ALT-BU-2022-7001-1
Branch sisyphus_e2k update bulletin.
Package haproxy updated to version 2.6.6-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2022-06892
Уязвимость серверного программного обеспечения HAProxy, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2022-06893
Уязвимость функции htx_add_header компонента include/haproxy/htx.h серверного программного обеспечения HAProxy, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2022-06897
Уязвимость серверного программного обеспечения HAProxy, связанная с недостатками в обработке исключительных состояний, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2022-06920
Уязвимость серверного программного обеспечения HAProxy, связанная с выполнением цикла с недоступным условием выхода, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-00287
Уязвимость метода HTTP серверного программного обеспечения HAProxy, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю оказать воздействие на целостность данных
Modified: 2024-11-21
CVE-2021-39240
An issue was discovered in HAProxy 2.2 before 2.2.16, 2.3 before 2.3.13, and 2.4 before 2.4.3. It does not ensure that the scheme and path portions of a URI have the expected characters. For example, the authority field (as observed on a target HTTP/2 server) might differ from what the routing rules were intended to achieve.
- https://git.haproxy.org/?p=haproxy.git%3Ba=commit%3Bh=4b8852c70d8c4b7e225e24eb58258a15eb54c26e
- https://git.haproxy.org/?p=haproxy.git%3Ba=commit%3Bh=4b8852c70d8c4b7e225e24eb58258a15eb54c26e
- https://git.haproxy.org/?p=haproxy.git%3Ba=commit%3Bh=a495e0d94876c9d39763db319f609351907a31e8
- https://git.haproxy.org/?p=haproxy.git%3Ba=commit%3Bh=a495e0d94876c9d39763db319f609351907a31e8
- FEDORA-2021-3ab4512c98
- FEDORA-2021-3ab4512c98
- FEDORA-2021-e6557245e8
- FEDORA-2021-e6557245e8
- DSA-4960
- DSA-4960
- https://www.mail-archive.com/haproxy%40formilux.org/msg41041.html
- https://www.mail-archive.com/haproxy%40formilux.org/msg41041.html
Modified: 2024-11-21
CVE-2021-39241
An issue was discovered in HAProxy 2.0 before 2.0.24, 2.2 before 2.2.16, 2.3 before 2.3.13, and 2.4 before 2.4.3. An HTTP method name may contain a space followed by the name of a protected resource. It is possible that a server would interpret this as a request for that protected resource, such as in the "GET /admin? HTTP/1.1 /static/images HTTP/1.1" example.
- https://git.haproxy.org/?p=haproxy.git%3Ba=commit%3Bh=89265224d314a056d77d974284802c1b8a0dc97f
- https://git.haproxy.org/?p=haproxy.git%3Ba=commit%3Bh=89265224d314a056d77d974284802c1b8a0dc97f
- FEDORA-2021-3ab4512c98
- FEDORA-2021-3ab4512c98
- FEDORA-2021-e6557245e8
- FEDORA-2021-e6557245e8
- DSA-4960
- DSA-4960
- https://www.mail-archive.com/haproxy%40formilux.org/msg41041.html
- https://www.mail-archive.com/haproxy%40formilux.org/msg41041.html
Modified: 2024-11-21
CVE-2021-39242
An issue was discovered in HAProxy 2.2 before 2.2.16, 2.3 before 2.3.13, and 2.4 before 2.4.3. It can lead to a situation with an attacker-controlled HTTP Host header, because a mismatch between Host and authority is mishandled.
- https://git.haproxy.org/?p=haproxy.git%3Ba=commit%3Bh=b5d2b9e154d78e4075db163826c5e0f6d31b2ab1
- https://git.haproxy.org/?p=haproxy.git%3Ba=commit%3Bh=b5d2b9e154d78e4075db163826c5e0f6d31b2ab1
- FEDORA-2021-3ab4512c98
- FEDORA-2021-3ab4512c98
- FEDORA-2021-e6557245e8
- FEDORA-2021-e6557245e8
- DSA-4960
- DSA-4960
- https://www.mail-archive.com/haproxy%40formilux.org/msg41041.html
- https://www.mail-archive.com/haproxy%40formilux.org/msg41041.html
Modified: 2024-11-21
CVE-2021-40346
An integer overflow exists in HAProxy 2.0 through 2.5 in htx_add_header that can be exploited to perform an HTTP request smuggling attack, allowing an attacker to bypass all configured http-request HAProxy ACLs and possibly other ACLs.
