First published: Wed Dec 21 2022(Updated: )
An uncontrolled resource consumption vulnerability was discovered in HAProxy which could crash the service. This issue could allow an authenticated remote attacker to run a specially crafted malicious server in an OpenShift cluster. The biggest impact is to availability.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/haproxy | <0:2.4.17-3.el9_1.2 | 0:2.4.17-3.el9_1.2 |
redhat/haproxy | <0:2.4.7-2.el9_0.2 | 0:2.4.7-2.el9_0.2 |
redhat/haproxy | <0:2.2.19-3.el8 | 0:2.2.19-3.el8 |
redhat/haproxy | <0:2.2.24-2.el8 | 0:2.2.24-2.el8 |
redhat/haproxy | <0:2.2.24-3.rhaos4.13.el8 | 0:2.2.24-3.rhaos4.13.el8 |
redhat/haproxy | <0:2.2.15-6.el8 | 0:2.2.15-6.el8 |
debian/haproxy | 1.8.19-1+deb10u3 1.8.19-1+deb10u4 2.2.9-2+deb11u5 2.6.12-1 2.6.15-1 | |
Haproxy Haproxy | ||
Redhat Ceph Storage | =5.0 | |
Redhat Software Collections | ||
Redhat Openshift Container Platform | =4.12 | |
Redhat Openshift Container Platform For Ibm Linuxone | =4.12 | |
Redhat Openshift Container Platform For Power | =4.12 | |
Redhat Openshift Container Platform Ibm Z Systems | =4.12 | |
Redhat Enterprise Linux | =9.0 | |
Redhat Openshift Container Platform | =4.10 | |
Redhat Openshift Container Platform | =4.11 | |
Redhat Openshift Container Platform | =4.12 | |
Redhat Openshift Container Platform | =4.10 | |
Redhat Openshift Container Platform For Ibm Linuxone | =4.10 | |
Redhat Openshift Container Platform For Power | =4.10 | |
Redhat Openshift Container Platform Ibm Z Systems | =4.10 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Openshift Container Platform | =4.11 | |
Redhat Openshift Container Platform For Ibm Linuxone | =4.11 | |
Redhat Openshift Container Platform For Power | =4.11 | |
Redhat Openshift Container Platform Ibm Z Systems | =4.11 | |
Fedoraproject Extra Packages For Enterprise Linux | =8.0 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The severity of CVE-2023-0056 is medium, with a severity value of 6.5.
CVE-2023-0056 can cause the HAProxy service to crash, impacting availability.
An authenticated remote attacker can exploit CVE-2023-0056 by running a specially crafted malicious server in an OpenShift cluster.
HAProxy versions 0:2.4.17-3.el9_1.2, 0:2.4.7-2.el9_0.2, 0:2.2.19-3.el8, 0:2.2.24-2.el8, 0:2.2.24-3.rhaos4.13.el8, and 0:2.2.15-6.el8 are affected by CVE-2023-0056.
To fix CVE-2023-0056 in HAProxy, update to version 0:2.4.17-3.el9_1.2 or apply the appropriate remedy provided by Redhat.