ID

VAR-202109-1900


CVE

CVE-2021-40346


TITLE

HAProxy  Integer overflow vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2021-011455

DESCRIPTION

An integer overflow exists in HAProxy 2.0 through 2.5 in htx_add_header that can be exploited to perform an HTTP request smuggling attack, allowing an attacker to bypass all configured http-request HAProxy ACLs and possibly other ACLs. HAProxy Exists in an integer overflow vulnerability.Information may be tampered with. HAProxy is an open source TCP/HTTP load balancing server from the French HAProxy= company. = There is an input validation error vulnerability in HAProxy, which stems from the lack of header name length checking in the htx_add_header() and htx_add_trailer() functions in HAProxy, which can be exploited by attackers to cause request smuggling attacks or response splitting attacks. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-4968-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso September 07, 2021 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : haproxy CVE ID : CVE-2021-40346 Ori Hollander reported that missing header name length checks in the htx_add_header() and htx_add_trailer() functions in HAProxy, a fast and reliable load balancing reverse proxy, could result in request smuggling attacks or response splitting attacks. Additionally this update addresses #993303 introduced in DSA 4960-1 causing HAProxy to fail serving URLs with HTTP/2 containing '//'. For the stable distribution (bullseye), this problem has been fixed in version 2.2.9-2+deb11u2. We recommend that you upgrade your haproxy packages. For the detailed security status of haproxy please refer to its security tracker page at: https://security-tracker.debian.org/tracker/haproxy Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmE30edfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0QPzQ//Xl1VpOHuAwqodHnEx3DSP172eZ6lD3Mdrs+GXscbkCXTMHduSXGnSGA3 N1IrN8Wt1bfvxybqdR3CLTehTzmgBJLGEz8Ub5gu0IJ2o1edyiqpZBDhZvDSCPFC iFHWucZ2asOb9c/rCapTi7AD+S7NpC5AnIGfNhUHYWnFwR7Id8gHvd9JaHUGrInh P4T5lzY70fvNFPrSye7CQFPcSScHOe29i7igKXZmV+FxvnYEYJyavf6ijwGTJF87 e1lJAm8er9bQZp3GLzkbI3bRUDmO+IgGX+H3Qz/PxbU23PhyDN91QVWCY/CX11nN yH4evBchPM1ap2o8hPZYpUYUznYekOA1CfYxTcuP5oc9QFMEzHMNUVhSihsjGA4Y fCxFmdhcQzTLI7GcZTkSB2k0CikF4ncH7aqtM7oK2z/CM/uJeVO1WzRtvyJKuD72 Lv6PwQ/AbMa/dKYzROyQE0vDzRd23UzlQzg1npbpHlfPYXOgyfIRLCIfBPatyGrR snpdsNnGejesNmsbxCBwQGz2jsrgSqMe1qkho9ebK3aeaSA1lRe+WXV87NYH2wZi JOQH9JjqXCwkH/JDoOBWasOAhyKPs4jv1JT2L2iXCNVbFcgklnc+iaUgafYV9tob QMoc5oZREvgkpu+TOOTOBmrOw4sDfEOgcNf3G1sBBFKS4ds5wv0= =8IRe -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: OpenShift Container Platform 4.8.25 security update Advisory ID: RHSA-2021:5208-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://access.redhat.com/errata/RHSA-2021:5208 Issue date: 2022-01-05 CVE Names: CVE-2021-39240 CVE-2021-39241 CVE-2021-39242 CVE-2021-40346 ===================================================================== 1. Summary: Red Hat OpenShift Container Platform release 4.8.25 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat