ALT-BU-2019-3416-1
Branch sisyphus update bulletin.
Closed bugs
The FPGA build is not compatible with the host code build
Closed vulnerabilities
BDU:2020-03308
Уязвимость компонента dns.c сетевого программного обеспечения HAProxy, связанная с выполнением цикла с недоступным условием выхода, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-03309
Уязвимость функции dns_validate_dns_response компонента dns.c сетевого программного обеспечения HAProxy, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2021-01442
Уязвимость HPACK декодера серверного программного обеспечения HAProxy, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-14645
A flaw was discovered in the HPACK decoder of HAProxy, before 1.8.14, that is used for HTTP/2. An out-of-bounds read access in hpack_valid_idx() resulted in a remote crash and denial of service.
- RHBA-2019:0028
- RHSA-2018:2882
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14645
- USN-3780-1
- [haproxy] 20180920 [ANNOUNCE] haproxy-1.8.14 - Security Update
- RHBA-2019:0028
- [haproxy] 20180920 [ANNOUNCE] haproxy-1.8.14 - Security Update
- USN-3780-1
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14645
- RHSA-2018:2882
Modified: 2024-11-21
CVE-2018-20102
An out-of-bounds read in dns_validate_dns_response in dns.c was discovered in HAProxy through 1.8.14. Due to a missing check when validating DNS responses, remote attackers might be able read the 16 bytes corresponding to an AAAA record from the non-initialized part of the buffer, possibly accessing anything that was left on the stack, or even past the end of the 8193-byte buffer, depending on the value of accepted_payload_size.
- http://git.haproxy.org/?p=haproxy.git%3Ba=commit%3Bh=efbbdf72992cd20458259962346044cafd9331c0
- http://git.haproxy.org/?p=haproxy.git%3Ba=commit%3Bh=efbbdf72992cd20458259962346044cafd9331c0
- 106223
- 106223
- RHBA-2019:0326
- RHBA-2019:0326
- RHBA-2019:0327
- RHBA-2019:0327
- RHSA-2019:1436
- RHSA-2019:1436
- [debian-lts-announce] 20220530 [SECURITY] [DLA 3034-1] haproxy security update
- [debian-lts-announce] 20220530 [SECURITY] [DLA 3034-1] haproxy security update
- USN-3858-1
- USN-3858-1
Modified: 2024-11-21
CVE-2018-20103
An issue was discovered in dns.c in HAProxy through 1.8.14. In the case of a compressed pointer, a crafted packet can trigger infinite recursion by making the pointer point to itself, or create a long chain of valid pointers resulting in stack exhaustion.
- http://git.haproxy.org/?p=haproxy.git%3Ba=commit%3Bh=58df5aea0a0c926b2238f65908f5e9f83d1cca25
- http://git.haproxy.org/?p=haproxy.git%3Ba=commit%3Bh=58df5aea0a0c926b2238f65908f5e9f83d1cca25
- 106280
- 106280
- RHBA-2019:0326
- RHBA-2019:0326
- RHBA-2019:0327
- RHBA-2019:0327
- RHSA-2019:1436
- RHSA-2019:1436
- [debian-lts-announce] 20220530 [SECURITY] [DLA 3034-1] haproxy security update
- [debian-lts-announce] 20220530 [SECURITY] [DLA 3034-1] haproxy security update
- USN-3858-1
- USN-3858-1