Unrated severityNVD Advisory· Published Mar 2, 2022· Updated Aug 2, 2024
CVE-2022-0711
CVE-2022-0711
Description
A flaw was found in the way HAProxy processed HTTP responses containing the "Set-Cookie2" header. This flaw could allow an attacker to send crafted HTTP response packets which lead to an infinite loop, eventually resulting in a denial of service condition. The highest threat from this vulnerability is availability.
Affected products
4- osv-coords3 versionspkg:bitnami/haproxypkg:rpm/opensuse/haproxy&distro=openSUSE%20Leap%2015.4pkg:rpm/suse/haproxy&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2015%20SP4
>= 2.2.0, < 2.2.21+ 2 more
- (no CPE)range: >= 2.2.0, < 2.2.21
- (no CPE)range: < 2.4.8+git0.d1f8d41e0-150400.3.3.13
- (no CPE)range: < 2.4.8+git0.d1f8d41e0-150400.3.3.13
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- www.debian.org/security/2022/dsa-5102mitrevendor-advisoryx_refsource_DEBIAN
- access.redhat.com/security/cve/cve-2022-0711mitrex_refsource_MISC
- github.com/haproxy/haproxy/commit/bfb15ab34ead85f64cd6da0e9fb418c9cd14cee8mitrex_refsource_MISC
- www.mail-archive.com/haproxy%40formilux.org/msg41833.htmlmitrex_refsource_MISC
News mentions
0No linked articles in our index yet.