ALT-BU-2023-5171-1
Branch c9f2 update bulletin.
Closed vulnerabilities
BDU:2020-02035
Уязвимость функции hpack_dht_insert (hpack-tbl.c) библиотеки сетевого программного обеспечения HAProxy, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании или оказать воздействие на целостность данных
BDU:2022-06893
Уязвимость функции htx_add_header компонента include/haproxy/htx.h серверного программного обеспечения HAProxy, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2023-00287
Уязвимость метода HTTP серверного программного обеспечения HAProxy, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2023-00758
Уязвимость серверного программного обеспечения HAProxy, связанная с недостатками обработки HTTP-запросов, позволяющая нарушителю выполнять атаку «контрабанда HTTP-запросов»
BDU:2023-04833
Уязвимость серверного программного обеспечения HAProxy, связанная с неполной очисткой временных или вспомогательных ресурсов, позволяющая нарушителю получить доступ к конфиденциальным данным
Modified: 2024-11-21
CVE-2020-11100
In hpack_dht_insert in hpack-tbl.c in the HPACK decoder in HAProxy 1.8 through 2.x before 2.1.4, a remote attacker can write arbitrary bytes around a certain location on the heap via a crafted HTTP/2 request, possibly causing remote code execution.
- openSUSE-SU-2020:0444
- http://packetstormsecurity.com/files/157323/haproxy-hpack-tbl.c-Out-Of-Bounds-Write.html
- http://www.haproxy.org
- https://bugzilla.redhat.com/show_bug.cgi?id=1819111
- https://bugzilla.suse.com/show_bug.cgi?id=1168023
- https://git.haproxy.org/?p=haproxy.git%3Ba=commit%3Bh=5dfc5d5cd0d2128d77253ead3acf03a421ab5b88
- https://lists.debian.org/debian-security-announce/2020/msg00052.html
- FEDORA-2020-13fd8b1721
- FEDORA-2020-16cd111544
- GLSA-202012-22
- USN-4321-1
- DSA-4649
- https://www.haproxy.org/download/2.1/src/CHANGELOG
- https://www.mail-archive.com/haproxy%40formilux.org/msg36876.html
- openSUSE-SU-2020:0444
- https://www.mail-archive.com/haproxy%40formilux.org/msg36876.html
- https://www.haproxy.org/download/2.1/src/CHANGELOG
- DSA-4649
- USN-4321-1
- GLSA-202012-22
- FEDORA-2020-16cd111544
- FEDORA-2020-13fd8b1721
- https://lists.debian.org/debian-security-announce/2020/msg00052.html
- https://git.haproxy.org/?p=haproxy.git%3Ba=commit%3Bh=5dfc5d5cd0d2128d77253ead3acf03a421ab5b88
- https://bugzilla.suse.com/show_bug.cgi?id=1168023
- https://bugzilla.redhat.com/show_bug.cgi?id=1819111
- http://www.haproxy.org
- http://packetstormsecurity.com/files/157323/haproxy-hpack-tbl.c-Out-Of-Bounds-Write.html
Modified: 2024-11-21
CVE-2021-39241
An issue was discovered in HAProxy 2.0 before 2.0.24, 2.2 before 2.2.16, 2.3 before 2.3.13, and 2.4 before 2.4.3. An HTTP method name may contain a space followed by the name of a protected resource. It is possible that a server would interpret this as a request for that protected resource, such as in the "GET /admin? HTTP/1.1 /static/images HTTP/1.1" example.
- https://git.haproxy.org/?p=haproxy.git%3Ba=commit%3Bh=89265224d314a056d77d974284802c1b8a0dc97f
- https://git.haproxy.org/?p=haproxy.git%3Ba=commit%3Bh=89265224d314a056d77d974284802c1b8a0dc97f
- FEDORA-2021-3ab4512c98
- FEDORA-2021-3ab4512c98
- FEDORA-2021-e6557245e8
- FEDORA-2021-e6557245e8
- DSA-4960
- DSA-4960
- https://www.mail-archive.com/haproxy%40formilux.org/msg41041.html
- https://www.mail-archive.com/haproxy%40formilux.org/msg41041.html
Modified: 2024-11-21
CVE-2021-40346
An integer overflow exists in HAProxy 2.0 through 2.5 in htx_add_header that can be exploited to perform an HTTP request smuggling attack, allowing an attacker to bypass all configured http-request HAProxy ACLs and possibly other ACLs.
