First published: Tue Apr 11 2023(Updated: )
The haproxy packages provide a reliable, high-performance network load balancer for TCP and HTTP-based applications.<br>Security Fix(es):<br><li> haproxy: segfault DoS (CVE-2023-0056)</li> <li> haproxy: request smuggling attack in HTTP/1 header parsing (CVE-2023-25725)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/haproxy | <2.4.17-3.el9_1.2 | 2.4.17-3.el9_1.2 |
redhat/haproxy | <2.4.17-3.el9_1.2 | 2.4.17-3.el9_1.2 |
redhat/haproxy-debuginfo | <2.4.17-3.el9_1.2 | 2.4.17-3.el9_1.2 |
redhat/haproxy-debugsource | <2.4.17-3.el9_1.2 | 2.4.17-3.el9_1.2 |
redhat/haproxy-debuginfo | <2.4.17-3.el9_1.2 | 2.4.17-3.el9_1.2 |
redhat/haproxy-debugsource | <2.4.17-3.el9_1.2 | 2.4.17-3.el9_1.2 |
redhat/haproxy | <2.4.17-3.el9_1.2 | 2.4.17-3.el9_1.2 |
redhat/haproxy-debuginfo | <2.4.17-3.el9_1.2 | 2.4.17-3.el9_1.2 |
redhat/haproxy-debugsource | <2.4.17-3.el9_1.2 | 2.4.17-3.el9_1.2 |
redhat/haproxy | <2.4.17-3.el9_1.2.aa | 2.4.17-3.el9_1.2.aa |
redhat/haproxy-debuginfo | <2.4.17-3.el9_1.2.aa | 2.4.17-3.el9_1.2.aa |
redhat/haproxy-debugsource | <2.4.17-3.el9_1.2.aa | 2.4.17-3.el9_1.2.aa |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.