap) was possible. No problem with https because https is forwarded directly and with disabled icap feature http also no problem. In access.log I found: 1594709099.638 0 x.x.x.x ICAP_ERR_OTHER/000 0 RESPMOD (http://www.google.de/) 127.0.0.1 After downgrade to deb9u1 everything worked fine again. I enabled debugging (debug_options 93,3) and found some squid loglines: essential ICAP service is down after an options fetch failure: icap://127.0.0.1:1344/virus_scan [down,!opt] and ServiceRep.cc(534) noteAdaptationAnswer: failed to fetch options [down,!opt,fail1] With a tcpdump on lo interface I found a strange behaviour: squid -> icap: syn syn ack ack rst So squid is sending a rst package? I can provide the tracefile if desired. Furthermore the cache.log of squid with content of debug_options as above mentioned. I checked applied patches and after some tests and rebuilds I found that without patch CVE-2019-12523 it worked again. We have sev. stretch squids (with and without parent squids) and all have the same problem. Quite unsure why I can't find anything on mailing lists. -- System Information: Debian Release: 9.12 APT prefers oldstable-updates APT policy: (990, 'oldstable-updates'), (990, 'oldstable') Architecture: amd64 (x86_64) Kernel: Linux 4.9.0-12-amd64 (SMP w/4 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) Versions of packages squid depends on: ii adduser 3.115 ii libc6 2.24-11+deb9u4 ii libcap2 1:2.25-1 ii libcomerr2 1.43.4-2+deb9u1 ii libdb5.3 5.3.28-12+deb9u1 ii libdbi-perl 1.636-1+b1 ii libecap3 1.0.1-3.2 ii libexpat1 2.2.0-2+deb9u3 ii libgcc1 1:6.3.0-18+deb9u1 ii libgssapi-krb5-2 1.15-1+deb9u1 ii libkrb5-3 1.15-1+deb9u1 ii libldap-2.4-2 2.4.44+dfsg-5+deb9u4 ii libltdl7 2.4.6-2 ii libnetfilter-conntrack3 1.0.6-2 ii libnettle6 3.3-1+b2 ii libpam0g 1.1.8-3.6 ii libsasl2-2 2.1.27~101-g0780600+dfsg-3+deb9u1 ii libstdc++6 6.3.0-18+deb9u1 ii libxml2 2.9.4+dfsg1-2.2+deb9u2 ii logrotate 3.11.0-0.1 ii lsb-base 9.20161125 ii netbase 5.4 ii squid-common 3.5.23-5+deb9u2 Versions of packages squid recommends: ii libcap2-bin 1:2.25-1 Versions of packages squid suggests: pn resolvconf <none> pn smbclient <none> pn squid-cgi <none> pn squid-purge <none> ii squidclient 3.5.23-5+deb9u2 pn ufw <none> pn winbindd <none> /etc/squid/squid.conf changed: .snip. logformat icap_squid-ext %ts.%03tu %6icap::tr %>a %icap::to/%03icap::Hs %icap::>st %icap::rm (%ru) %un %icap::<A icap_log syslog:local6.info icap_squid-ext icap_enable on icap_preview_enable on icap_preview_size 128 icap_send_client_ip on icap_service_failure_limit -1 icap_service service_resp_clamav respmode_precache bypass=0 icap://127.0.0.1:1344/virus_scan adaptation_service_chain service_resp_CHAIN service_resp_clamav adaptation_access service_resp_CHAIN deny CONNECT adaptation_access service_resp_CHAIN allow all cache_peer ... parent 8080 0 no-query no-digest sourcehash name=srv-proxy always_direct deny all never_direct allow all -- no debconf information Kind regards, Andreas Schulz