{
  "threat_severity" : "Important",
  "public_date" : "2015-07-07T00:00:00Z",
  "bugzilla" : {
    "description" : "haproxy: information leak in buffer_slow_realign()",
    "id" : "1239072",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1239072"
  },
  "cvss" : {
    "cvss_base_score" : "5.0",
    "cvss_scoring_vector" : "AV:N/AC:L/Au:N/C:P/I:N/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-119",
  "details" : [ "The buffer_slow_realign function in HAProxy 1.5.x before 1.5.14 and 1.6-dev does not properly realign a buffer that is used for pending outgoing data, which allows remote attackers to obtain sensitive information (uninitialized memory contents of previous requests) via a crafted request.", "An implementation error related to the memory management of request and responses was found within HAProxy's buffer_slow_realign() function. An unauthenticated remote attacker could possibly use this flaw to leak certain memory buffer contents from a past request or session." ],
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "release_date" : "2015-09-08T00:00:00Z",
    "advisory" : "RHSA-2015:1741",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6",
    "package" : "haproxy-0:1.5.4-2.el6_7.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2015-09-08T00:00:00Z",
    "advisory" : "RHSA-2015:1741",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "package" : "haproxy-0:1.5.4-4.el7_1.1"
  }, {
    "product_name" : "Red Hat OpenShift Enterprise 2.2",
    "release_date" : "2015-12-17T00:00:00Z",
    "advisory" : "RHSA-2015:2666",
    "cpe" : "cpe:/a:redhat:openshift:2.0::el6",
    "package" : "haproxy15side-0:1.5.4-2.el6op"
  }, {
    "product_name" : "Red Hat OpenShift Enterprise 2.2",
    "release_date" : "2015-12-17T00:00:00Z",
    "advisory" : "RHSA-2015:2666",
    "cpe" : "cpe:/a:redhat:openshift:2.0::el6",
    "package" : "openshift-enterprise-upgrade-0:2.2.8-1.el6op"
  }, {
    "product_name" : "Red Hat OpenShift Enterprise 2.2",
    "release_date" : "2015-12-17T00:00:00Z",
    "advisory" : "RHSA-2015:2666",
    "cpe" : "cpe:/a:redhat:openshift:2.0::el6",
    "package" : "openshift-origin-broker-util-0:1.37.4.2-1.el6op"
  }, {
    "product_name" : "Red Hat OpenShift Enterprise 2.2",
    "release_date" : "2015-12-17T00:00:00Z",
    "advisory" : "RHSA-2015:2666",
    "cpe" : "cpe:/a:redhat:openshift:2.0::el6",
    "package" : "openshift-origin-cartridge-haproxy-0:1.31.4.1-1.el6op"
  }, {
    "product_name" : "Red Hat OpenShift Enterprise 2.2",
    "release_date" : "2015-12-17T00:00:00Z",
    "advisory" : "RHSA-2015:2666",
    "cpe" : "cpe:/a:redhat:openshift:2.0::el6",
    "package" : "openshift-origin-cartridge-jbosseap-0:2.27.3.1-1.el6op"
  }, {
    "product_name" : "Red Hat OpenShift Enterprise 2.2",
    "release_date" : "2015-12-17T00:00:00Z",
    "advisory" : "RHSA-2015:2666",
    "cpe" : "cpe:/a:redhat:openshift:2.0::el6",
    "package" : "openshift-origin-cartridge-jbossews-0:1.35.3.2-1.el6op"
  }, {
    "product_name" : "Red Hat OpenShift Enterprise 2.2",
    "release_date" : "2015-12-17T00:00:00Z",
    "advisory" : "RHSA-2015:2666",
    "cpe" : "cpe:/a:redhat:openshift:2.0::el6",
    "package" : "openshift-origin-cartridge-python-0:1.34.1.1-1.el6op"
  }, {
    "product_name" : "Red Hat OpenShift Enterprise 2.2",
    "release_date" : "2015-12-17T00:00:00Z",
    "advisory" : "RHSA-2015:2666",
    "cpe" : "cpe:/a:redhat:openshift:2.0::el6",
    "package" : "openshift-origin-node-util-0:1.38.5.1-1.el6op"
  }, {
    "product_name" : "Red Hat OpenShift Enterprise 2.2",
    "release_date" : "2015-12-17T00:00:00Z",
    "advisory" : "RHSA-2015:2666",
    "cpe" : "cpe:/a:redhat:openshift:2.0::el6",
    "package" : "rhc-0:1.38.4.5-1.el6op"
  }, {
    "product_name" : "Red Hat OpenShift Enterprise 2.2",
    "release_date" : "2015-12-17T00:00:00Z",
    "advisory" : "RHSA-2015:2666",
    "cpe" : "cpe:/a:redhat:openshift:2.0::el6",
    "package" : "rubygem-openshift-origin-common-0:1.29.4.1-1.el6op"
  }, {
    "product_name" : "Red Hat OpenShift Enterprise 2.2",
    "release_date" : "2015-12-17T00:00:00Z",
    "advisory" : "RHSA-2015:2666",
    "cpe" : "cpe:/a:redhat:openshift:2.0::el6",
    "package" : "rubygem-openshift-origin-controller-0:1.38.4.2-1.el6op"
  }, {
    "product_name" : "Red Hat OpenShift Enterprise 2.2",
    "release_date" : "2015-12-17T00:00:00Z",
    "advisory" : "RHSA-2015:2666",
    "cpe" : "cpe:/a:redhat:openshift:2.0::el6",
    "package" : "rubygem-openshift-origin-node-0:1.38.4.1-1.el6op"
  }, {
    "product_name" : "Red Hat OpenShift Enterprise 2.2",
    "release_date" : "2015-12-17T00:00:00Z",
    "advisory" : "RHSA-2015:2666",
    "cpe" : "cpe:/a:redhat:openshift:2.0::el6",
    "package" : "rubygem-openshift-origin-routing-daemon-0:0.26.4.4-1.el6op"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat OpenShift Enterprise 2",
    "fix_state" : "Not affected",
    "package_name" : "haproxy",
    "cpe" : "cpe:/a:redhat:openshift:2"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2015-3281\nhttps://nvd.nist.gov/vuln/detail/CVE-2015-3281" ],
  "name" : "CVE-2015-3281",
  "csaw" : false
}