First published: Fri Apr 14 2023(Updated: )
Traefik (pronounced traffic) is a modern HTTP reverse proxy and load balancer for deploying microservices. There is a vulnerability in Go when parsing the HTTP headers, which impacts Traefik. HTTP header parsing could allocate substantially more memory than required to hold the parsed headers. This behavior could be exploited to cause a denial of service. This issue has been patched in versions 2.9.10 and 2.10.0-rc2.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Traefik Traefik | <2.9.10 | |
Traefik Traefik | =2.10.0-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Traefik vulnerability is CVE-2023-29013.
Traefik is a modern HTTP reverse proxy and load balancer for deploying microservices.
This vulnerability in Traefik can cause substantial memory allocation when parsing HTTP headers.
Traefik versions up to and excluding 2.9.10 are affected, as well as version 2.10.0-rc1.
To fix this vulnerability, upgrade to Traefik version 2.10.0-rc2 or version 2.9.10.