haproxy 1.4.8-1+squeeze1 source package in Debian
Changelog
haproxy (1.4.8-1+squeeze1) squeeze-security; urgency=high * CVE-2013-1912: buffer overflow when HTTP keep-alive is enabled, using HTTP keywords in TCP inspection rules and running with rewrite rules that appends to requests. Closes: #704611. * CVE-2012-2942: buffer overflow in the trash buffer in the header capture functionality when global.tune.bufsize is set to a value greater than the default and header rewriting is enabled. Closes: #674447. * CVE-2013-2175: fix a possible crash when using negative header occurrences. -- Vincent Bernat <email address hidden> Sat, 15 Jun 2013 11:27:32 +0200
Upload details
- Uploaded by:
- Arnaud Cornet
- Uploaded to:
- Squeeze
- Original maintainer:
- Arnaud Cornet
- Architectures:
- any
- Section:
- net
- Urgency:
- Very Urgent
See full publishing history Publishing
Series | Published | Component | Section | |
---|---|---|---|---|
Squeeze | release | main | net |
Builds
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
haproxy_1.4.8-1+squeeze1.dsc | 1.7 KiB | d9f08e7c388be0accc6ded7b3bc4b4b4e6f0a1fd9d62345fceb24921f2d46076 |
haproxy_1.4.8.orig.tar.gz | 760.0 KiB | 707487ade815cbd37492d91a014f9a5b3ac313e5b4cb31e2d7c4d2a16f4a23f1 |
haproxy_1.4.8-1+squeeze1.debian.tar.gz | 13.3 KiB | f403577021ce7d845805965f31eb94d343043228322007511b4fbd3f6fd0047c |
No changes file available.