Name | CVE-2022-0711 |
Description | A flaw was found in the way HAProxy processed HTTP responses containing the "Set-Cookie2" header. This flaw could allow an attacker to send crafted HTTP response packets which lead to an infinite loop, eventually resulting in a denial of service condition. The highest threat from this vulnerability is availability. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DSA-5102-1 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
haproxy (PTS) | bullseye (security), bullseye | 2.2.9-2+deb11u6 | fixed |
| bookworm, bookworm (security) | 2.6.12-1+deb12u1 | fixed |
| sid, trixie | 2.9.11-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
haproxy | source | stretch | (not affected) | | | |
haproxy | source | buster | (not affected) | | | |
haproxy | source | bullseye | 2.2.9-2+deb11u3 | | DSA-5102-1 | |
haproxy | source | (unstable) | 2.4.13-1 | | | |
Notes
[buster] - haproxy <not-affected> (Vulnerable code introduced later)
[stretch] - haproxy <not-affected> (Vulnerable code introduced later)
https://bugzilla.redhat.com/show_bug.cgi?id=2053666
https://git.haproxy.org/?p=haproxy.git;a=commit;h=bfb15ab34ead85f64cd6da0e9fb418c9cd14cee8 (v2.6-dev2)
https://git.haproxy.org/?p=haproxy-2.4.git;a=commit;h=86032c309b1f42177826deaa39f7c26903a074ca (v2.4.13)
https://git.haproxy.org/?p=haproxy-2.2.git;a=commit;h=eb1bdcb7cf6e7bd1690f7dcc6d97de3d79b54cdc (v2.2.21)