Software: haproxy 2.6.15
OS: ROSA-CHROME
package_evr_string: haproxy-2.6.15-1.src.rpm
CVE-ID: CVE-2023-0836
BDU-ID: 2023-04833
CVE-Crit: HIGH
CVE-DESC.: A vulnerability in the HAProxy server software is related to incomplete cleanup of temporary or auxiliary resources. Exploitation of the vulnerability could allow an attacker acting remotely to gain access to sensitive data
CVE-STATUS: Resolved
CVE-REV: To close, run the command: sudo dnf update haproxy
CVE-ID: CVE-2023-25725
BDU-ID: 2023-00758
CVE-Crit: HIGH
CVE-DESC.: A vulnerability in the HAProxy server software is related to flaws in HTTP request processing. Exploitation of the vulnerability could allow an attacker acting remotely to perform an HTTP request smuggling attack
CVE-STATUS: Fixed
CVE-REV: To close, run the command: sudo dnf update haproxy
CVE-ID: CVE-2023-25950
BDU-ID: None
CVE-Crit: HIGH
CVE-DESC.: HTTP request/response smuggling vulnerability in HAProxy allows a remote attacker to modify a legitimate user’s request. As a result, an attacker can obtain sensitive information or cause a denial of service (DoS) condition.
CVE-STATUS: Resolved
CVE-REV: To close, run the command: sudo dnf update haproxy
CVE-ID: CVE-2023-40225
BDU-ID: 2024-02429
CVE-Crit: HIGH
CVE-DESC.: A vulnerability in the HAProxy server software is related to the forwarding of empty Content-Length headers. Exploitation of the vulnerability could allow an attacker acting remotely to perform an “HTTP request smuggling” attack
CVE-STATUS: Fixed
CVE-REV: To close, run the command: sudo dnf update haproxy