Source: haproxy
Version: 2.6.14-1
Severity: important
Tags: security upstream
Forwarded: https://github.com/haproxy/haproxy/issues/2237
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerability was published for haproxy.

CVE-2023-40225[0]:
| HAProxy through 2.0.32, 2.1.x and 2.2.x through 2.2.30, 2.3.x and
| 2.4.x through 2.4.23, 2.5.x and 2.6.x before 2.6.15, 2.7.x before
| 2.7.10, and 2.8.x before 2.8.2 forwards empty Content-Length
| headers, violating RFC 9110 section 8.6. In uncommon cases, an
| HTTP/1 server behind HAProxy may interpret the payload as an extra
| request.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-40225
    https://www.cve.org/CVERecord?id=CVE-2023-40225
[1] https://github.com/haproxy/haproxy/issues/2237

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to