Update for haproxy affecting Rocky Linux 8, addressing untrimmed URI fragments vulnerabilit
Reporter | Title | Published | Views | Family All 88 |
---|---|---|---|---|
AlpineLinux | CVE-2023-45539 | 28 Nov 202320:15 | β | alpinelinux |
CloudLinux | haproxy: Fix of CVE-2023-45539 | 21 Dec 202318:24 | β | cloudlinux |
RedHat Linux | (RHSA-2024:9945) Moderate: haproxy security update | 19 Nov 202400:15 | β | redhat |
RedHat Linux | (RHSA-2024:10267) Moderate: haproxy security update | 26 Nov 202400:04 | β | redhat |
RedHat Linux | (RHSA-2024:8874) Moderate: haproxy security update | 5 Nov 202400:57 | β | redhat |
RedHat Linux | (RHSA-2024:8849) Moderate: haproxy security update | 5 Nov 202400:05 | β | redhat |
RedHat Linux | (RHSA-2024:10271) Moderate: haproxy security update | 26 Nov 202400:05 | β | redhat |
RedHat Linux | (RHSA-2024:4853) Moderate: OpenShift Container Platform 4.15.24 packages and security update | 31 Jul 202400:36 | β | redhat |
RedHat Linux | (RHSA-2024:1142) Moderate: haproxy security update | 5 Mar 202415:32 | β | redhat |
RedHat Linux | (RHSA-2024:6412) Moderate: OpenShift Container Platform 4.14.36 security update | 11 Sep 202418:43 | β | redhat |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
rocky | 8 | x86_64 | haproxy | 1.8.27-5.el8_10.1 | haproxy-0:1.8.27-5.el8_10.1.x86_64.rpm |
rocky | 8 | aarch64 | haproxy-debuginfo | 1.8.27-5.el8_10.1 | haproxy-debuginfo-0:1.8.27-5.el8_10.1.aarch64.rpm |
rocky | 8 | aarch64 | haproxy | 1.8.27-5.el8_10.1 | haproxy-0:1.8.27-5.el8_10.1.aarch64.rpm |
rocky | 8 | x86_64 | haproxy-debuginfo | 1.8.27-5.el8_10.1 | haproxy-debuginfo-0:1.8.27-5.el8_10.1.x86_64.rpm |
rocky | 8 | aarch64 | haproxy-debugsource | 1.8.27-5.el8_10.1 | haproxy-debugsource-0:1.8.27-5.el8_10.1.aarch64.rpm |
rocky | 8 | x86_64 | haproxy-debugsource | 1.8.27-5.el8_10.1 | haproxy-debugsource-0:1.8.27-5.el8_10.1.x86_64.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo