Search squid archive

Re: Squid 3.3.7 is available

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



RPM will be available in a couple tests.
The RPM includes all the ssl-bump helpers needed.
You will might want to take a look at:
http://wiki.squid-cache.org/Features/DynamicSslCert
Which gives you almost anything.
the only differnce is that the needed file is at lib64/squid
or something Else.

There is a need to disable SELINUX to let squid run fine.

http://www1.ngtech.co.il/rpm/centos/6/x86_64/

will be updated in the next hours.

Eliezer

On 07/11/2013 09:48 AM, Amos Jeffries wrote:
> The Squid HTTP Proxy team is very pleased to announce the availability
> of the Squid-3.3.7 release!
> 
> 
> This release is a security bug fix release resolving a vulnerability
> issue found in the prior Squid releases.
> 
> 
> The major changes to be aware of:
> 
> * Buffer Overflow vulnerability fixed
> 
> The security vulnerability SQUID-2013:2 is fixed by this release.
> 
> This vulnerability was identified from active 0-day attacks affecting
> Squid-3.2 and later versions. Upgrade or patching of existing proxy
> installations is highly recommended.
> 
> The underlying bug is preent in all Squid 2.0 and later but only
> exposed in 3.2 series. Patches are provided in the Advisory for all
> 3.x versions as a preventative measure for older versions.
> 
> 
> * Multiple SSL build issues resolved
> 
> A better fix for bug 3759 which also incorporates a fix for bug 3297
> and several other unreported bugs has been added. These bugs are
> present with OpenSSL 1.0.0* versions on some Fedora, RHEL, CentOS
> and operating system distributions derived from them.
> 
> They are visible as compile errors mentioning "const _STACK *",
> "const SSL_METHOD" and/or "sk_OPENSSL_PSTRING_value" when building
> against an affected OpenSSL library.
> 
> Other compile errors may still exist. Please contribute to the
> existing bugzilla entries or report any new issues identified in this
> version.
> 
> 
> 
>  See the ChangeLog for the full list of changes in this and earlier
>  releases.
> 
> 
>  All users are urged to upgrade to this release as soon as possible.
> 
> 
> Please remember to run "squid -k parse" when testing upgrade to a new
> version of Squid. It will audit your configuration files and report
> any identifiable issues the new release will have in your installation
> before you "press go". We are still removing the infamous "Bungled
> Config" halting points and adding checks, so if something is not
> identified please report it.
> 
> 
> 
> Please refer to the release notes at
> http://www.squid-cache.org/Versions/v3/3.3/RELEASENOTES.html
> when you are ready to make the switch to Squid-3.3
> 
> Upgrade tip:
>   "squid -k parse" is starting to display even more
>    useful hints about squid.conf changes.
> 
> This new release can be downloaded from our HTTP or FTP servers
> 
> http://www.squid-cache.org/Versions/v3/3.3/
> ftp://ftp.squid-cache.org/pub/squid/
> ftp://ftp.squid-cache.org/pub/archive/3.3/
> 
> or the mirrors. For a list of mirror sites see
> 
> http://www.squid-cache.org/Download/http-mirrors.html
> http://www.squid-cache.org/Download/mirrors.html
> 
> If you encounter any issues with this release please file a bug report.
> http://bugs.squid-cache.org/
> 
> 
> Amos Jeffries
> 





[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux