Summary: | <net-proxy/haproxy-1.6.6: remote denial of service via reqdeny (CVE-2016-5360) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | trivial | CC: | idl0r |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.openwall.com/lists/oss-security/2016/06/09/5 | ||
Whiteboard: | ~3 [noglsa cve] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
2016-06-10 13:06:43 UTC
1.6.5 has been removed. CVE-2016-5360 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5360): HAproxy 1.6.x before 1.6.6, when a deny comes from a reqdeny rule, allows remote attackers to cause a denial of service (uninitialized memory access and crash) or possibly have unspecified other impact via unknown vectors. Upstream commit verifies that the issue was introduced in 1.6-dev2: "Commit 108b1dd ("MEDIUM: http: configurable http result codes for http-request deny") introduced in 1.6-dev2 was incomplete." @Christian, thanks for the bump and cleanup! |