A flaw was found in haproxy. A stemming from an inefficient algorithmic complexity issue within its bundled mjson parsing library. This vulnerability is triggered when haproxy is configured to analyze JSON content, such as with the json_query or jwt_payload_query function
This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2025:21691 https://access.redhat.com/errata/RHSA-2025:21691
This issue has been addressed in the following products: Red Hat Enterprise Linux 10.0 Extended Update Support Via RHSA-2025:21692 https://access.redhat.com/errata/RHSA-2025:21692
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:21693 https://access.redhat.com/errata/RHSA-2025:21693
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.6 Extended Update Support Via RHSA-2025:21694 https://access.redhat.com/errata/RHSA-2025:21694
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions Via RHSA-2025:22398 https://access.redhat.com/errata/RHSA-2025:22398
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.4 Extended Update Support Via RHSA-2025:22399 https://access.redhat.com/errata/RHSA-2025:22399
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions Via RHSA-2025:22422 https://access.redhat.com/errata/RHSA-2025:22422