September 2024 – CVE-2024-45506: endless loop in HTTP/2 with zero-copy forwarding in HAProxy

The latest versions of our products fix a vulnerability related to a possible endless loop in the HTTP/2 multiplexer when combined with zero-copy forwarding system in HAProxy, HAProxy Enterprise (including public and private cloud images), HAProxy ALOHA, HAProxy Kubernetes Ingress Controller, and HAProxy Enterprise Kubernetes Ingress Controller.

The issue in the HTTP/2 multiplexer allows remote attackers to trigger under very rare conditions an endless loop in HAProxy which can result in a crash.

If you are using an affected version of our product, you should upgrade to the fixed version as soon as possible or apply the workaround until you can upgrade.

Workaround

If you are not able to update right away, you can disable the zero-copy forwarding system to mitigate the issue. Add the following configuration directive in your HAProxy’s global section:

global
  …
  tune.h2.zero-copy-fwd-send off

Affected Versions & Remediation

Users of the affected products should upgrade to the fixed version as soon as possible by following the instructions below.

Amazon AMIs and Azure VHDs are available.

Affected version

Fixed version

HAProxy 3.0

3.0.4

HAProxy 2.9

2.9.10

HAProxy Enterprise 2.9r1

hapee-2.9r1-lb 1.0.0-328.475

HAProxy ALOHA 16.0

16.0.4

HAProxy Kubernetes Ingress Controller 3.0

3.0.1

HAProxy Kubernetes Ingress Controller 1.11

1.11.6

HAProxy Enterprise Kubernetes Ingress Controller 1.11

1.11.6-ee7

HAProxy Enterprise Kubernetes Ingress Controller 1.7

1.7.12-ee12

Support

If you are a customer and have questions about upgrading to the latest version, please get in touch with the HAProxy support team.

Subscribe to our blog. Get the latest release updates, tutorials, and deep-dives from HAProxy experts.