Debian 10226 Published by

A haproxy security update has been released for Debian GNU/Linux 11 to address an issue where haproxy does not properly initialize connection buffers when encoding the FCGI_BEGIN_REQUEST record.



DSA 5388-1: haproxy security update



- -------------------------------------------------------------------------
Debian Security Advisory DSA-5388-1 security@debian.org
  https://www.debian.org/security/ Salvatore Bonaccorso
April 13, 2023   https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : haproxy
CVE ID : CVE-2023-0836

It was reported that HAProxy, a fast and reliable load balancing reverse
proxy, does not properly initialize connection buffers when encoding the
FCGI_BEGIN_REQUEST record. A remote attacker can take advantage of this
flaw to cause an information leak.

For the stable distribution (bullseye), this problem has been fixed in
version 2.2.9-2+deb11u5.

We recommend that you upgrade your haproxy packages.

For the detailed security status of haproxy please refer to its security
tracker page at:
  https://security-tracker.debian.org/tracker/haproxy

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at:   https://www.debian.org/security/