- https://git.haproxy.org/?p=haproxy.git
- https://git.haproxy.org/?p=haproxy.git
- https://github.com/haproxy/haproxy/commit/3b69886f7dcc3cfb3d166309018e6cfec9ce2c95
- https://github.com/haproxy/haproxy/commit/3b69886f7dcc3cfb3d166309018e6cfec9ce2c95
- https://jfrog.com/blog/critical-vulnerability-in-haproxy-cve-2021-40346-integer-overflow-enables-http-smuggling/
- https://jfrog.com/blog/critical-vulnerability-in-haproxy-cve-2021-40346-integer-overflow-enables-http-smuggling/
- [cloudstack-dev] 20210910 CVE-2021-40346 (haproxy 2.x)
- [cloudstack-dev] 20210910 CVE-2021-40346 (haproxy 2.x)
- [cloudstack-dev] 20210910 Re: CVE-2021-40346 (haproxy 2.x)
- [cloudstack-dev] 20210910 Re: CVE-2021-40346 (haproxy 2.x)
- FEDORA-2021-3493f9f6ab
- FEDORA-2021-3493f9f6ab
- FEDORA-2021-cd5ee418f6
- FEDORA-2021-cd5ee418f6
- DSA-4968
- DSA-4968
- https://www.mail-archive.com/haproxy%40formilux.org
- https://www.mail-archive.com/haproxy%40formilux.org
- https://www.mail-archive.com/haproxy%40formilux.org/msg41114.html
- https://www.mail-archive.com/haproxy%40formilux.org/msg41114.html
Modified: 2024-11-21
CVE-2022-0711
A flaw was found in the way HAProxy processed HTTP responses containing the "Set-Cookie2" header. This flaw could allow an attacker to send crafted HTTP response packets which lead to an infinite loop, eventually resulting in a denial of service condition. The highest threat from this vulnerability is availability.
- https://access.redhat.com/security/cve/cve-2022-0711
- https://access.redhat.com/security/cve/cve-2022-0711
- https://github.com/haproxy/haproxy/commit/bfb15ab34ead85f64cd6da0e9fb418c9cd14cee8
- https://github.com/haproxy/haproxy/commit/bfb15ab34ead85f64cd6da0e9fb418c9cd14cee8
- DSA-5102
- DSA-5102
- https://www.mail-archive.com/haproxy%40formilux.org/msg41833.html
- https://www.mail-archive.com/haproxy%40formilux.org/msg41833.html
Package gear updated to version 2.6.0-alt1 for branch sisyphus_e2k.
Closed bugs
gear uses old location for its bash completion
Package bind updated to version 9.16.34-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2022-06120
Уязвимость реализации технологии DNSSEC сервера DNS BIND, позволяющая нарушителю выполнить атаку типа «отказ в обслуживании»
BDU:2022-06121
Уязвимость реализации технологии DNSSEC сервера DNS BIND, позволяющая нарушителю выполнить атаку типа «отказ в обслуживании»
BDU:2022-06124
Уязвимость сервера DNS BIND, связанная с неправильным управлением внутренними ресурсами, позволяющая нарушителю выполнить атаку типа «отказ в обслуживании» (DoS)
Modified: 2024-11-29
CVE-2022-2795
By flooding the target resolver with queries exploiting this flaw an attacker can significantly impair the resolver's performance, effectively denying legitimate clients access to the DNS resolution service.
- [oss-security] 20220921 ISC has disclosed six vulnerabilities in BIND (CVE-2022-2795, CVE-2022-2881, CVE-2022-2906, CVE-2022-3080, CVE-2022-38177, CVE-2022-38178)
- [oss-security] 20220921 ISC has disclosed six vulnerabilities in BIND (CVE-2022-2795, CVE-2022-2881, CVE-2022-2906, CVE-2022-3080, CVE-2022-38177, CVE-2022-38178)
- https://kb.isc.org/docs/cve-2022-2795
- https://kb.isc.org/docs/cve-2022-2795
- [debian-lts-announce] 20221005 [SECURITY] [DLA 3138-1] bind9 security update
- [debian-lts-announce] 20221005 [SECURITY] [DLA 3138-1] bind9 security update
- FEDORA-2022-ef038365de
- FEDORA-2022-ef038365de
- FEDORA-2022-8268735e06
- FEDORA-2022-8268735e06
- FEDORA-2022-b197d64471
- FEDORA-2022-b197d64471
- GLSA-202210-25
- GLSA-202210-25
- https://security.netapp.com/advisory/ntap-20241129-0002/
- DSA-5235
- DSA-5235
Modified: 2024-11-21
CVE-2022-38177
By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.
