drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Cross-Site Request Forgery in haproxy
Name: |
Cross-Site Request Forgery in haproxy |
|
ID: |
FEDORA-2021-cd5ee418f6 |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 33 |
|
Datum: |
Fr, 17. September 2021, 23:47 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40346 |
|
Applikationen: |
HAproxy |
|
Originalnachricht |
------------------------------------------------------------------------------- - Fedora Update Notification FEDORA-2021-cd5ee418f6 2021-09-17 15:19:50.176186 ------------------------------------------------------------------------------- -
Name : haproxy Product : Fedora 33 Version : 2.2.17 Release : 1.fc33 URL : http://www.haproxy.org/ Summary : HAProxy reverse proxy for high availability environments Description : HAProxy is a TCP/HTTP reverse proxy which is particularly suited for high availability environments. Indeed, it can: - route HTTP requests depending on statically assigned cookies - spread load among several servers while assuring server persistence through the use of HTTP cookies - switch to backup servers in the event a main one fails - accept connections to special ports dedicated to service monitoring - stop accepting connections without breaking existing ones - add, modify, and delete HTTP headers in both directions - block requests matching particular patterns - report detailed status to authenticated users from a URI intercepted from the application
------------------------------------------------------------------------------- - Update Information:
Update to 2.2.17 ------------------------------------------------------------------------------- - ChangeLog:
* Thu Sep 9 2021 Ryan O'Hara <rohara@redhat.com> - 2.2.17-1 - Update to 2.2.17 - Fix request smuggling attack or response splitting (CVE-2021-40346, #2002411) ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #2002411 - CVE-2021-40346 haproxy: request smuggling attack or response splitting via duplicate content-length header [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2002411 ------------------------------------------------------------------------------- -
This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2021-cd5ee418f6' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure
|
|
|
|