Package haproxy-2.4.22-4.el9.aarch64
Name | haproxy |
---|---|
Epoch | 0 |
Version | 2.4.22 |
Release | 4.el9 |
Architecture | aarch64 |
Website/URL | http://www.haproxy.org/ |
License | GPLv2+ |
Build Time | 2025-03-31 13:12:57 |
Build Host | builder-arm64-1.inferitos.ru |
Summary | HAProxy reverse proxy for high availability environments |
Repositories | AppStream |
Description | HAProxy is a TCP/HTTP reverse proxy which is particularly suited for high availability environments. Indeed, it can: - route HTTP requests depending on statically assigned cookies - spread load among several servers while assuring server persistence through the use of HTTP cookies - switch to backup servers in the event a main one fails - accept connections to special ports dedicated to service monitoring - stop accepting connections without breaking existing ones - add, modify, and delete HTTP headers in both directions - block requests matching particular patterns - report detailed status to authenticated users from a URI intercepted from the application |
Errata | — |
Size | 2239 KiB |
Source Project | haproxy-2.4.22-4.el9 |
SHA-256 checksum | aa2c927beb161becf7d6c9046c73bf86cd5b98968a687c8172c94cc3dd10195d |
×
* Mon Jan 06 2025 Oyvind Albrigtsen <oalbrigt@redhat.com> - 2.4.22-4 - Always clear retry flags in read/write functions to avoid CPU usage spikes - Fix "unable to load certificate chain from file" issue Resolves: RHEL-71925, RHEL-68780 * Tue Jan 23 2024 Ryan O'Hara <rohara@redhat.com> - 2.4.22-3 - Reject "#" as part of URI path component (CVE-2023-45539, RHEL-18169) * Wed Jan 17 2024 Ryan O'Hara <rohara@redhat.com> - 2.4.22-2 - Reject any empty content-length header value (CVE-2023-40225, RHEL-7736) * Tue Jun 06 2023 Ryan O'Hara <rohara@redhat.com> - 2.4.22-1 - Update to 2.4.22 (#2196530) * Tue May 02 2023 Ryan O'Hara <rohara@redhat.com> - 2.4.17-7 - Fix uninitizalized resevered bytes (CVE-2023-0836, #2180861) * Fri Apr 14 2023 MSVSphere Packaging Team <packager@msvsphere.ru> - 2.4.17-6 - Rebuilt for MSVSphere 9.2 beta * Mon Feb 27 2023 Ryan O'Hara <rohara@redhat.com> - 2.4.17-6 - Reject empty http header field names (CVE-2023-25725, #2169510) * Mon Feb 27 2023 Ryan O'Hara <rohara@redhat.com> - 2.4.17-5 - Refuse interim responses with end-stream flag set (CVE-2023-0056, #2161140)