ALT-PU-2015-1710-1
Closed vulnerabilities
BDU:2015-09733
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2023-11-07
CVE-2012-2942
Buffer overflow in the trash buffer in the header capture functionality in HAProxy before 1.4.21, when global.tune.bufsize is set to a value greater than the default and header rewriting is enabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors.
- http://haproxy.1wt.eu/download/1.4/src/CHANGELOG
- http://haproxy.1wt.eu/#news
- 49261
- 53647
- [oss-security] 20120528 Duplicate CVE identifiers (CVE-2012-2391 and CVE-2012-2942) assigned to HAProxy issue
- [oss-security] 20120523 CVE request: haproxy trash buffer overflow flaw
- [oss-security] 20120523 Re: CVE request: haproxy trash buffer overflow flaw
- USN-1800-1
- DSA-2711
- GLSA-201301-02
- haproxy-trash-bo(75777)
- http://haproxy.1wt.eu/git?p=haproxy-1.4.git%3Ba=commit%3Bh=30297cb17147a8d339eb160226bcc08c91d9530b
Modified: 2024-11-21
CVE-2013-1912
Buffer overflow in HAProxy 1.4 through 1.4.22 and 1.5-dev through 1.5-dev17, when HTTP keep-alive is enabled, using HTTP keywords in TCP inspection rules, and running with rewrite rules that appends to requests, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted pipelined HTTP requests that prevent request realignment from occurring.
- FEDORA-2013-4807
- FEDORA-2013-4807
- FEDORA-2013-4827
- FEDORA-2013-4827
- FEDORA-2013-6253
- FEDORA-2013-6253
- RHSA-2013:0729
- RHSA-2013:0729
- RHSA-2013:0868
- RHSA-2013:0868
- 52725
- 52725
- DSA-2711
- DSA-2711
- [oss-security] 20130403 CVE-2013-1912 : haproxy may crash on TCP content inspection rules
- [oss-security] 20130403 CVE-2013-1912 : haproxy may crash on TCP content inspection rules
- 58820
- 58820
- USN-1800-1
- USN-1800-1
Modified: 2024-11-21
CVE-2013-2175
HAProxy 1.4 before 1.4.24 and 1.5 before 1.5-dev19, when configured to use hdr_ip or other "hdr_*" functions with a negative occurrence count, allows remote attackers to cause a denial of service (negative array index usage and crash) via an HTTP header with a certain number of values, related to the MAX_HDR_HISTORY variable.
- [haproxy] 20130617 [ANNOUNCE] haproxy-1.5-dev19 and 1.4.24 (security update)
- [haproxy] 20130617 [ANNOUNCE] haproxy-1.5-dev19 and 1.4.24 (security update)
- RHSA-2013:1120
- RHSA-2013:1120
- RHSA-2013:1204
- RHSA-2013:1204
- 54344
- 54344
- DSA-2711
- DSA-2711
- USN-1889-1
- USN-1889-1
- https://bugzilla.redhat.com/show_bug.cgi?id=974259
- https://bugzilla.redhat.com/show_bug.cgi?id=974259