Vulnerability CVE-2023-25950: Information
Description
HTTP request/response smuggling vulnerability in HAProxy version 2.7.0, and 2.6.1 to 2.6.7 allows a remote attacker to alter a legitimate user's request. As a result, the attacker may obtain sensitive information or cause a denial-of-service (DoS) condition.
Severity: HIGH (7.3) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Fixed packages
Package name | Branch | Fixed in version | Version from repository | Errata ID | Task # | State |
---|---|---|---|---|---|---|
haproxy | sisyphus | 2.6.8-alt1 | 2.8.9-alt1 | ALT-PU-2023-1134-1 | 314210 | Fixed |
haproxy | sisyphus_e2k | 2.6.8-alt1 | 2.8.9-alt1 | ALT-PU-2023-2366-1 | - | Fixed |
haproxy | p10 | 2.6.13-alt1.1 | 2.6.17-alt1 | ALT-PU-2023-1942-1 | 322243 | Fixed |
haproxy | p10_e2k | 2.6.13-alt1.1 | 2.6.17-alt1 | ALT-PU-2023-3789-1 | - | Fixed |
haproxy | c10f1 | 2.6.15-alt1 | 2.6.15-alt1 | ALT-PU-2023-5064-2 | 327661 | Fixed |
haproxy | c9f2 | 2.8.2-alt1 | 2.8.2-alt1 | ALT-PU-2023-5100-3 | 327695 | Fixed |
haproxy | p11 | 2.6.8-alt1 | 2.8.9-alt1 | ALT-PU-2023-1134-1 | 314210 | Fixed |
References to Advisories, Solutions, and Tools
Hyperlink | Resource |
---|---|
https://jvn.jp/en/jp/JVN38170084/ |
|
https://www.haproxy.org/ |
|
https://git.haproxy.org/?p=haproxy-2.7.git%3Ba=commit%3Bh=3ca4223c5e1f18a19dc93b0b09ffdbd295554d46 |