haproxy 1.4.8-1+squeeze1 source package in Debian

Changelog

haproxy (1.4.8-1+squeeze1) squeeze-security; urgency=high


  * CVE-2013-1912: buffer overflow when HTTP keep-alive is enabled, using
    HTTP keywords in TCP inspection rules and running with rewrite rules
    that appends to requests. Closes: #704611.
  * CVE-2012-2942: buffer overflow in the trash buffer in the header
    capture functionality when global.tune.bufsize is set to a value
    greater than the default and header rewriting is enabled.
    Closes: #674447.
  * CVE-2013-2175: fix a possible crash when using negative header
    occurrences.

 -- Vincent Bernat <email address hidden>  Sat, 15 Jun 2013 11:27:32 +0200

Upload details

Uploaded by:
Arnaud Cornet
Uploaded to:
Squeeze
Original maintainer:
Arnaud Cornet
Architectures:
any
Section:
net
Urgency:
Very Urgent

See full publishing history Publishing

Series Pocket Published Component Section
Squeeze release main net

Builds

Downloads

File Size SHA-256 Checksum
haproxy_1.4.8-1+squeeze1.dsc 1.7 KiB d9f08e7c388be0accc6ded7b3bc4b4b4e6f0a1fd9d62345fceb24921f2d46076
haproxy_1.4.8.orig.tar.gz 760.0 KiB 707487ade815cbd37492d91a014f9a5b3ac313e5b4cb31e2d7c4d2a16f4a23f1
haproxy_1.4.8-1+squeeze1.debian.tar.gz 13.3 KiB f403577021ce7d845805965f31eb94d343043228322007511b4fbd3f6fd0047c

No changes file available.

Binary packages built by this source