Debian 10261 Published by

A haproxy security update has been released for Debian GNU/Linux 11 to address a missing header name length checks in the htx_add_header() and htx_add_trailer() functions.



DSA 4968-1: haproxy security update



- -------------------------------------------------------------------------
Debian Security Advisory DSA-4968-1 security@debian.org
  https://www.debian.org/security/ Salvatore Bonaccorso
September 07, 2021   https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : haproxy
CVE ID : CVE-2021-40346

Ori Hollander reported that missing header name length checks in the
htx_add_header() and htx_add_trailer() functions in HAProxy, a fast and
reliable load balancing reverse proxy, could result in request smuggling
attacks or response splitting attacks.

Additionally this update addresses #993303 introduced in DSA 4960-1
causing HAProxy to fail serving URLs with HTTP/2 containing '//'.

For the stable distribution (bullseye), this problem has been fixed in
version 2.2.9-2+deb11u2.

We recommend that you upgrade your haproxy packages.

For the detailed security status of haproxy please refer to its security
tracker page at:
  https://security-tracker.debian.org/tracker/haproxy

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at:   https://www.debian.org/security/