OpenShift Container Platform 4.8 - noarch, ppc64le, s390x, x86_64 3. Description: Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.8.25. See the following advisory for the container images for this release: https://access.redhat.com/errata/RHBA-2021:5209 Security Fix(es): * haproxy: does not ensure that the scheme and path portions of a URI have the expected characters (CVE-2021-39240) * haproxy: an HTTP method name may contain a space followed by the name of a protected resource (CVE-2021-39241) * haproxy: it can lead to a situation with an attacker-controlled HTTP Host header because a mismatch between Host and authority is mishandled (CVE-2021-39242) * haproxy: request smuggling attack or response splitting via duplicate content-length header (CVE-2021-40346) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For OpenShift Container Platform 4.8 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update: https://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html Details on how to access this content are available at https://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html 5. Bugs fixed (https://bugzilla.redhat.com/): 1995104 - CVE-2021-39240 haproxy: does not ensure that the scheme and path portions of a URI have the expected characters 1995107 - CVE-2021-39241 haproxy: an HTTP method name may contain a space followed by the name of a protected resource 1995112 - CVE-2021-39242 haproxy: it can lead to a situation with an attacker-controlled HTTP Host header because a mismatch between Host and authority is mishandled 2000599 - CVE-2021-40346 haproxy: request smuggling attack or response splitting via duplicate content-length header 2002703 - CVE-2021-39240 CVE-2021-39241 CVE-2021-39242 CVE-2021-40346 haproxy: does not ensure that the scheme and path portions of a URI have the expected characters [openshift-4.8.z] 6. Package List: Red Hat OpenShift Container Platform 4.8: Source: haproxy-2.2.13-2.el7.src.rpm openshift-4.8.0-202112150047.p0.gb4b4813.assembly.stream.el7.src.rpm x86_64: haproxy-debuginfo-2.2.13-2.el7.x86_64.rpm openshift-hyperkube-4.8.0-202112150047.p0.gb4b4813.assembly.stream.el7.x86_64.rpm Red Hat OpenShift Container Platform 4.8: Source: haproxy-2.2.13-2.el8.src.rpm openshift-4.8.0-202112150047.p0.gb4b4813.assembly.stream.el8.src.rpm openshift-kuryr-4.8.0-202112131630.p0.g839864c.assembly.stream.el8.src.rpm ostree-2020.7-6.el8_4.src.rpm noarch: openshift-kuryr-cni-4.8.0-202112131630.p0.g839864c.assembly.stream.el8.noarch.rpm openshift-kuryr-common-4.8.0-202112131630.p0.g839864c.assembly.stream.el8.noarch.rpm openshift-kuryr-controller-4.8.0-202112131630.p0.g839864c.assembly.stream.el8.noarch.rpm python3-kuryr-kubernetes-4.8.0-202112131630.p0.g839864c.assembly.stream.el8.noarch.rpm ppc64le: haproxy-debugsource-2.2.13-2.el8.ppc64le.rpm openshift-hyperkube-4.8.0-202112150047.p0.gb4b4813.assembly.stream.el8.ppc64le.rpm ostree-2020.7-6.el8_4.ppc64le.rpm ostree-debuginfo-2020.7-6.el8_4.ppc64le.rpm ostree-debugsource-2020.7-6.el8_4.ppc64le.rpm