The Squid HTTP Proxy team is pleased to announce the availability of the Squid-2.6.STABLE21 legacy maintenance release. This release corrects several bugs found in the previous 2.6 release, including two which may be considered security related in some installations: * Bug #2122: Private information leakage in collapsed_forwarding * Bug #1993: Memory leak in http_reply_access deny processing The other major bugfixes include * Bug #2376: Round-Robin peer selection becomes unbalanced when a peer dies and comes back * Fix SNMP reporting of counters with a value > 0xFF800000 * Bug #2241: weights not applied properly in round-robin peer selection * Bug #2393: DNS issues if not able to connect to the name server using TCP * Bug #2350: Problems on Linux with newer kernel headers due to a capabilities API change Please note that 2.6 is a legacy release and is no longer actively maintained by the Squid project. If you can we encourage you to upgrade to 3.0 or 2.7, the currently actively maintained releases. You should not expect to see any further 2.6 maintenance releases from the Squid project. For more information about this release please refer to the release notes at http://www.squid-cache.org/Versions/v2/2.6/RELEASENOTES.html This new release can be downloaded from our HTTP or FTP servers http://www.squid-cache.org/Versions/v2/2.6/ ftp://ftp.squid-cache.org/pub/squid-2/STABLE/ or the mirrors. For a list of mirror sites see http://www.squid-cache.org/Download/http-mirrors.dyn http://www.squid-cache.org/Download/mirrors.dyn If you encounter any issues with this release please first upgrade to 2.7 or 3.0. If the problem persist file a bug report. http://bugs.squid-cache.org/
Attachment:
signature.asc
Description: This is a digitally signed message part