Search for packages
purl | pkg:deb/debian/haproxy@1.3.15.2-2%2Blenny2 |
Next non-vulnerable version | 2.6.12-1~bpo11+1 |
Latest non-vulnerable version | 3.0.11-1 |
Risk | 10.0 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-1sw8-kz6c-cyg1
Aliases: CVE-2018-20103 |
denial of service |
Affected by 14 other vulnerabilities. |
VCID-2cxk-bgnq-6bd2
Aliases: CVE-2016-5360 |
Affected by 21 other vulnerabilities. |
|
VCID-4b2y-yhe8-nkg8
Aliases: CVE-2022-0711 |
A flaw was found in the way HAProxy processed HTTP responses containing the "Set-Cookie2" header. This flaw could allow an attacker to send crafted HTTP response packets which lead to an infinite loop, eventually resulting in a denial of service condition. The highest threat from this vulnerability is availability. |
Affected by 1 other vulnerability. |
VCID-9xxa-rrnt-zuaw
Aliases: CVE-2023-40225 |
HAProxy through 2.0.32, 2.1.x and 2.2.x through 2.2.30, 2.3.x and 2.4.x through 2.4.23, 2.5.x and 2.6.x before 2.6.15, 2.7.x before 2.7.10, and 2.8.x before 2.8.2 forwards empty Content-Length headers, violating RFC 9110 section 8.6. In uncommon cases, an HTTP/1 server behind HAProxy may interpret the payload as an extra request. |
Affected by 1 other vulnerability. |
VCID-ab5y-ap51-ryc4
Aliases: CVE-2012-2942 |
Affected by 23 other vulnerabilities. |
|
VCID-afuu-t427-qyej
Aliases: CVE-2018-20615 |
An out-of-bounds read issue was discovered in the HTTP/2 protocol decoder in HAProxy 1.8.x and 1.9.x through 1.9.0 which can result in a crash. The processing of the PRIORITY flag in a HEADERS frame requires 5 extra bytes, and while these bytes are skipped, the total frame length was not re-checked to make sure they were present in the frame. |
Affected by 14 other vulnerabilities. |
VCID-bgbw-qk2e-13gg
Aliases: CVE-2021-39242 |
insufficient validation |
Affected by 1 other vulnerability. |
VCID-c4d1-jsqh-hban
Aliases: CVE-2023-44487 GHSA-qppj-fm5r-hxr3 VSV00013 |
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. |
Affected by 17 other vulnerabilities. |
VCID-d9yw-bqev-tycf
Aliases: CVE-2014-6269 |
haproxy: remote client denial of service vulnerability |
Affected by 23 other vulnerabilities. |
VCID-djkt-wp9t-9yfz
Aliases: CVE-2023-0056 |
An uncontrolled resource consumption vulnerability was discovered in HAProxy which could crash the service. This issue could allow an authenticated remote attacker to run a specially crafted malicious server in an OpenShift cluster. The biggest impact is to availability. |
Affected by 1 other vulnerability. |
VCID-dmps-ekv7-r7ex
Aliases: CVE-2015-3281 |
Affected by 23 other vulnerabilities. Affected by 22 other vulnerabilities. |
|
VCID-f4hp-kvfb-3bd2
Aliases: CVE-2019-18277 |
A flaw was found in HAProxy before 2.0.6. In legacy mode, messages featuring a transfer-encoding header missing the "chunked" value were not being correctly rejected. The impact was limited but if combined with the "http-reuse always" setting, it could be used to help construct an HTTP request smuggling attack against a vulnerable component employing a lenient parser that would ignore the content-length header as soon as it saw a transfer-encoding one (even if not entirely valid according to the specification). |
Affected by 1 other vulnerability. |
VCID-k2gg-hdzf-23d1
Aliases: CVE-2018-10184 |
haproxy: Heap buffer overflow in mux_h2.c:h2_process_demux() can allow attackers to cause a denial of service |
