A flaw was found in the way HAProxy processed HTTP responses containing the "Set-Cookie2" header. This flaw could allow an attacker to send crafted HTTP response packets which lead to an infinite loop, eventually resulting in a denial of service condition. The highest threat from this vulnerability is availability.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "2.0.13-2ubuntu0.5", "binary_name": "haproxy" }, { "binary_version": "2.0.13-2ubuntu0.5", "binary_name": "haproxy-dbgsym" }, { "binary_version": "2.0.13-2ubuntu0.5", "binary_name": "haproxy-doc" }, { "binary_version": "2.0.13-2ubuntu0.5", "binary_name": "vim-haproxy" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "2.4.14-1ubuntu1", "binary_name": "haproxy" }, { "binary_version": "2.4.14-1ubuntu1", "binary_name": "haproxy-dbgsym" }, { "binary_version": "2.4.14-1ubuntu1", "binary_name": "haproxy-doc" }, { "binary_version": "2.4.14-1ubuntu1", "binary_name": "vim-haproxy" } ] }