Описание
ELSA-2020-1725: haproxy security, bug fix, and enhancement update (MODERATE)
[1.8.23-3]
- Fix hapack zero byte input causing overwrite (CVE-2020-11100, #1819519)
[1.8.23-2]
- Consider exist status 143 as success (#1778844)
[1.8.23-1]
- Update to 1.8.23 (#1774745)
Обновленные пакеты
Oracle Linux 8
Oracle Linux aarch64
haproxy
1.8.23-3.el8
Oracle Linux x86_64
haproxy
1.8.23-3.el8
Связанные CVE
Связанные уязвимости
The HTTP/2 implementation in HAProxy before 2.0.10 mishandles headers, as demonstrated by carriage return (CR, ASCII 0xd), line feed (LF, ASCII 0xa), and the zero character (NUL, ASCII 0x0), aka Intermediary Encapsulation Attacks.
The HTTP/2 implementation in HAProxy before 2.0.10 mishandles headers, as demonstrated by carriage return (CR, ASCII 0xd), line feed (LF, ASCII 0xa), and the zero character (NUL, ASCII 0x0), aka Intermediary Encapsulation Attacks.
The HTTP/2 implementation in HAProxy before 2.0.10 mishandles headers, as demonstrated by carriage return (CR, ASCII 0xd), line feed (LF, ASCII 0xa), and the zero character (NUL, ASCII 0x0), aka Intermediary Encapsulation Attacks.
The HTTP/2 implementation in HAProxy before 2.0.10 mishandles headers, ...
A flaw was found in HAProxy before 2.0.6. In legacy mode, messages featuring a transfer-encoding header missing the "chunked" value were not being correctly rejected. The impact was limited but if combined with the "http-reuse always" setting, it could be used to help construct an HTTP request smuggling attack against a vulnerable component employing a lenient parser that would ignore the content-length header as soon as it saw a transfer-encoding one (even if not entirely valid according to the specification).