In hpackdhtinsert in hpack-tbl.c in the HPACK decoder in HAProxy 1.8 through 2.x before 2.1.4, a remote attacker can write arbitrary bytes around a certain location on the heap via a crafted HTTP/2 request, possibly causing remote code execution.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "1.8.8-1ubuntu0.10", "binary_name": "haproxy" }, { "binary_version": "1.8.8-1ubuntu0.10", "binary_name": "haproxy-dbgsym" }, { "binary_version": "1.8.8-1ubuntu0.10", "binary_name": "haproxy-doc" }, { "binary_version": "1.8.8-1ubuntu0.10", "binary_name": "vim-haproxy" } ] }