[ Все 3 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
×

Пакет haproxy-2.8.14-1.el9_7.1.aarch64 download

Имя haproxy
Эпоха 0
Версия 2.8.14
Релиз 1.el9_7.1
Архитектура aarch64
Сайт http://www.haproxy.org/
Лицензия GPLv2+
Время сборки 2025-11-19 09:05:24
Хост сборки builder-arm64-1.inferitos.ru
Краткое описание HAProxy reverse proxy for high availability environments
Репозитории AppStream
Полное описание HAProxy is a TCP/HTTP reverse proxy which is particularly suited for high availability environments. Indeed, it can: - route HTTP requests depending on statically assigned cookies - spread load among several servers while assuring server persistence through the use of HTTP cookies - switch to backup servers in the event a main one fails - accept connections to special ports dedicated to service monitoring - stop accepting connections without breaking existing ones - add, modify, and delete HTTP headers in both directions - block requests matching particular patterns - report detailed status to authenticated users from a URI intercepted from the application
Эррата INFSA-2025:21693
Размер 2549 КиБ
Исходный проект haproxy-2.8.14-1.el9_7.1
Контрольная сумма SHA-256 3a12f73868ce1108a2847909e0d558261a80d07d75b4f318a56ac47d3f23a569
× Full screenshot
История изменений link
* Thu Nov 06 2025 Oyvind Albrigtsen <oalbrigt@redhat.com> - 2.8.14-1.1
- Fix denial of service vulnerability in mjson library (CVE-2025-11230)
  Resolves: RHEL-126664

* Mon Apr 07 2025 Oyvind Albrigtsen <oalbrigt@redhat.com> - 2.8.14-1
- Rebase to 2.8.14
  Resolves: RHEL-74039

* Mon Jan 06 2025 Oyvind Albrigtsen <oalbrigt@redhat.com> - 2.4.22-4
- Always clear retry flags in read/write functions to avoid CPU
  usage spikes
- Fix "unable to load certificate chain from file" issue
  Resolves: RHEL-71925, RHEL-68780

* Tue Jan 23 2024 Ryan O'Hara <rohara@redhat.com> - 2.4.22-3
- Reject "#" as part of URI path component (CVE-2023-45539, RHEL-18169)

* Wed Jan 17 2024 Ryan O'Hara <rohara@redhat.com> - 2.4.22-2
- Reject any empty content-length header value (CVE-2023-40225, RHEL-7736)