+Changes to squid-3.2.0.19 (02 Aug 2012):
+
+ - Regression Bug 3580: IDENT request makes squid crash
+ - Regression Bug 3577: File Descriptors not properly closed
+ - Regression Bug 3478: Allow peer selection and connection auth on intercepted traffic
+ - Regression Fix: Restore memory caching ability
+ - Bug 3556 Workaround: epoll assertion failed: comm.cc:1093: isOpen(fd)
+ - Bug 3551: store_rebuild.cc:116: "store_errors == 0" assertion
+ - Bug 3525: Do not resend nibbled PUTs and avoid "mustAutoConsume" assertion.
+ - Avoid bogus "Disk space over limit" warnings when rebuidling dirty ufs index
+ - Support custom headers in [request|reply]_header_* manglers
+ - ... and much code polishing
+
Changes to squid-3.2.0.18 (29 Jun 2012):
- Bug 3576: ICY streams being Transfer-Encoding:chunked
<!doctype linuxdoc system>
<article>
-<title>Squid 3.2.0.18 release notes</title>
+<title>Squid 3.2.0.19 release notes</title>
<author>Squid Developers</author>
<abstract>
<sect>Notice
<p>
-The Squid Team are pleased to announce the release of Squid-3.2.0.18 for testing.
+The Squid Team are pleased to announce the release of Squid-3.2.0.19 for testing.
This new release is available for download from <url url="http://www.squid-cache.org/Versions/v3/3.2/"> or the <url url="http://www.squid-cache.org/Mirrors/http-mirrors.html" name="mirrors">.
<p>
Although this release is deemed good enough for use in many setups, please note the existence of <url url="http://bugs.squid-cache.org/buglist.cgi?query_format=advanced&short_desc_type=allwordssubstr&short_desc=&target_milestone=3.2&long_desc_type=allwordssubstr&long_desc=&bug_file_loc_type=allwordssubstr&bug_file_loc=&status_whiteboard_type=allwordssubstr&status_whiteboard=&bug_status=NEW&bug_status=ASSIGNED&bug_status=REOPENED&emailtype1=substring&email1=&emailtype2=substring&email2=&bugidtype=include&bug_id=&votes=&chfieldfrom=&chfieldto=Now&chfieldvalue=&cmdtype=doit&order=bugs.bug_severity&field0-0-0=noop&type0-0-0=noop&value0-0-0=" name="open bugs against Squid-3.2">.
+<p>Some issues to note as currently known in this release which are not able to be fixed in the 3.2 series are:
+
+<itemize>
+ <item>CVE-2009-0801 : interception proxies cannot relay certain requests to peers safely. see the CVE section below for details.
+ <item>TCP logging of access.log does not recover from broken connections well.
+</itemize>
+
<p>Currently known issues which only depends on available developer time and may still be resolved in a future 3.2 release are:
<itemize>
- <item>CVE-2009-0801 : interception proxies cannot relay certain requests to peers. see the CVE section below for details.
<item>SMP Support still has a number of important bugs needing to be resolved. see the bugs list above for details.
<item>Windows support is still incomplete.
- <item>TCP logging of access.log does not recover from broken connections well.
<item>The lack of some features available in Squid-2.x series. See the regression sections below for full details.
</itemize>
<p>The most important of these new features are:
<itemize>
- <item>Fixed CVE-2009-0801 : NAT interception vulnerability to malicious clients.
+ <item>CVE-2009-0801 : NAT interception vulnerability to malicious clients.
<item>SMP scalability
<item>Helper Multiplexer and On-Demand
<item>Helper Name Changes
Most user-facing changes are reflected in squid.conf (see below).
-<sect1>Fixed CVE-2009-0801 : NAT interception vulnerability to malicious clients.
+<sect1>CVE-2009-0801 : NAT interception vulnerability to malicious clients.
<p>Details in Advisory <url url="http://www.squid-cache.org/Advisories/SQUID-2011_1.txt" name="SQUID-2011:1">
<p>Squid locates the authority-URL details available in an HTTP request as
can not be used as feeder gateways into a cluster or peer hierarchy without strict validation.
<p>Known Issue: When non-strict validation fails Squid will relay the request, but can only do
- so to the orginal destination IP the client was contacting. This means that interception
- proxy Squid are unable to pass traffic reliably to peers in a cache hierarchy.
+ so safely to the orginal destination IP the client was contacting. The client original
+ destinatio IP is lost when relayign to peers in a hierarchy. This means the upstream peers
+ are at risk of cache poisoning from CVE-2009-0801 vulnerability.
Developer time is required to implement safe transit of these requests.
Please contact squid-dev if you are able to assist or sponsor the development.