[ Все 3 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
×

Пакет varnish-6.0.13-1.module+el8.9.0+134+3d61e668.x86_64 download

Имя varnish
Эпоха 0
Версия 6.0.13
Релиз 1.module+el8.9.0+134+3d61e668
Архитектура x86_64
Сайт https://www.varnish-cache.org/
Лицензия BSD
Время сборки 2024-05-08 09:47:55
Хост сборки builder-x86-03.inferitos.ru
Краткое описание High-performance HTTP accelerator
Репозитории AppStream
Полное описание This is Varnish Cache, a high-performance HTTP accelerator. Varnish Cache stores web pages in memory so web servers don’t have to create the same web page over and over again. Varnish Cache serves pages much faster than any application server; giving the website a significant speed up. Documentation wiki and additional information about Varnish Cache is available on: https://www.varnish-cache.org/
Эррата
Размер 1032 КиБ
Исходный проект varnish-6.0.13-1.module+el8.9.0+134+3d61e668
Контрольная сумма SHA-256 1d36f0d8e5a72abba688bcc53a4d1da25a280de5fff518aae956cf9749cb9dc2
Module varnish-6-8090020240508063426.5286eb5f
× Full screenshot
История изменений link
* Thu Mar 28 2024 Luboš Uhliarik <luhliari@redhat.com> - 6.0.13-1
- new version 6.0.13
- Resolves: RHEL-30378 - varnish:6/varnish: HTTP/2 Broken Window Attack may
  result in denial of service (CVE-2024-30156)

* Tue Dec 12 2023 MSVSphere Packaging Team <packager@msvsphere-os.ru> - 6.0.8-1.1
- Rebuilt for MSVSphere 8.8

* Tue Feb 01 2022 Luboš Uhliarik <luhliari@redhat.com> - 6.0.8-1.1
- Resolves: #2047648 - CVE-2022-23959 varnish:6/varnish: Varnish HTTP/1 Request
  Smuggling Vulnerability

* Thu Jul 22 2021 Luboš Uhliarik <luhliari@redhat.com> - 6.0.8-1
- new version 6.0.8
- Resolves: #1982862 - CVE-2021-36740 varnish:6/varnish: HTTP/2 request
  smuggling attack via a large Content-Length header for a POST request

* Tue Apr 14 2020 Lubos Uhliarik <luhliari@redhat.com> - 6.0.6-2
- new version 6.0.6
- Resolves: #1795673 - RFE: rebase varnish:6 to latest 6.0.x LTS
- Resolves: #1790907 - CVE-2019-20637 varnish: not clearing pointer between two
  client requests leads to information disclosure
- Resolves: #1763958 - CVE-2019-15892 varnish:6/varnish: denial of service 
  handling certain crafted HTTP/1 requests

* Mon Oct 08 2018 Lubos Uhliarik <luhliari@redhat.com> - 6.0.2-1
- new version 6.0.2 (#1633338)

* Wed Aug 01 2018 Luboš Uhliarik <luhliari@redhat.com> - 6.0.0-3
- Resolves: #1591765 - varnish: Remove dependency on jemalloc

* Sat Jul 14 2018 Fedora Release Engineering <releng@fedoraproject.org> - 6.0.0-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild

* Wed Apr 25 2018 Ingvar Hagelund <ingvar@redpill-linpro.com> - 6.0.0-1
- New upstream release
- Added a patch that fixes _FORTIFY_SOURCE=2 on copr/el6
- Added a patch fixing compilation on epel6
- Fresh checkout of pkg-varnish-cache
- Updated find-requires sed fix to update variant and moved it to prep
- Removed -libs subpackage
- varnish_reload_vcl changed name to varnishreload, as in upstream
- varnish.params is gone. To override startup configuration,
  use /etc/systemd/system/varnish.service
- Dropped patch and sed fixes for find-provides, as it is fixed upstream
- Dropped patch for test vsv00002, as it is fixed upstream
- Droppet patch for python3, as it is included upstream
- Dropped buildreq on groff, as tarball includes prebuilt manpages
- Dropped systemv to systemd helpers
- Updated project url
- Use prebuilt html files for docs subpackage
- Dropped unnecessary explicit require of initscripts, closes #1592398

* Wed Mar 28 2018 Joe Orton <jorton@redhat.com> - 5.2.1-5
- add conditional build support for Python 3