An information leak vulnerability was discovered in HAProxy 2.1, 2.2 before 2.2.27, 2.3, 2.4 before 2.4.21, 2.5 before 2.5.11, 2.6 before 2.6.8, 2.7 before 2.7.1. There are 5 bytes left uninitialized in the connection buffer when encoding the FCGI_BEGIN_REQUEST record. Sensitive data may be disclosed to configured FastCGI backends in an unexpected way.
The product does not properly “clean up” and remove temporary or supporting resources after they have been used.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Haproxy | Haproxy | 2.2.0 (including) | 2.2.27 (excluding) |
Haproxy | Haproxy | 2.4.0 (including) | 2.4.21 (including) |
Haproxy | Haproxy | 2.5.0 (including) | 2.5.11 (including) |
Haproxy | Haproxy | 2.6.0 (including) | 2.6.8 (including) |
Haproxy | Haproxy | 2.1.0 (including) | 2.1.0 (including) |
Haproxy | Haproxy | 2.3.0 (including) | 2.3.0 (including) |
Haproxy | Haproxy | 2.7.0 (including) | 2.7.0 (including) |
Red Hat Enterprise Linux 9 | RedHat | haproxy-0:2.4.22-1.el9 | * |
Haproxy | Ubuntu | jammy | * |
Haproxy | Ubuntu | kinetic | * |
Haproxy | Ubuntu | trusty | * |
Haproxy | Ubuntu | upstream | * |
Haproxy | Ubuntu | xenial | * |