From: Kunal Gangakhedkar
Signed-off-by: Kunal Gangakhedkar
---
doc/configuration.txt | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/doc/configuration.txt b/doc/configuration.txt
index 556e97731..0ee901c04 100644
--- a/doc/configuration.txt
+++ b/doc/configuration.txt
Hi,
here a little patch proposal.
Thanks in advance.
From 30a530f3b352e907a3dd9daebfda2bb94dccbdbc Mon Sep 17 00:00:00 2001
From: David Carlier
Date: Tue, 17 Aug 2021 08:44:25 +0100
Subject: [PATCH] BUILD: tools: get the absolute path of the current binary on
NetBSD.
NetBSD stores the
Hi David,
On Tue, Aug 17, 2021 at 08:49:29AM +0100, David CARLIER wrote:
> Hi,
>
> here a little patch proposal.
Applied, thank you!
Willy
On Wed, Aug 04, 2021 at 09:17:21AM +0200, PR Bot wrote:
> Dear list!
>
> Author: Jonathon Lacher <6679714+jonathonlac...@users.noreply.github.com>
> Number of patches: 1
>
> This is an automated relay of the Github pull request:
>DOC/MINOR: fix typo in management document
>
> Patch
Hi Marcin,
On Mon, Aug 16, 2021 at 01:55:02PM +0200, Marcin Deranek wrote:
> Hi,
>
> Do you have any update on merging this?
Sorry, I think we've missed it :-( Worse, I was wondering if you
managed to make any progress on it :-/
I'm currently working on preparing a set of stable branches,
looks good, now applied, thank you!
Willy
Hi Alex,
On Tue, Aug 17, 2021 at 02:19:38PM +0200, Aleksandar Lazic wrote:
> ```
> 3424 if ((curproxy->mode != PR_MODE_HTTP) &&
> (curproxy->options & PR_O_REUSE_MASK) != PR_O_REUSE_NEVR)
> 3425 curproxy->options &= ~PR_O_REUSE_MASK;
> ```
Hi,
HAProxy 2.5-dev4 was released on 2021/08/17. It added 82 new commits
after version 2.5-dev3.
This version was expected to be emitted last week but was slightly
delayed so that it contains the final fixes for the H2 vulnerabilities
reported by Tim that were described in previous message, and
Hi everyone,
HAProxy is affected by 4 vulnerabilities in its HTTP/2 implementation in
recent versions (starting with 2.0). Three of them are considered as having
a moderate impact as they only affect the interpretation of the authority
(Host header field) in H2->H2 communications in versions 2.2
Hi,
HAProxy 2.0.24 was released on 2021/08/17. It added 18 new commits
after version 2.0.23.
This version contains the fixes for the H2 vulnerabilities reported by
Tim that were described in previous message, and which allows to abuse
the H2 ":method" pseudo-header to forge some malformed HTTP/1
Hi,
same as earlier but for FreeBSD this time.
Thanks.
From 07be546638949864ef678b0e39871b7febceeaed Mon Sep 17 00:00:00 2001
From: DC
Date: Tue, 17 Aug 2021 12:55:49 +0100
Subject: [PATCH] BUILD: tools: get the absolute path of the current binary on
FreeBSD. FreeBSD stores the absolute path
Hi.
In the doc is this part
http://cbonte.github.io/haproxy-dconv/2.4/configuration.html#4-http-reuse
```
By default, a connection established between HAProxy and the backend server
which is considered safe for reuse is moved back to the server's idle
connections pool so that any other request
Hi,
HAProxy 2.2.16 was released on 2021/08/17. It added 29 new commits
after version 2.2.15.
This version contains the fixes for the H2 vulnerabilities reported by
Tim that were described in previous message, and which affect Host name
consistency with H2 backend servers when Host and :authority
Hi,
HAProxy 2.4.3 was released on 2021/08/17. It added 46 new commits
after version 2.4.2.
This version contains the fixes for the H2 vulnerabilities reported by
Tim that were described in previous message, and which affect Host name
consistency with H2 backend servers when Host and :authority
Hi,
HAProxy 2.3.13 was released on 2021/08/17. It added 31 new commits
after version 2.3.12.
This version contains the fixes for the H2 vulnerabilities reported by
Tim that were described in previous message, and which affect Host name
consistency with H2 backend servers when Host and :authority
Vincent,
On 8/17/21 5:49 PM, Vincent Bernat wrote:
For users of haproxy.debian.net or Launchpad PPA, the vulnerabilities
are fixed by patching the previous versions. Launchpad PPA builders are
still running but it should be available in the next hour. I will upload
the new versions later this
On Tue, Aug 17, 2021 at 06:57:28PM +0200, Tim Düsterhus wrote:
> Hi Willy, Everyone,
>
> On 8/17/21 5:13 PM, Willy Tarreau wrote:
> > 2) Domain parts in ":scheme" and ":path"
> >
> > [...] As such HTTP/1 servers are safe and only HTTP/2 servers are exposed.
>
> I'd like to clarify that the
Hi Willy, Everyone,
On 8/17/21 5:13 PM, Willy Tarreau wrote:
2) Domain parts in ":scheme" and ":path"
[...] As such HTTP/1 servers are safe and only HTTP/2 servers are exposed.
I'd like to clarify that the above statement is not true. The issue also
affects H2->HAProxy->H1 connections. It
❦ 17 August 2021 17:13 +02, Willy Tarreau:
> HAProxy is affected by 4 vulnerabilities in its HTTP/2 implementation in
> recent versions (starting with 2.0). Three of them are considered as having
> a moderate impact as they only affect the interpretation of the authority
> (Host header field) in
On Tue, Aug 17, 2021 at 05:56:15PM +0200, Tim Düsterhus wrote:
> Vincent,
>
> On 8/17/21 5:49 PM, Vincent Bernat wrote:
> > For users of haproxy.debian.net or Launchpad PPA, the vulnerabilities
> > are fixed by patching the previous versions. Launchpad PPA builders are
> > still running but it
20 matches
Mail list logo