Package: haproxy / 1.4.8-1+squeeze1
Metadata
Package | Version | Patches format |
---|---|---|
haproxy | 1.4.8-1+squeeze1 | 3.0 (quilt) |
Patch series
view the series filePatch | File delta | Description |
---|---|---|
cve 2012 2942.patch | (download) |
include/types/global.h |
3 2 + 1 - 0 ! |
bug/major: trash must always be the size of a buffer X-Git-Tag: v1.4.21~7 |
cve 2013 1912.patch | (download) |
src/proto_http.c |
22 22 + 0 - 0 ! |
bug/critical: using http information in tcp-request content may crash the process X-Git-Tag: v1.4.23~1 |
cve 2013 2175.patch | (download) |
src/proto_http.c |
6 4 + 2 - 0 ! |
bug/critical: fix a possible crash when using negative header occurrences When a config makes use of hdr_ip(x-forwarded-for,-1) or any such thing involving a negative occurrence count, the header is still parsed in the order it appears, and an array of up to MAX_HDR_HISTORY entries is created. When more entries are used, the entries simply wrap and continue this way. A problem happens when the incoming header field count exactly divides MAX_HDR_HISTORY, because the computation removes the number of requested occurrences from the count, but does not care about the risk of wrapping with a negative number. Thus we can dereference the array with a negative number and randomly crash the process. This bug has been present since the introduction of the negative offset count in 1.4.4 via commit bce70882. It has been reported by David Torgerson who offered some debugging traces showing where the crash happened, thus making it significantly easier to find the bug! This fix must absolutely be backported to 1.4. |