ostree-devel-2020.7-6.el8_4.ppc64le.rpm ostree-grub2-2020.7-6.el8_4.ppc64le.rpm ostree-libs-2020.7-6.el8_4.ppc64le.rpm ostree-libs-debuginfo-2020.7-6.el8_4.ppc64le.rpm s390x: haproxy-debugsource-2.2.13-2.el8.s390x.rpm openshift-hyperkube-4.8.0-202112150047.p0.gb4b4813.assembly.stream.el8.s390x.rpm ostree-2020.7-6.el8_4.s390x.rpm ostree-debuginfo-2020.7-6.el8_4.s390x.rpm ostree-debugsource-2020.7-6.el8_4.s390x.rpm ostree-devel-2020.7-6.el8_4.s390x.rpm ostree-libs-2020.7-6.el8_4.s390x.rpm ostree-libs-debuginfo-2020.7-6.el8_4.s390x.rpm x86_64: haproxy-debugsource-2.2.13-2.el8.x86_64.rpm openshift-hyperkube-4.8.0-202112150047.p0.gb4b4813.assembly.stream.el8.x86_64.rpm ostree-2020.7-6.el8_4.x86_64.rpm ostree-debuginfo-2020.7-6.el8_4.x86_64.rpm ostree-debugsource-2020.7-6.el8_4.x86_64.rpm ostree-devel-2020.7-6.el8_4.x86_64.rpm ostree-grub2-2020.7-6.el8_4.x86_64.rpm ostree-libs-2020.7-6.el8_4.x86_64.rpm ostree-libs-debuginfo-2020.7-6.el8_4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2021-39240 https://access.redhat.com/security/cve/CVE-2021-39241 https://access.redhat.com/security/cve/CVE-2021-39242 https://access.redhat.com/security/cve/CVE-2021-40346 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYdX16tzjgjWX9erEAQiPSw/7BZjeFtaaT6FMAHS/7kexJxcN/ISkBhBi O3FTNois3eEairgO2exdS+lL8Pu/JCdBo0MWUkDw0m4JM5vNbXv29rn5LCPHgYtJ TNyssUCtB1Kx3DaHrAeksomofv1nliU35/xSlZcjHG5rEH/p8DRPjMFDyO0DAPms e2tf+cOkNIwzvgtUIPwBOxjryb6bvqj9/lOCIi2AT632JmOFGFyB112GQ/WBy6j/ zaT6qkxSWaqzaq5h+tpAULKlBNrTuVzeBQavO/uxtBGL28ZmUVdA2iJcJVkelPAD RrzT8qIN7Vvomfl4LgQo24PF2GBRRzgM8Y9Ci/yQppeltJ51FQ3AFBMLDFnSOVfi UvLINZXoev6u+ni9CkeuDA1R6XK6+s6MnccuwykmNilWplwgC+xnFGQ3/hxFM5Hq o1X8ULPjFXwmEeX87p7lArTCKZBLbBvXFBaRPZ5sD50dSHbm/Sz4k09SHGOle0yQ 0ai9LcUJX6G08II3c2+PlOSy3Orh0BVdIpcVH0sU1gI12iOcQlauK1eGaqPsVRMJ jT/y4+ZDm3TFSZ2IxieF8GKxvfn+HBiftBRshkykG6pUQkCkBWrvlAynMxbEDoPD KQvNORCET0bTi/4p91GDNs3HbSwVR1LuQldM/WJ375N1DXmy1O8bTHL/z8dBwvF3 D5O4BfcOuro= =SWDt -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . ========================================================================== Ubuntu Security Notice USN-5063-1 September 08, 2021 haproxy vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 21.04 - Ubuntu 20.04 LTS Summary: HAProxy could be made to expose sensitive information over the network. Software Description: - haproxy: fast and reliable load balancing reverse proxy Details: Ori Hollander discovered that HAProxy incorrectly handled HTTP header name length encoding. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 21.04: haproxy 2.2.9-1ubuntu0.2 Ubuntu 20.04 LTS: haproxy 2.0.13-2ubuntu0.3 In general, a standard system update will make all the necessary changes. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 4. Bugs fixed (https://bugzilla.redhat.com/): 2050826 - CVE-2022-24348 gitops: Path traversal and dereference of symlinks when passing Helm value files 5. Bugs fixed (https://bugzilla.redhat.com/): 2034067 - CVE-2021-45105 log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data contains a recursive lookup and context lookup pattern 5

