Headline
CVE-2015-3281: Debian -- Security Information -- DSA-3301-1 haproxy
An implementation error related to the memory management of request and responses was found within HAProxy’s buffer_slow_realign() function. An unauthenticated remote attacker could possibly use this flaw to leak certain memory buffer contents from a past request or session.
Debian Security Advisory
Date Reported:
05 Jul 2015
Affected Packages:
haproxy
Vulnerable:
Yes
Security database references:
In Mitre’s CVE dictionary: CVE-2015-3281.
More information:
Charlie Smurthwaite of aTech Media discovered a flaw in HAProxy, a fast and reliable load balancing reverse proxy, when HTTP pipelining is used. A client can take advantage of this flaw to cause data corruption and retrieve uninitialized memory contents that exhibit data from a past request or session.
For the stable distribution (jessie), this problem has been fixed in version 1.5.8-3+deb8u1.
For the unstable distribution (sid), this problem has been fixed in version 1.5.14-1.
We recommend that you upgrade your haproxy packages.