|Category:||Red Hat Local Security Checks|
|Title:||RedHat Update for haproxy RHSA-2015:1741-01|
|Summary:||The remote host is missing an update for the 'haproxy'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'haproxy'
package(s) announced via the referenced advisory.
HAProxy provides high availability, load balancing, and proxying for TCP
and HTTP-based applications.
An implementation error related to the memory management of request and
responses was found within HAProxy's buffer_slow_realign() function.
An unauthenticated remote attacker could possibly use this flaw to leak
certain memory buffer contents from a past request or session.
All haproxy users are advised to upgrade to this updated package, which
contains a backported patch to correct this issue.
haproxy on Red Hat Enterprise Linux Server (v. 7)
Please Install the Updated Packages.
Common Vulnerability Exposure (CVE) ID: CVE-2015-3281|
BugTraq ID: 75554
Debian Security Information: DSA-3301 (Google Search)
RedHat Security Advisories: RHSA-2015:1741
RedHat Security Advisories: RHSA-2015:2666
SuSE Security Announcement: SUSE-SU-2015:1663 (Google Search)
SuSE Security Announcement: openSUSE-SU-2015:1831 (Google Search)
|Copyright||Copyright (C) 2015 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.