Vulnerability Description
A flaw was found in the way HAProxy processed HTTP responses containing the "Set-Cookie2" header. This flaw could allow an attacker to send crafted HTTP response packets which lead to an infinite loop, eventually resulting in a denial of service condition. The highest threat from this vulnerability is availability.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Haproxy | Haproxy | >= 2.2.0, < 2.2.21 |
| Redhat | Openshift Container Platform | 4.0 |
| Redhat | Software Collections | - |
| Redhat | Enterprise Linux | 7.0 |
| Debian | Debian Linux | 11.0 |
Related Weaknesses (CWE)
References
- https://access.redhat.com/security/cve/cve-2022-0711Third Party Advisory
- https://github.com/haproxy/haproxy/commit/bfb15ab34ead85f64cd6da0e9fb418c9cd14cePatchThird Party Advisory
- https://www.debian.org/security/2022/dsa-5102Third Party Advisory
- https://www.mail-archive.com/haproxy%40formilux.org/msg41833.html
- https://access.redhat.com/security/cve/cve-2022-0711Third Party Advisory
- https://github.com/haproxy/haproxy/commit/bfb15ab34ead85f64cd6da0e9fb418c9cd14cePatchThird Party Advisory
- https://www.debian.org/security/2022/dsa-5102Third Party Advisory
- https://www.mail-archive.com/haproxy%40formilux.org/msg41833.html
FAQ
What is CVE-2022-0711?
CVE-2022-0711 is a vulnerability with a CVSS score of 7.5 (HIGH). A flaw was found in the way HAProxy processed HTTP responses containing the "Set-Cookie2" header. This flaw could allow an attacker to send crafted HTTP response packets which lead to an infinite loop...
How severe is CVE-2022-0711?
CVE-2022-0711 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-0711?
Check the references section above for vendor advisories and patch information. Affected products include: Haproxy Haproxy, Redhat Openshift Container Platform, Redhat Software Collections, Redhat Enterprise Linux, Debian Debian Linux.