ALT-PU-2019-1002-1
Closed vulnerabilities
BDU:2020-03308
Уязвимость компонента dns.c сетевого программного обеспечения HAProxy, связанная с выполнением цикла с недоступным условием выхода, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-03309
Уязвимость функции dns_validate_dns_response компонента dns.c сетевого программного обеспечения HAProxy, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2021-01442
Уязвимость HPACK декодера серверного программного обеспечения HAProxy, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-14645
A flaw was discovered in the HPACK decoder of HAProxy, before 1.8.14, that is used for HTTP/2. An out-of-bounds read access in hpack_valid_idx() resulted in a remote crash and denial of service.
- https://access.redhat.com/errata/RHBA-2019:0028
- https://access.redhat.com/errata/RHSA-2018:2882
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14645
- https://usn.ubuntu.com/3780-1/
- https://www.mail-archive.com/haproxy%40formilux.org/msg31253.html
- https://access.redhat.com/errata/RHBA-2019:0028
- https://access.redhat.com/errata/RHSA-2018:2882
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14645
- https://usn.ubuntu.com/3780-1/
- https://www.mail-archive.com/haproxy%40formilux.org/msg31253.html
Modified: 2024-11-21
CVE-2018-20102
An out-of-bounds read in dns_validate_dns_response in dns.c was discovered in HAProxy through 1.8.14. Due to a missing check when validating DNS responses, remote attackers might be able read the 16 bytes corresponding to an AAAA record from the non-initialized part of the buffer, possibly accessing anything that was left on the stack, or even past the end of the 8193-byte buffer, depending on the value of accepted_payload_size.
- http://git.haproxy.org/?p=haproxy.git%3Ba=commit%3Bh=efbbdf72992cd20458259962346044cafd9331c0
- http://www.securityfocus.com/bid/106223
- https://access.redhat.com/errata/RHBA-2019:0326
- https://access.redhat.com/errata/RHBA-2019:0327
- https://access.redhat.com/errata/RHSA-2019:1436
- https://lists.debian.org/debian-lts-announce/2022/05/msg00045.html
- https://usn.ubuntu.com/3858-1/
- http://git.haproxy.org/?p=haproxy.git%3Ba=commit%3Bh=efbbdf72992cd20458259962346044cafd9331c0
- http://www.securityfocus.com/bid/106223
- https://access.redhat.com/errata/RHBA-2019:0326
- https://access.redhat.com/errata/RHBA-2019:0327
- https://access.redhat.com/errata/RHSA-2019:1436
- https://lists.debian.org/debian-lts-announce/2022/05/msg00045.html
- https://usn.ubuntu.com/3858-1/
Modified: 2024-11-21
CVE-2018-20103
An issue was discovered in dns.c in HAProxy through 1.8.14. In the case of a compressed pointer, a crafted packet can trigger infinite recursion by making the pointer point to itself, or create a long chain of valid pointers resulting in stack exhaustion.
- http://git.haproxy.org/?p=haproxy.git%3Ba=commit%3Bh=58df5aea0a0c926b2238f65908f5e9f83d1cca25
- http://www.securityfocus.com/bid/106280
- https://access.redhat.com/errata/RHBA-2019:0326
- https://access.redhat.com/errata/RHBA-2019:0327
- https://access.redhat.com/errata/RHSA-2019:1436
- https://lists.debian.org/debian-lts-announce/2022/05/msg00045.html
- https://usn.ubuntu.com/3858-1/
- http://git.haproxy.org/?p=haproxy.git%3Ba=commit%3Bh=58df5aea0a0c926b2238f65908f5e9f83d1cca25
- http://www.securityfocus.com/bid/106280
- https://access.redhat.com/errata/RHBA-2019:0326
- https://access.redhat.com/errata/RHBA-2019:0327
- https://access.redhat.com/errata/RHSA-2019:1436
- https://lists.debian.org/debian-lts-announce/2022/05/msg00045.html
- https://usn.ubuntu.com/3858-1/