ALT-PU-2016-1944-1
Closed vulnerabilities
BDU:2015-09733
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2025-04-11
CVE-2012-2942
Buffer overflow in the trash buffer in the header capture functionality in HAProxy before 1.4.21, when global.tune.bufsize is set to a value greater than the default and header rewriting is enabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors.
- http://haproxy.1wt.eu/#news
- http://haproxy.1wt.eu/download/1.4/src/CHANGELOG
- http://haproxy.1wt.eu/git?p=haproxy-1.4.git%3Ba=commit%3Bh=30297cb17147a8d339eb160226bcc08c91d9530b
- http://secunia.com/advisories/49261
- http://security.gentoo.org/glsa/glsa-201301-02.xml
- http://www.debian.org/security/2013/dsa-2711
- http://www.openwall.com/lists/oss-security/2012/05/23/12
- http://www.openwall.com/lists/oss-security/2012/05/23/15
- http://www.openwall.com/lists/oss-security/2012/05/28/1
- http://www.securityfocus.com/bid/53647
- http://www.ubuntu.com/usn/USN-1800-1
- https://exchange.xforce.ibmcloud.com/vulnerabilities/75777
- http://haproxy.1wt.eu/#news
- http://haproxy.1wt.eu/download/1.4/src/CHANGELOG
- http://haproxy.1wt.eu/git?p=haproxy-1.4.git%3Ba=commit%3Bh=30297cb17147a8d339eb160226bcc08c91d9530b
- http://secunia.com/advisories/49261
- http://security.gentoo.org/glsa/glsa-201301-02.xml
- http://www.debian.org/security/2013/dsa-2711
- http://www.openwall.com/lists/oss-security/2012/05/23/12
- http://www.openwall.com/lists/oss-security/2012/05/23/15
- http://www.openwall.com/lists/oss-security/2012/05/28/1
- http://www.securityfocus.com/bid/53647
- http://www.ubuntu.com/usn/USN-1800-1
- https://exchange.xforce.ibmcloud.com/vulnerabilities/75777
Modified: 2025-04-11
CVE-2013-1912
Buffer overflow in HAProxy 1.4 through 1.4.22 and 1.5-dev through 1.5-dev17, when HTTP keep-alive is enabled, using HTTP keywords in TCP inspection rules, and running with rewrite rules that appends to requests, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted pipelined HTTP requests that prevent request realignment from occurring.
- http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103730.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103770.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103794.html
- http://rhn.redhat.com/errata/RHSA-2013-0729.html
- http://rhn.redhat.com/errata/RHSA-2013-0868.html
- http://secunia.com/advisories/52725
- http://www.debian.org/security/2013/dsa-2711
- http://www.openwall.com/lists/oss-security/2013/04/03/1
- http://www.securityfocus.com/bid/58820
- http://www.ubuntu.com/usn/USN-1800-1
- http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103730.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103770.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103794.html
- http://rhn.redhat.com/errata/RHSA-2013-0729.html
- http://rhn.redhat.com/errata/RHSA-2013-0868.html
- http://secunia.com/advisories/52725
- http://www.debian.org/security/2013/dsa-2711
- http://www.openwall.com/lists/oss-security/2013/04/03/1
- http://www.securityfocus.com/bid/58820
- http://www.ubuntu.com/usn/USN-1800-1
Modified: 2025-04-11
CVE-2013-2175
HAProxy 1.4 before 1.4.24 and 1.5 before 1.5-dev19, when configured to use hdr_ip or other "hdr_*" functions with a negative occurrence count, allows remote attackers to cause a denial of service (negative array index usage and crash) via an HTTP header with a certain number of values, related to the MAX_HDR_HISTORY variable.
- http://marc.info/?l=haproxy&m=137147915029705&w=2
- http://rhn.redhat.com/errata/RHSA-2013-1120.html
- http://rhn.redhat.com/errata/RHSA-2013-1204.html
- http://secunia.com/advisories/54344
- http://www.debian.org/security/2013/dsa-2711
- http://www.ubuntu.com/usn/USN-1889-1
- https://bugzilla.redhat.com/show_bug.cgi?id=974259
- http://marc.info/?l=haproxy&m=137147915029705&w=2
- http://rhn.redhat.com/errata/RHSA-2013-1120.html
- http://rhn.redhat.com/errata/RHSA-2013-1204.html
- http://secunia.com/advisories/54344
- http://www.debian.org/security/2013/dsa-2711
- http://www.ubuntu.com/usn/USN-1889-1
- https://bugzilla.redhat.com/show_bug.cgi?id=974259
