The Squid HTTP Proxy team is pleased to announce the
availability of the Squid-2.6.STABLE21 legacy maintenance release.
This release corrects several bugs found in the previous 2.6 release, including
two which may be considered security related in some installations:
* Bug #2122: Private information leakage in collapsed_forwarding
* Bug #1993: Memory leak in http_reply_access deny processing
The other major bugfixes include
* Bug #2376: Round-Robin peer selection becomes unbalanced when a peer dies and comes back
* Fix SNMP reporting of counters with a value > 0xFF800000
* Bug #2241: weights not applied properly in round-robin peer selection
* Bug #2393: DNS issues if not able to connect to the name server using TCP
* Bug #2350: Problems on Linux with newer kernel headers due to a capabilities API change
Please note that 2.6 is a legacy release and is no longer actively
maintained by the Squid project. If you can we encourage you to upgrade
to 3.0 or 2.7, the currently actively maintained releases. You should
not expect to see any further 2.6 maintenance releases from the Squid
project.
For more information about this release please refer to the release notes at
http://www.squid-cache.org/Versions/v2/2.6/RELEASENOTES.html
This new release can be downloaded from our HTTP or FTP servers
http://www.squid-cache.org/Versions/v2/2.6/
ftp://ftp.squid-cache.org/pub/squid-2/STABLE/
or the mirrors. For a list of mirror sites see
http://www.squid-cache.org/Download/http-mirrors.dyn
http://www.squid-cache.org/Download/mirrors.dyn
If you encounter any issues with this release please first upgrade to 2.7
or 3.0. If the problem persist file a bug report.
This archive was generated by hypermail 2.2.0 : Sun Jun 29 2008 - 12:00:06 MDT