- https://git.haproxy.org/?p=haproxy.git
- https://git.haproxy.org/?p=haproxy.git
- https://github.com/haproxy/haproxy/commit/3b69886f7dcc3cfb3d166309018e6cfec9ce2c95
- https://github.com/haproxy/haproxy/commit/3b69886f7dcc3cfb3d166309018e6cfec9ce2c95
- https://jfrog.com/blog/critical-vulnerability-in-haproxy-cve-2021-40346-integer-overflow-enables-http-smuggling/
- https://jfrog.com/blog/critical-vulnerability-in-haproxy-cve-2021-40346-integer-overflow-enables-http-smuggling/
- [cloudstack-dev] 20210910 CVE-2021-40346 (haproxy 2.x)
- [cloudstack-dev] 20210910 CVE-2021-40346 (haproxy 2.x)
- [cloudstack-dev] 20210910 Re: CVE-2021-40346 (haproxy 2.x)
- [cloudstack-dev] 20210910 Re: CVE-2021-40346 (haproxy 2.x)
- FEDORA-2021-3493f9f6ab
- FEDORA-2021-3493f9f6ab
- FEDORA-2021-cd5ee418f6
- FEDORA-2021-cd5ee418f6
- DSA-4968
- DSA-4968
- https://www.mail-archive.com/haproxy%40formilux.org
- https://www.mail-archive.com/haproxy%40formilux.org
- https://www.mail-archive.com/haproxy%40formilux.org/msg41114.html
- https://www.mail-archive.com/haproxy%40formilux.org/msg41114.html
Modified: 2025-02-18
CVE-2023-0836
An information leak vulnerability was discovered in HAProxy 2.1, 2.2 before 2.2.27, 2.3, 2.4 before 2.4.21, 2.5 before 2.5.11, 2.6 before 2.6.8, 2.7 before 2.7.1. There are 5 bytes left uninitialized in the connection buffer when encoding the FCGI_BEGIN_REQUEST record. Sensitive data may be disclosed to configured FastCGI backends in an unexpected way.
Modified: 2025-03-20
CVE-2023-25725
HAProxy before 2.7.3 may allow a bypass of access control because HTTP/1 headers are inadvertently lost in some situations, aka "request smuggling." The HTTP header parsers in HAProxy may accept empty header field names, which could be used to truncate the list of HTTP headers and thus make some headers disappear after being parsed and processed for HTTP/1.0 and HTTP/1.1. For HTTP/2 and HTTP/3, the impact is limited because the headers disappear before being parsed and processed, as if they had not been sent by the client. The fixed versions are 2.7.3, 2.6.9, 2.5.12, 2.4.22, 2.2.29, and 2.0.31.
- https://git.haproxy.org/?p=haproxy-2.7.git%3Ba=commit%3Bh=a0e561ad7f29ed50c473f5a9da664267b60d1112
- https://git.haproxy.org/?p=haproxy-2.7.git%3Ba=commit%3Bh=a0e561ad7f29ed50c473f5a9da664267b60d1112
- [debian-lts-announce] 20230214 [SECURITY] [DLA 3318-1] haproxy security update
- [debian-lts-announce] 20230214 [SECURITY] [DLA 3318-1] haproxy security update
- FEDORA-2023-7e04833463
- FEDORA-2023-7e04833463
- FEDORA-2023-3e8a21cd5b
- FEDORA-2023-3e8a21cd5b
- DSA-5348
- DSA-5348
- https://www.haproxy.org/
- https://www.haproxy.org/
Modified: 2025-02-11
CVE-2023-25950
HTTP request/response smuggling vulnerability in HAProxy version 2.7.0, and 2.6.1 to 2.6.7 allows a remote attacker to alter a legitimate user's request. As a result, the attacker may obtain sensitive information or cause a denial-of-service (DoS) condition.
- https://git.haproxy.org/?p=haproxy-2.7.git%3Ba=commit%3Bh=3ca4223c5e1f18a19dc93b0b09ffdbd295554d46
- https://git.haproxy.org/?p=haproxy-2.7.git%3Ba=commit%3Bh=3ca4223c5e1f18a19dc93b0b09ffdbd295554d46
- https://jvn.jp/en/jp/JVN38170084/
- https://jvn.jp/en/jp/JVN38170084/
- https://www.haproxy.org/
- https://www.haproxy.org/
Modified: 2024-11-21
CVE-2023-40225
HAProxy through 2.0.32, 2.1.x and 2.2.x through 2.2.30, 2.3.x and 2.4.x through 2.4.23, 2.5.x and 2.6.x before 2.6.15, 2.7.x before 2.7.10, and 2.8.x before 2.8.2 forwards empty Content-Length headers, violating RFC 9110 section 8.6. In uncommon cases, an HTTP/1 server behind HAProxy may interpret the payload as an extra request.
- https://cwe.mitre.org/data/definitions/436.html
- https://cwe.mitre.org/data/definitions/436.html
- https://github.com/haproxy/haproxy/commit/6492f1f29d738457ea9f382aca54537f35f9d856
- https://github.com/haproxy/haproxy/commit/6492f1f29d738457ea9f382aca54537f35f9d856
- https://github.com/haproxy/haproxy/issues/2237
- https://github.com/haproxy/haproxy/issues/2237
- https://www.haproxy.org/download/2.6/src/CHANGELOG
- https://www.haproxy.org/download/2.6/src/CHANGELOG
- https://www.haproxy.org/download/2.7/src/CHANGELOG
- https://www.haproxy.org/download/2.7/src/CHANGELOG
- https://www.haproxy.org/download/2.8/src/CHANGELOG
- https://www.haproxy.org/download/2.8/src/CHANGELOG
Closed bugs
сервис haproxy не запускается