-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-4960-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso August 17, 2021 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : haproxy CVE ID : not yet assigned Several vulnerabilities were discovered in HAProxy, a fast and reliable load balancing reverse proxy, which can result in HTTP request smuggling. By carefully crafting HTTP/2 requests, it is possible to smuggle another HTTP request to the backend selected by the HTTP/2 request. With certain configurations, it allows an attacker to send an HTTP request to a backend, circumventing the backend selection logic. Known workarounds are to disable HTTP/2 and set "tune.h2.max-concurrent-streams" to 0 in the "global" section. global tune.h2.max-concurrent-streams 0 For the stable distribution (bullseye), these problems have been fixed in version 2.2.9-2+deb11u1. We recommend that you upgrade your haproxy packages. For the detailed security status of haproxy please refer to its security tracker page at: https://security-tracker.debian.org/tracker/haproxy Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmEb52FfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0Q2ug/6A1T9vtKdzEn/jAb0R0XPESrk/ztzb23RFG+EBukEmMbsUk4A4N4ziC6B xQpHb0lrUPcuklXJrFUaSZWO4bzkWkCKGQTh9Uz52p7NxrfuVwrsHaJnhRY7jFIE 5R58Xhuuc/WYHE3oCJTKCxXI2p2nP2veW8WMwpGUmT8UBQXi/S8cTGhj8l5FBJAS dgWpFuVmtX9jt3PRKMZJZAFMgtShh7mvEaro8IgtOllp2CGr6GaHGX4CwfHui0FN lo4zx4i14CI0gZIeMHfW2l+c0U4snP5ZTJoiX9Qx8iPOqjEd5Y5sJ/8+R5d0euqH zd81FuR/vMkdm/mUi8BADBX0sKHThQto+tuRSy1VR6Y0XRrOQMe4iFup16cRNj5m Ut0AGS2QF7hodM1z3YfmkJ9H2O23ozdhc5KnexKK+3LbqW1TeqFMW3no8yufBzOn nkAX5iIWzvpC/kZ1iedn7cZdlFkwwNalMJfmN9p3j2XIUiyRejlnkCpYc9cSi6is w4VCqnsGEMNNGSOYlp0RtTfqAk6YMPmNMjQhfkeWVjIZJ8zhAasyH1IonX4O4Dg+ Jo5GGDVgaSqXJmDVeGrHQA0fJdfvuPCwWIbJstYXvzXqBJnym5tuXwy01wAN3ttm EZ2qhOakK6Bdhne/GqA3EZJ9G0aIfeqYKzwFZ6eB+7UDuP50zNM= =qE3E -----END PGP SIGNATURE-----