Update to haproxy-2.3.13

"A vulnerability was found that makes it possible to abuse the
HTTP/2 parser, allowing an attacker to prepend hostnames to a
request, append top-level domains to an existing domain, and inject
invalid characters through the :method pseudo-header."
https://www.haproxy.com/blog/august-2021-haproxy-2-0-http-2-vulnerabilities-fixed/
This commit is contained in:
danj 2021-08-18 00:42:10 +00:00
parent 67c8d1cb10
commit 890b79ced3
2 changed files with 4 additions and 4 deletions

View File

@ -1,8 +1,8 @@
# $OpenBSD: Makefile,v 1.81 2021/07/31 19:31:44 danj Exp $
# $OpenBSD: Makefile,v 1.82 2021/08/18 00:42:10 danj Exp $
COMMENT = reliable, high performance TCP/HTTP load balancer
DISTNAME = haproxy-2.3.12
DISTNAME = haproxy-2.3.13
CATEGORIES = net www
HOMEPAGE = https://www.haproxy.org/
MAINTAINER = Daniel Jakots <obsd@chown.me>

View File

@ -1,2 +1,2 @@
SHA256 (haproxy-2.3.12.tar.gz) = aEZw1x/+GrPwv9G+DlXqnZMnMggd0BhYueNRwakJvj4=
SIZE (haproxy-2.3.12.tar.gz) = 2950703
SHA256 (haproxy-2.3.13.tar.gz) = xlGkTxoRWAhZYupkhSqxY+DSHF7w6kssUhhyjtTb4lc=
SIZE (haproxy-2.3.13.tar.gz) = 2953437