- [oss-security] 20220921 ISC has disclosed six vulnerabilities in BIND (CVE-2022-2795, CVE-2022-2881, CVE-2022-2906, CVE-2022-3080, CVE-2022-38177, CVE-2022-38178)
- https://kb.isc.org/docs/cve-2022-38177
- [debian-lts-announce] 20221005 [SECURITY] [DLA 3138-1] bind9 security update
- FEDORA-2022-ef038365de
- FEDORA-2022-8268735e06
- FEDORA-2022-b197d64471
- GLSA-202210-25
- https://security.netapp.com/advisory/ntap-20221228-0010/
- DSA-5235
- [oss-security] 20220921 ISC has disclosed six vulnerabilities in BIND (CVE-2022-2795, CVE-2022-2881, CVE-2022-2906, CVE-2022-3080, CVE-2022-38177, CVE-2022-38178)
- DSA-5235
- https://security.netapp.com/advisory/ntap-20221228-0010/
- GLSA-202210-25
- FEDORA-2022-b197d64471
- FEDORA-2022-8268735e06
- FEDORA-2022-ef038365de
- [debian-lts-announce] 20221005 [SECURITY] [DLA 3138-1] bind9 security update
- https://kb.isc.org/docs/cve-2022-38177
Modified: 2024-11-21
CVE-2022-38178
By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.
- [oss-security] 20220921 ISC has disclosed six vulnerabilities in BIND (CVE-2022-2795, CVE-2022-2881, CVE-2022-2906, CVE-2022-3080, CVE-2022-38177, CVE-2022-38178)
- https://kb.isc.org/docs/cve-2022-38178
- [debian-lts-announce] 20221005 [SECURITY] [DLA 3138-1] bind9 security update
- FEDORA-2022-ef038365de
- FEDORA-2022-8268735e06
- FEDORA-2022-b197d64471
- GLSA-202210-25
- https://security.netapp.com/advisory/ntap-20221228-0009/
- DSA-5235
- [oss-security] 20220921 ISC has disclosed six vulnerabilities in BIND (CVE-2022-2795, CVE-2022-2881, CVE-2022-2906, CVE-2022-3080, CVE-2022-38177, CVE-2022-38178)
- DSA-5235
- https://security.netapp.com/advisory/ntap-20221228-0009/
- GLSA-202210-25
- FEDORA-2022-b197d64471
- FEDORA-2022-8268735e06
- FEDORA-2022-ef038365de
- [debian-lts-announce] 20221005 [SECURITY] [DLA 3138-1] bind9 security update
- https://kb.isc.org/docs/cve-2022-38178
Closed bugs
Package gmp updated to version 6.2.1-alt5 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2022-05776
Уязвимость компонента mpz/inp_raw.c библиотеки арифметических операций GMP на 32-разрядных платформах, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-43618
GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.
- 20221016 Re: over 2000 packages depend on abort()ing libgmp
- 20221016 Re: over 2000 packages depend on abort()ing libgmp
- [oss-security] 20221013 Re: sagemath denial of service with abort() in gmp: overflow in mpz type
- [oss-security] 20221013 Re: sagemath denial of service with abort() in gmp: overflow in mpz type
- https://bugs.debian.org/994405
- https://bugs.debian.org/994405
- https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
- https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
- https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
- https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
- [debian-lts-announce] 20211202 [SECURITY] [DLA 2837-1] gmp security update
- [debian-lts-announce] 20211202 [SECURITY] [DLA 2837-1] gmp security update
- GLSA-202309-13
- GLSA-202309-13
- https://security.netapp.com/advisory/ntap-20221111-0001/
- https://security.netapp.com/advisory/ntap-20221111-0001/