Affected by 20 other vulnerabilities. |
VCID-kcam-7y4u-vyg2
Aliases: CVE-2025-32464 |
HAProxy 2.2 through 3.1.6, in certain uncommon configurations, has a sample_conv_regsub heap-based buffer overflow because of mishandling of the replacement of multiple short patterns with a longer one. |
Affected by 0 other vulnerabilities. |
VCID-ksrz-h74j-hkd7
Aliases: CVE-2023-45539 |
HAProxy before 2.8.2 accepts # as part of the URI component, which might allow remote attackers to obtain sensitive information or have unspecified other impact upon misinterpretation of a path_end rule, such as routing index.html#.png to a static server. |
Affected by 1 other vulnerability. |
VCID-mhua-rw7n-n3fp
Aliases: CVE-2021-40346 |
insufficient validation |
Affected by 1 other vulnerability. |
VCID-rvkp-cggw-13e4
Aliases: CVE-2021-39240 |
insufficient validation |
Affected by 1 other vulnerability. |
VCID-rxhq-kb4n-w3ap
Aliases: CVE-2023-0836 |
An information leak vulnerability was discovered in HAProxy 2.1, 2.2 before 2.2.27, 2.3, 2.4 before 2.4.21, 2.5 before 2.5.11, 2.6 before 2.6.8, 2.7 before 2.7.1. There are 5 bytes left uninitialized in the connection buffer when encoding the FCGI_BEGIN_REQUEST record. Sensitive data may be disclosed to configured FastCGI backends in an unexpected way. |
Affected by 1 other vulnerability. |
VCID-sa71-g782-1bff
Aliases: CVE-2020-11100 |
arbitrary code execution |
Affected by 14 other vulnerabilities. Affected by 1 other vulnerability. |
VCID-sct2-zzwr-p7a8
Aliases: CVE-2018-14645 |
A flaw was discovered in the HPACK decoder of HAProxy, before 1.8.14, that is used for HTTP/2. An out-of-bounds read access in hpack_valid_idx() resulted in a remote crash and denial of service. |
Affected by 17 other vulnerabilities. |
VCID-srr7-b6py-4feu
Aliases: CVE-2023-25725 |
HAProxy before 2.7.3 may allow a bypass of access control because HTTP/1 headers are inadvertently lost in some situations, aka "request smuggling." The HTTP header parsers in HAProxy may accept empty header field names, which could be used to truncate the list of HTTP headers and thus make some headers disappear after being parsed and processed for HTTP/1.0 and HTTP/1.1. For HTTP/2 and HTTP/3, the impact is limited because the headers disappear before being parsed and processed, as if they had not been sent by the client. The fixed versions are 2.7.3, 2.6.9, 2.5.12, 2.4.22, 2.2.29, and 2.0.31. |
Affected by 1 other vulnerability. |
VCID-ss4h-xgx2-puhc
Aliases: CVE-2013-2175 |
Affected by 23 other vulnerabilities. |
|
VCID-t66m-jkuy-qffz
Aliases: CVE-2013-1912 |
Affected by 23 other vulnerabilities. |
|
VCID-uur5-d8g5-gfb4
Aliases: CVE-2018-20102 |
denial of service |
Affected by 14 other vulnerabilities. |
VCID-v9pc-jdcr-dbc1
Aliases: CVE-2018-11469 |
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. |
Affected by 17 other vulnerabilities. |
VCID-vtsz-q535-13av
Aliases: CVE-2021-39241 |
insufficient validation |
Affected by 1 other vulnerability. |
VCID-z9uy-y3pu-zug8
Aliases: CVE-2019-19330 |
The HTTP/2 implementation in HAProxy before 2.0.10 mishandles headers, as demonstrated by carriage return (CR, ASCII 0xd), line feed (LF, ASCII 0xa), and the zero character (NUL, ASCII 0x0), aka Intermediary Encapsulation Attacks. |
Affected by 14 other vulnerabilities. Affected by 1 other vulnerability. |
Vulnerability | Summary | Aliases |
---|---|---|
This package is not known to fix vulnerabilities. |