In hpackdhtinsert in hpack-tbl.c in the HPACK decoder in HAProxy 1.8 through 2.x before 2.1.4, a remote attacker can write arbitrary bytes around a certain location on the heap via a crafted HTTP/2 request, possibly causing remote code execution.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "haproxy", "binary_version": "1.8.8-1ubuntu0.10" }, { "binary_name": "haproxy-dbgsym", "binary_version": "1.8.8-1ubuntu0.10" }, { "binary_name": "haproxy-doc", "binary_version": "1.8.8-1ubuntu0.10" }, { "binary_name": "vim-haproxy", "binary_version": "1.8.8-1ubuntu0.10" } ] }