First published: Tue Apr 11 2023(Updated: )
The haproxy packages provide a reliable, high-performance network load balancer for TCP and HTTP-based applications.<br>Security Fix(es):<br><li> haproxy: segfault DoS (CVE-2023-0056)</li> <li> haproxy: request smuggling attack in HTTP/1 header parsing (CVE-2023-25725)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/haproxy | <2.4.17-3.el9_1.2 | 2.4.17-3.el9_1.2 |
redhat/haproxy | <2.4.17-3.el9_1.2 | 2.4.17-3.el9_1.2 |
redhat/haproxy-debuginfo | <2.4.17-3.el9_1.2 | 2.4.17-3.el9_1.2 |
redhat/haproxy-debugsource | <2.4.17-3.el9_1.2 | 2.4.17-3.el9_1.2 |
redhat/haproxy-debuginfo | <2.4.17-3.el9_1.2 | 2.4.17-3.el9_1.2 |
redhat/haproxy-debugsource | <2.4.17-3.el9_1.2 | 2.4.17-3.el9_1.2 |
redhat/haproxy | <2.4.17-3.el9_1.2 | 2.4.17-3.el9_1.2 |
redhat/haproxy-debuginfo | <2.4.17-3.el9_1.2 | 2.4.17-3.el9_1.2 |
redhat/haproxy-debugsource | <2.4.17-3.el9_1.2 | 2.4.17-3.el9_1.2 |
redhat/haproxy | <2.4.17-3.el9_1.2.aa | 2.4.17-3.el9_1.2.aa |
redhat/haproxy-debuginfo | <2.4.17-3.el9_1.2.aa | 2.4.17-3.el9_1.2.aa |
redhat/haproxy-debugsource | <2.4.17-3.el9_1.2.aa | 2.4.17-3.el9_1.2.aa |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2023:1696 is classified as moderate.
To fix RHSA-2023:1696, update the haproxy package to version 2.4.17-3.el9_1.2 or higher.
RHSA-2023:1696 addresses a segfault DoS vulnerability (CVE-2023-0056) and an HTTP/1 request smuggling attack vulnerability (CVE-2023-25725).
The affected packages in RHSA-2023:1696 include haproxy, haproxy-debuginfo, and haproxy-debugsource.
If you are running an older version of haproxy, you should update to at least version 2.4.17-3.el9_1.2 to mitigate the vulnerabilities.