Skip to content
GitLab
Projects Groups Topics Snippets
  • /
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Register
  • Sign in
  • aports aports
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Graph
    • Compare revisions
  • Issues 664
    • Issues 664
    • List
    • Boards
    • Service Desk
    • Milestones
  • Merge requests 290
    • Merge requests 290
  • CI/CD
    • CI/CD
    • Pipelines
    • Jobs
    • Schedules
  • Deployments
    • Deployments
    • Releases
  • Activity
  • Graph
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
Collapse sidebar

Our ARM infrastructure is unreachable at the moment, so CI jobs will time-out and packages will not be updated until the servers are back.

  • alpinealpine
  • aportsaports
  • Issues
  • #11389
Closed
Open
Issue created Apr 14, 2020 by Alicha CH@alichaReporter5 of 5 checklist items completed5/5 checklist items

haproxy: malformed HTTP/2 requests can lead to out-of-bounds writes (CVE-2020-11100)

In hpack_dht_insert in hpack-tbl.c in the HPACK decoder in HAProxy 1.8 through 2.x before 2.1.4, a remote attacker can write arbitrary bytes around a certain location on the heap via a crafted HTTP/2 request, possibly causing remote code execution.

References:

  • https://nvd.nist.gov/vuln/detail/CVE-2020-11100
  • https://security-tracker.debian.org/tracker/CVE-2020-11100

Patch:

https://git.haproxy.org/?p=haproxy-2.1.git;a=patch;h=f17f86304f187b0f10ca6a8d46346afd9851a543

Affected branches:

  • master (44acde30)
  • 3.11-stable (f190b885)
  • 3.10-stable (f0192cc6)
  • 3.9-stable (63b8a5e4)
  • 3.8-stable
Edited Apr 14, 2020 by Leo
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Assignee
Assign to
Time tracking