Trust: 2.79

sources: NVD: CVE-2021-40346 // JVNDB: JVNDB-2021-011455 // CNVD: CNVD-2022-05867 // VULMON: CVE-2021-40346 // PACKETSTORM: 165533 // PACKETSTORM: 169123 // PACKETSTORM: 165481 // PACKETSTORM: 164079 // PACKETSTORM: 166051 // PACKETSTORM: 165552

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2022-05867

AFFECTED PRODUCTS

vendor:haproxymodel:haproxyscope:gteversion:2.3.0

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:33

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:34

Trust: 1.0

vendor:haproxymodel:haproxyscope:gteversion:2.4.0

Trust: 1.0

vendor:haproxymodel:haproxyscope:gteversion:2.0.0

Trust: 1.0

vendor:haproxymodel:haproxyscope:eqversion:2.5

Trust: 1.0

vendor:haproxymodel:haproxyscope:ltversion:2.3.14

Trust: 1.0

vendor:haproxymodel:haproxyscope:gteversion:2.2.0

Trust: 1.0

vendor:haproxymodel:haproxyscope:ltversion:2.2.17

Trust: 1.0

vendor:haproxymodel:haproxyscope:ltversion:2.0.25

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:11.0

Trust: 1.0

vendor:haproxymodel:haproxyscope:ltversion:2.4.4

Trust: 1.0

vendor:debianmodel:gnu/linuxscope: - version: -

Trust: 0.8

vendor:willy tarreaumodel:haproxyscope: - version: -

Trust: 0.8

vendor:fedoramodel:fedorascope: - version: -

Trust: 0.8

vendor:haproxymodel:haproxyscope:gteversion:2.0,<=2.5

Trust: 0.6

sources: CNVD: CNVD-2022-05867 // JVNDB: JVNDB-2021-011455 // NVD: CVE-2021-40346

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-40346
value: HIGH

Trust: 1.0

NVD: CVE-2021-40346
value: HIGH

Trust: 0.8

CNVD: CNVD-2022-05867
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202109-365
value: HIGH

Trust: 0.6

VULMON: CVE-2021-40346
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2021-40346
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2022-05867
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2021-40346
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2021-40346
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2022-05867 // VULMON: CVE-2021-40346 // JVNDB: JVNDB-2021-011455 // CNNVD: CNNVD-202109-365 // NVD: CVE-2021-40346

PROBLEMTYPE DATA

problemtype:CWE-190

Trust: 1.0

problemtype:Integer overflow or wraparound (CWE-190) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-011455 // NVD: CVE-2021-40346

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 164079 // CNNVD: CNNVD-202109-365

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-202109-365

PATCH

title:Messages by Threadurl:https://www.debian.org/security/2021/dsa-4968

Trust: 0.8

title:Patch for HAProxy Input Validation Error Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/315566

Trust: 0.6

title:Haproxy HAProxy Enter the fix for the verification error vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=162748

Trust: 0.6

title:Debian Security Advisories: DSA-4968-1 haproxy -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=5748f9c5d3808c8bcb9436e54096d270

Trust: 0.1

title:Red Hat: CVE-2021-40346url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2021-40346

Trust: 0.1

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2021-40346 log

Trust: 0.1

title:Amazon Linux 2: ALASHAPROXY2-2023-005url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALASHAPROXY2-2023-005

Trust: 0.1

title:Red Hat: Important: Red Hat OpenShift GitOps security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20220580 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: Red Hat Advanced Cluster Management 2.2.11 security updates and bug fixesurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20220856 - Security Advisory

