[CLSA-2024:1733908866] Fix CVE(s): CVE-2023-25725
Type:
security
Severity:
Critical
Release date:
2024-12-11 09:21:12 UTC
Description:
* SECURITY UPDATE: The HTTP header parsers in HAProxy may accept empty header field names - debian/patches/CVE-2023-25725.patch: prevent empty header field names - CVE-2023-25725
Updated packages:
  • haproxy_1.6.3-1ubuntu0.3+tuxcare.els2_amd64.deb
    sha:36a7402ce556410eb8bb78a492bb77479cff16b7
  • haproxy-doc_1.6.3-1ubuntu0.3+tuxcare.els2_all.deb
    sha:a150fb9cc92d081b5b6d47f1bb2ff2a6eb5d57aa
  • vim-haproxy_1.6.3-1ubuntu0.3+tuxcare.els2_all.deb
    sha:605b9c9ce087e6412d33ad71d1a4997855892fcf
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.