The Squid HTTP Proxy team is pleased to announce the
availability of the Squid-2.6.STABLE21 legacy maintenance release.

This release corrects several bugs found in the previous 2.6 release, including
two which may be considered security related in some installations:

 * Bug #2122: Private information leakage in collapsed_forwarding
 * Bug #1993: Memory leak in http_reply_access deny processing

The other major bugfixes include

 * Bug #2376: Round-Robin peer selection becomes unbalanced when a peer dies 
and comes back
 * Fix SNMP reporting of counters with a value > 0xFF800000
 * Bug #2241: weights not applied properly in round-robin peer selection
 * Bug #2393: DNS issues if not able to connect to the name server using TCP
 * Bug #2350: Problems on Linux with newer kernel headers due to a capabilities 
API change

Please note that 2.6 is a legacy release and is no longer actively
maintained by the Squid project. If you can we encourage you to upgrade
to 3.0 or 2.7, the currently actively maintained releases. You should
not expect to see any further 2.6 maintenance releases from the Squid
project.

For more information about this release please refer to the release notes at
http://www.squid-cache.org/Versions/v2/2.6/RELEASENOTES.html

This new release can be downloaded from our HTTP or FTP servers

      http://www.squid-cache.org/Versions/v2/2.6/
      ftp://ftp.squid-cache.org/pub/squid-2/STABLE/

or the mirrors. For a list of mirror sites see

      http://www.squid-cache.org/Download/http-mirrors.dyn
      http://www.squid-cache.org/Download/mirrors.dyn

If you encounter any issues with this release please first upgrade to 2.7
or 3.0. If the problem persist file a bug report.

      http://bugs.squid-cache.org/


Attachment: signature.asc
Description: This is a digitally signed message part

Reply via email to