Trust: 0.1

title:CVE-2021-40346url:https://github.com/knqyf263/CVE-2021-40346

Trust: 0.1

title:CVE-2021-40346-POCurl:https://github.com/donky16/CVE-2021-40346-POC

Trust: 0.1

sources: CNVD: CNVD-2022-05867 // VULMON: CVE-2021-40346 // JVNDB: JVNDB-2021-011455 // CNNVD: CNNVD-202109-365

EXTERNAL IDS

db:NVDid:CVE-2021-40346

Trust: 4.5

db:JVNDBid:JVNDB-2021-011455

Trust: 0.8

db:PACKETSTORMid:165481

Trust: 0.7

db:PACKETSTORMid:164079

Trust: 0.7

db:PACKETSTORMid:165552

Trust: 0.7

db:CNVDid:CNVD-2022-05867

Trust: 0.6

db:PACKETSTORMid:164940

Trust: 0.6

db:PACKETSTORMid:165624

Trust: 0.6

db:AUSCERTid:ESB-2021.3002

Trust: 0.6

db:AUSCERTid:ESB-2022.1071

Trust: 0.6

db:AUSCERTid:ESB-2021.3024

Trust: 0.6

db:AUSCERTid:ESB-2021.3853

Trust: 0.6

db:AUSCERTid:ESB-2021.3263

Trust: 0.6

db:AUSCERTid:ESB-2022.0716

Trust: 0.6

db:AUSCERTid:ESB-2022.0048

Trust: 0.6

db:AUSCERTid:ESB-2022.0175

Trust: 0.6

db:AUSCERTid:ESB-2022.0238

Trust: 0.6

db:CS-HELPid:SB2022011734

Trust: 0.6

db:CS-HELPid:SB2021111101

Trust: 0.6

db:CS-HELPid:SB2022011936

Trust: 0.6

db:CS-HELPid:SB2021090814

Trust: 0.6

db:CS-HELPid:SB2022010526

Trust: 0.6

db:CNNVDid:CNNVD-202109-365

Trust: 0.6

db:VULMONid:CVE-2021-40346

Trust: 0.1

db:PACKETSTORMid:165533

Trust: 0.1

db:PACKETSTORMid:169123

Trust: 0.1

db:PACKETSTORMid:166051

Trust: 0.1

sources: CNVD: CNVD-2022-05867 // VULMON: CVE-2021-40346 // JVNDB: JVNDB-2021-011455 // PACKETSTORM: 165533 // PACKETSTORM: 169123 // PACKETSTORM: 165481 // PACKETSTORM: 164079 // PACKETSTORM: 166051 // PACKETSTORM: 165552 // CNNVD: CNNVD-202109-365 // NVD: CVE-2021-40346

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2021-40346

Trust: 2.5

url:https://github.com/haproxy/haproxy/commit/3b69886f7dcc3cfb3d166309018e6cfec9ce2c95

Trust: 1.6

url:https://git.haproxy.org/?p=haproxy.git

Trust: 1.6

url:https://www.debian.org/security/2021/dsa-4968

Trust: 1.6

url:https://access.redhat.com/security/cve/cve-2021-40346

Trust: 1.0

url:https://www.mail-archive.com/haproxy%40formilux.org

Trust: 1.0

url:https://jfrog.com/blog/critical-vulnerability-in-haproxy-cve-2021-40346-integer-overflow-enables-http-smuggling/

Trust: 1.0

url:https://www.mail-archive.com/haproxy%40formilux.org/msg41114.html

Trust: 1.0

url:https://lists.apache.org/thread.html/r284567dd7523f5823e2ce995f787ccd37b1cc4108779c50a97c79120%40%3cdev.cloudstack.apache.org%3e

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/a7v2iyo22lwvbgunzwvkntmdv4kinlfo/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/mxtsby2teaxwzvfqm3cxhjfronx7pemn/

Trust: 1.0

url:https://lists.apache.org/thread.html/r8a58fd7a29808e5d27ee56877745e58dc4bb041b9af94601554e2a5a%40%3cdev.cloudstack.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r284567dd7523f5823e2ce995f787ccd37b1cc4108779c50a97c79120@%3cdev.cloudstack.apache.org%3e

Trust: 0.6

url:https://www.mail-archive.com/haproxy@formilux.org/msg41114.html

Trust: 0.6

url:https://lists.apache.org/thread.html/r8a58fd7a29808e5d27ee56877745e58dc4bb041b9af94601554e2a5a@%3cdev.cloudstack.apache.org%3e

Trust: 0.6

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/a7v2iyo22lwvbgunzwvkntmdv4kinlfo/

Trust: 0.6

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/mxtsby2teaxwzvfqm3cxhjfronx7pemn/

Trust: 0.6

url:http-smuggling/

Trust: 0.6

url:https://jfrog.com/blog/critical-vulnerability-in-haproxy-cve-2021-40346-integer-overflow-enables-

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0048

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021111101

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0175

Trust: 0.6

url:https://packetstormsecurity.com/files/165624/red-hat-security-advisory-2022-0114-04.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022011936

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.1071

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3002

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3024

Trust: 0.6

url:https://packetstormsecurity.com/files/164940/red-hat-security-advisory-2021-4118-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/165552/red-hat-security-advisory-2022-0026-06.html

Trust: 0.6

url:https://vigilance.fr/vulnerability/haproxy-header-injection-via-htx-36327

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3263

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3853

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022011734

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021090814

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0716

Trust: 0.6

url:https://packetstormsecurity.com/files/164079/ubuntu-security-notice-usn-5063-1.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022010526

Trust: 0.6

url:https://packetstormsecurity.com/files/165481/red-hat-security-advisory-2021-5208-05.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0238

Trust: 0.6

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.4

url:https://bugzilla.redhat.com/):

