MGASA-2025-0138

Source
https://advisories.mageia.org/MGASA-2025-0138.html
Import Source
https://advisories.mageia.org/MGASA-2025-0138.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2025-0138
Related
Published
2025-04-25T17:34:34Z
Modified
2025-04-25T17:01:51Z
Summary
Updated haproxy packages fix security vulnerability
Details

BUG/MEDIUM: sample: fix risk of overflow when replacing multiple regex back-refsAleandro Prudenzano of Doyensec and Edoardo Geraci of Codean Labs reported a bug in sampleconvregsub(), which can cause replacements of multiple back-references to overflow the temporary trash buffer. The problem happens when doing "regsub(match,replacement,g)": we're replacing every occurrence of "match" with "replacement" in the input sample, which requires a length check. For this, a max is applied, so that a replacement may not use more than the remaining length in the buffer. However, the length check is made on the replaced pattern and not on the temporary buffer used to carry the new string. This results in the remaining size to be usable for each input match, which can go beyond the temporary buffer size if more than one occurrence has to be replaced with something that's larger than the remaining room.

References
Credits

Affected packages

Mageia:9 / haproxy

Package

Name
haproxy
Purl
pkg:rpm/mageia/haproxy?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.8.14-1.1.mga9

Ecosystem specific

{
    "section": "core"
}