haproxy is vulnerable to information disclosure attacks. The vulnerability exists as the buffer_slow_realign function in HAProxy 1.5.x before 1.5.14 and 1.6-dev does not properly realign a buffer that is used for pending outgoing data, which allows remote attackers to obtain sensitive information (uninitialized memory contents of previous requests) via a crafted request.
git.haproxy.org/?p=haproxy-1.5.git%3Ba=commit%3Bh=7ec765568883b2d4e5a2796adbeb492a22ec9bd4
git.haproxy.org/?p=haproxy-1.5.git;a=commit;h=7ec765568883b2d4e5a2796adbeb492a22ec9bd4
lists.opensuse.org/opensuse-security-announce/2015-10/msg00001.html
lists.opensuse.org/opensuse-security-announce/2015-10/msg00023.html
rhn.redhat.com/errata/RHSA-2015-1741.html
rhn.redhat.com/errata/RHSA-2015-2666.html
www.debian.org/security/2015/dsa-3301
www.haproxy.org/news.html
www.securityfocus.com/bid/75554
www.ubuntu.com/usn/USN-2668-1
access.redhat.com/errata/RHSA-2015:1741
access.redhat.com/errata/RHSA-2015:2666
access.redhat.com/security/cve/CVE-2015-3281
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=1239072
rhn.redhat.com/errata/RHSA-2015-1741.html