Files
buildroot/package/haproxy/haproxy.hash
Peter Korsgaard e55ff17f17 package/haproxy: security bump to version 1.9.13
Fixes the following security vulnerabilities:

- CVE-2019-19330: The HTTP/2 implementation in HAProxy before 2.0.10
  mishandles headers, as demonstrated by carriage return (CR, ASCII 0xd),
  line feed (LF, ASCII 0xa), and the zero character (NUL, ASCII 0x0), aka
  Intermediary Encapsulation Attacks (1.9.13)

- CVE-2019-14241: HAProxy through 2.0.2 allows attackers to cause a denial
  of service (ha_panic) via vectors related to
  htx_manage_client_side_cookies in proto_htx.c (1.9.9)

- CVE-2019-11323: HAProxy before 1.9.7 mishandles a reload with rotated
  keys, which triggers use of uninitialized, and very predictable, HMAC
  keys.  This is related to an include/types/ssl_sock.h error (1.9.7)

In addition, a large number of non-security related bugs have been fixed.
See the changelog for details:

https://www.haproxy.org/download/1.9/src/CHANGELOG

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-12-03 17:30:59 +01:00

6 lines
363 B
Plaintext

# Locally computed:
sha256 adae40f963b03df0917edc44681064627f77683dcf7db66ef030672ad6d00547 haproxy-1.9.13.tar.gz
sha256 0717ca51fceaa25ac9e5ccc62e0c727dcf27796057201fb5fded56a25ff6ca28 LICENSE
sha256 5df07007198989c622f5d41de8d703e7bef3d0e79d62e24332ee739a452af62a doc/lgpl.txt
sha256 ddb9db7630752f8fdc6898f7c99a99eaeeac5213627ecb093df9c82f56175dc7 doc/gpl.txt