Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2024-1142

Опубликовано: 06 мар. 2024
Источник: oracle-oval
Платформа: Oracle Linux 9

Описание

ELSA-2024-1142: haproxy security update (MODERATE)

[2.4.22-3]

  • Reject '#' as part of URI path component (CVE-2023-45539, RHEL-18169)

[2.4.22-2]

  • Reject any empty content-length header value (CVE-2023-40225, RHEL-7736)

Обновленные пакеты

Oracle Linux 9

Oracle Linux aarch64

haproxy

2.4.22-3.el9_3

Oracle Linux x86_64

haproxy

2.4.22-3.el9_3

Связанные CVE

Связанные уязвимости

suse-cvrf
больше 1 года назад

Security update for haproxy

CVSS3: 7.2
ubuntu
почти 2 года назад

HAProxy through 2.0.32, 2.1.x and 2.2.x through 2.2.30, 2.3.x and 2.4.x through 2.4.23, 2.5.x and 2.6.x before 2.6.15, 2.7.x before 2.7.10, and 2.8.x before 2.8.2 forwards empty Content-Length headers, violating RFC 9110 section 8.6. In uncommon cases, an HTTP/1 server behind HAProxy may interpret the payload as an extra request.

CVSS3: 7.5
redhat
почти 2 года назад

HAProxy through 2.0.32, 2.1.x and 2.2.x through 2.2.30, 2.3.x and 2.4.x through 2.4.23, 2.5.x and 2.6.x before 2.6.15, 2.7.x before 2.7.10, and 2.8.x before 2.8.2 forwards empty Content-Length headers, violating RFC 9110 section 8.6. In uncommon cases, an HTTP/1 server behind HAProxy may interpret the payload as an extra request.

CVSS3: 7.2
nvd
почти 2 года назад

HAProxy through 2.0.32, 2.1.x and 2.2.x through 2.2.30, 2.3.x and 2.4.x through 2.4.23, 2.5.x and 2.6.x before 2.6.15, 2.7.x before 2.7.10, and 2.8.x before 2.8.2 forwards empty Content-Length headers, violating RFC 9110 section 8.6. In uncommon cases, an HTTP/1 server behind HAProxy may interpret the payload as an extra request.

CVSS3: 7.2
msrc
почти 2 года назад

Описание отсутствует