Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2023-0056

Published: 18 January 2023

An uncontrolled resource consumption vulnerability was discovered in HAProxy which could crash the service. This issue could allow an authenticated remote attacker to run a specially crafted malicious server in an OpenShift cluster. The biggest impact is to availability.

Notes

AuthorNote
mdeslaur
code in bionic and earlier is different, and there is no
indication it is vulnerable to the same issue, and there is
no reproducer for this, so marking as not-affected.

Priority

Medium

Cvss 3 Severity Score

6.5

Score breakdown

Status

Package Release Status
haproxy
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(1.8.8-1ubuntu0.11)
focal
Released (2.0.29-0ubuntu1.1)
jammy
Released (2.4.18-0ubuntu1.1)
kinetic
Released (2.4.18-1ubuntu1.1)
trusty Ignored
(out of standard support)
upstream Needs triage

xenial Not vulnerable

Patches:
upstream: https://github.com/haproxy/haproxy/commit/827a6299e6995c5c3ba620d8b7cbacdaef67f2c4 (master)

Severity score breakdown

Parameter Value
Base score 6.5
Attack vector Network
Attack complexity Low
Privileges required Low
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H