-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-3301-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso July 05, 2015 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : haproxy CVE ID : CVE-2015-3281 Charlie Smurthwaite of aTech Media discovered a flaw in HAProxy, a fast and reliable load balancing reverse proxy, when HTTP pipelining is used. A client can take advantage of this flaw to cause data corruption and retrieve uninitialized memory contents that exhibit data from a past request or session. For the stable distribution (jessie), this problem has been fixed in version 1.5.8-3+deb8u1. For the unstable distribution (sid), this problem has been fixed in version 1.5.14-1. We recommend that you upgrade your haproxy packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCgAGBQJVmKxkAAoJEAVMuPMTQ89EDUwP/3USNhmRD846WUx2n8mNTCqt gLhTPDgCSZAHnxs8i4L7hIjbPw+jPDXwDcMm143kcQXHGlGW4eCaxk5+SNDrGbNJ WNSHbKblVCYUq0XmhJdLQQByZy983Qp72IazILybrlLPlT13DQSnbAWEDoNclN9Z 2sGsCzZYcaBcD/ikfltkVyXtCCP4riN6+0x86ZzqeJHMObx+5NEjKy40ZfE24cGv gFT+XCFbAo3MykWiRRISWQQdebscR/KFYrsEtpdznnlk3lmY3JOUb8kx+6zQjuKt 5P9rdQb+CYvc5rd7O9xYo8Hf17XS4hmYSZ8XGr0iSuPf881aBjYcb2FtIXjcokfk 2oHFJb6R/lypNQB8o+48d4C7xibzjICnuD2BnkMR7YONCsRJERui6NElr/H3YdGq b+kwCt1U93aTQsjxX9gSR7FrHiph058lQVh9jR4B9oFjCrn0rSgbbsBCX5OmNQkT YfuuwL6hAv9iE6bmdiefuxs0nDLBLvc3+CpQLxo9G4fMx11R0RFm6ip+i29xCvoe 5nVkRO0q3wPEf+5Vj9udREN7B4QH/eluolS0seV1qMqnlJXizxy2PHe7clIYBvbV yOaE9l8/gW2YdgD1FFcYipefMdG7p69PESMf63GzF4HujAXmoG4I79M8+1THX7ZM hpQocxu1LQbZVmkDu2pH =QXo3 -----END PGP SIGNATURE-----