danj 890b79ced3 Update to haproxy-2.3.13
"A vulnerability was found that makes it possible to abuse the
HTTP/2 parser, allowing an attacker to prepend hostnames to a
request, append top-level domains to an existing domain, and inject
invalid characters through the :method pseudo-header."
https://www.haproxy.com/blog/august-2021-haproxy-2-0-http-2-vulnerabilities-fixed/
2021-08-18 00:42:10 +00:00

3 lines
117 B
Plaintext

SHA256 (haproxy-2.3.13.tar.gz) = xlGkTxoRWAhZYupkhSqxY+DSHF7w6kssUhhyjtTb4lc=
SIZE (haproxy-2.3.13.tar.gz) = 2953437