Name | TEMP-0000000-B9CD89 |
Description | BUG/MAJOR: http: prevent risk of reading past end with balance url_param |
Source | Automatically generated temporary name. Not for external reference. |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
haproxy (PTS) | jessie, jessie (lts) | 1.5.8-3+deb8u4 | fixed |
| stretch (security) | 1.7.5-2+deb9u1 | fixed |
| stretch (lts), stretch | 1.7.5-2+deb9u2 | fixed |
| buster (security), buster, buster (lts) | 1.8.19-1+deb10u5 | fixed |
| bullseye (security), bullseye | 2.2.9-2+deb11u6 | fixed |
| bookworm (security), bookworm | 2.6.12-1+deb12u1 | fixed |
| sid, trixie | 2.9.12-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
haproxy | source | squeeze | (not affected) | | | |
haproxy | source | jessie | 1.5.8-3+deb8u3 | | | |
haproxy | source | (unstable) | 1.5.12-1 | | | |
Notes
[jessie] - haproxy <no-dsa> (Minor issue)
[squeeze] - haproxy <not-affected> (Similar check was already present)
Upstream fix: http://git.haproxy.org/?p=haproxy-1.5.git;a=commit;h=522aab39753e8ed13786bc57b03ef7ae4ffe6c87
For squeeze, the above commit message implies that the fix does not need to be backported to version 1.4 and indeed, the code already contains a (different) check that limits the value of "len".