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-39241

Trust: 0.4

url:https://access.redhat.com/security/team/contact/

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-39241

Trust: 0.3

url:https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.2

url:https://access.redhat.com/security/team/key/

Trust: 0.2

url:https://access.redhat.com/errata/rhba-2022:0025

Trust: 0.2

url:https://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html

Trust: 0.2

url:https://access.redhat.com/errata/rhsa-2022:0024

Trust: 0.1

url:https://www.debian.org/security/faq

Trust: 0.1

url:https://security-tracker.debian.org/tracker/haproxy

Trust: 0.1

url:https://www.debian.org/security/

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-39242

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-39240

Trust: 0.1

url:https://access.redhat.com/errata/rhba-2021:5209

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-39240

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-39242

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:5208

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5063-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/haproxy/2.2.9-1ubuntu0.2

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/haproxy/2.0.13-2ubuntu0.3

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-14155

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-24370

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-13435

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-12762

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-20838

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-43527

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:0580

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3426

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-17594

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-22876

Trust: 0.1

url:https://access.redhat.com/articles/11258

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-17594

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-33574

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-33560

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-5827

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3800

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-33574

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-42574

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-19603

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-27645

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-20231

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-24370

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-14145

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3572

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3445

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-4658

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-22925

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3200

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-37750

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-22876

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-16135

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-13750

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-17595

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-22898

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-36085

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-28153

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-19603

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-13750

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-20271

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-20231

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3580

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-14155

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-16135

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-13751

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-17595

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-27645

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-22925

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-22898

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-36087

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-24348

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-13751

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3200

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-20271

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-20838

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-35942

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-12762

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-13435

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-36086

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-44790

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3712

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-14145

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-28153

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-20232

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-33560

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-20232

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-18218

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-5827

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-36084

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4658

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-18218

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3521

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#low

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-45105

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:0026

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-45105

Trust: 0.1

sources: CNVD: CNVD-2022-05867 // JVNDB: JVNDB-2021-011455 // PACKETSTORM: 165533 // PACKETSTORM: 169123 // PACKETSTORM: 165481 // PACKETSTORM: 164079 // PACKETSTORM: 166051 // PACKETSTORM: 165552 // CNNVD: CNNVD-202109-365 // NVD: CVE-2021-40346

CREDITS

Red Hat

Trust: 0.4

sources: PACKETSTORM: 165533 // PACKETSTORM: 165481 // PACKETSTORM: 166051 // PACKETSTORM: 165552

SOURCES

db:CNVDid:CNVD-2022-05867
db:VULMONid:CVE-2021-40346
db:JVNDBid:JVNDB-2021-011455
db:PACKETSTORMid:165533
db:PACKETSTORMid:169123
db:PACKETSTORMid:165481
db:PACKETSTORMid:164079
db:PACKETSTORMid:166051
db:PACKETSTORMid:165552
db:CNNVDid:CNNVD-202109-365
db:NVDid:CVE-2021-40346

LAST UPDATE DATE

2025-04-25T22:04:36.181000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2022-05867date:2022-01-23T00:00:00
db:VULMONid:CVE-2021-40346date:2023-11-07T00:00:00
db:JVNDBid:JVNDB-2021-011455date:2022-08-01T07:55:00
db:CNNVDid:CNNVD-202109-365date:2022-03-15T00:00:00
db:NVDid:CVE-2021-40346date:2024-11-21T06:23:54.997

SOURCES RELEASE DATE

db:CNVDid:CNVD-2022-05867date:2022-01-23T00:00:00
db:VULMONid:CVE-2021-40346date:2021-09-08T00:00:00
db:JVNDBid:JVNDB-2021-011455date:2022-08-01T00:00:00
db:PACKETSTORMid:165533date:2022-01-13T15:57:22
db:PACKETSTORMid:169123date:2021-09-28T19:12:00
db:PACKETSTORMid:165481date:2022-01-06T18:21:30
db:PACKETSTORMid:164079date:2021-09-08T14:27:08
db:PACKETSTORMid:166051date:2022-02-18T16:37:39
db:PACKETSTORMid:165552date:2022-01-13T16:32:51
db:CNNVDid:CNNVD-202109-365date:2021-09-08T00:00:00
db:NVDid:CVE-2021-40346date:2021-09-08T17:15:12.457