SHA256
1
0
forked from pool/haproxy
Go to file
Kristoffer Gronlund 37083beefe Accepting request 658884 from home:KGronlund:branches:server:http
- Update to version 1.8.15~git0.6b6a350a: (bsc#1119419) (CVE-2018-20103) (VUL-0) (bsc#1119368) (CVE-2018-20102)
  * DOC: Update configuration doc about the maximum number of stick counters.
  * BUG: dns: Fix off-by-one write in dns_validate_dns_response()
  * BUG: dns: Fix out-of-bounds read via signedness error in dns_validate_dns_response()
  * BUG: dns: Prevent out-of-bounds read in dns_validate_dns_response()
  * BUG: dns: Prevent out-of-bounds read in dns_read_name()
  * BUG: dns: Prevent stack-exhaustion via recursion loop in dns_read_name
  * DOC: refer to check-sni in the documentation of sni
  * DOC: clarify that check-sni needs an argument.
  * MINOR: servers: Free [idle|safe|priv]_conns on exit.
  * MINOR: stats: report the number of active jobs and listeners in "show info"
  * BUG/MINOR: mux-h2: advertise a larger connection window size
  * BUG/MINOR: mux-h2: refrain from muxing during the preface
  * BUG/MINOR: hpack: fix off-by-one in header name encoding length calculation
  * BUG/MEDIUM: sample: Don't treat SMP_T_METH as SMP_T_STR.
  * BUG/MINOR: lb-map: fix unprotected update to server's score
  * BUG/MINOR: cfgparse: Fix the call to post parser of the last sections parsed
  * BUG/MINOR: cfgparse: Fix transition between 2 sections with the same name
  * BUG/MINOR: ssl: ssl_sock_parse_clienthello ignores session id
  * BUG/MEDIUM: hpack: fix encoding of "accept-ranges" field
  * BUG/MINOR: config: Copy default error messages when parsing of a backend starts
  * BUG/MEDIUM: Make sure stksess is properly aligned.
  * BUG/MINOR: config: better detect the presence of the h2 pattern in npn/alpn
  * BUG/MEDIUM: auth/threads: use of crypt() is not thread-safe
  * BUG/MAJOR: http: http_txn_get_path() may deference an inexisting buffer
  * BUG/MINOR: only auto-prefer last server if lb-alg is non-deterministic
  * BUG/MINOR: only mark connections private if NTLM is detected
  * DOC: cache: Missing information about "total-max-size"
  * BUG/MINOR: ssl: Wrong usage of shctx_init().
  * BUG/MINOR: cache: Wrong usage of shctx_init().

OBS-URL: https://build.opensuse.org/request/show/658884
OBS-URL: https://build.opensuse.org/package/show/server:http/haproxy?expand=0&rev=178
2018-12-17 10:05:47 +00:00
_service Accepting request 658884 from home:KGronlund:branches:server:http 2018-12-17 10:05:47 +00:00
_servicedata Accepting request 658884 from home:KGronlund:branches:server:http 2018-12-17 10:05:47 +00:00
.gitattributes Accepting request 203204 from network:ha-clustering:Factory 2013-10-15 08:42:00 +00:00
.gitignore Accepting request 203204 from network:ha-clustering:Factory 2013-10-15 08:42:00 +00:00
haproxy-1.6.0_config_haproxy_user.patch - update to 1.6.0 2015-10-15 09:38:17 +00:00
haproxy-1.6.0-makefile_lib.patch - update to 1.6.5 2016-05-10 14:53:24 +00:00
haproxy-1.6.0-sec-options.patch - update to 1.6.5 2016-05-10 14:53:24 +00:00
haproxy-1.8.15~git0.6b6a350a.tar.gz Accepting request 658884 from home:KGronlund:branches:server:http 2018-12-17 10:05:47 +00:00
haproxy-rpmlintrc Accepting request 203204 from network:ha-clustering:Factory 2013-10-15 08:42:00 +00:00
haproxy.cfg - update to 1.6.0 2015-10-15 09:38:17 +00:00
haproxy.changes Accepting request 658884 from home:KGronlund:branches:server:http 2018-12-17 10:05:47 +00:00
haproxy.init Accepting request 333662 from server:http 2015-09-27 06:40:21 +00:00
haproxy.spec Accepting request 658884 from home:KGronlund:branches:server:http 2018-12-17 10:05:47 +00:00
local.usr.sbin.haproxy.apparmor Accepting request 238588 from network:ha-clustering:Factory 2014-06-25 13:24:23 +00:00
usr.sbin.haproxy.apparmor Accepting request 546033 from home:darix:branches:server:http 2017-11-27 15:03:06 +00:00