Name | CVE-2018-11469 |
Description | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 900084 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
haproxy (PTS) | bullseye (security), bullseye | 2.2.9-2+deb11u6 | fixed |
| bookworm, bookworm (security) | 2.6.12-1+deb12u1 | fixed |
| trixie | 2.9.11-1 | fixed |
| sid | 2.9.12-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
haproxy | source | jessie | (not affected) | | | |
haproxy | source | stretch | (not affected) | | | |
haproxy | source | (unstable) | 1.8.9-2 | | | 900084 |
Notes
[stretch] - haproxy <not-affected> (Issue introduced in 1.8.0)
[jessie] - haproxy <not-affected> (Issue introduced in 1.8.0)
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06