Bug 2053666 (CVE-2022-0711) - CVE-2022-0711 haproxy: Denial of service via set-cookie2 header
Summary: CVE-2022-0711 haproxy: Denial of service via set-cookie2 header
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2022-0711
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2055334 2058740 2058741 2058742 2058743 2058744 2058745 2059431 2059432 2059433 2059434 2059435 2059436 2059437 2059438 2059440 2059442 2070448 2070461
Blocks: 2053667
TreeView+ depends on / blocked
 
Reported: 2022-02-11 17:35 UTC by Pedro Sampaio
Modified: 2022-06-15 20:16 UTC (History)
20 users (show)

Fixed In Version: haproxy 2.5.2
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the way HAProxy processed HTTP responses containing the "Set-Cookie2" header. This flaw could allow an attacker to send crafted HTTP response packets which lead to an infinite loop, eventually resulting in a denial of service condition. The highest threat from this vulnerability is availability.
Clone Of:
Environment:
Last Closed: 2022-03-29 10:01:11 UTC


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2022:1021 0 None None None 2022-03-29 07:01:30 UTC
Red Hat Product Errata RHSA-2022:1153 0 None None None 2022-04-11 19:45:09 UTC
Red Hat Product Errata RHSA-2022:1336 0 None None None 2022-04-20 12:17:25 UTC
Red Hat Product Errata RHSA-2022:1620 0 None None None 2022-05-04 18:19:19 UTC

Description Pedro Sampaio 2022-02-11 17:35:36 UTC
A flaw was found in haproxy. Anybody who can add a "set-cookie2 X=Y" header into the return path from their server/backend will kill haproxy in 2.2 (and onwards), resulting in a denial of service.

Comment 22 devthomp 2022-03-01 02:54:40 UTC
Created haproxy tracking bugs for this issue:

Affects: fedora-all [bug 2059440]

Comment 27 errata-xmlrpc 2022-03-29 07:01:27 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.9

Via RHSA-2022:1021 https://access.redhat.com/errata/RHSA-2022:1021

Comment 28 Product Security DevOps Team 2022-03-29 10:01:08 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-0711

Comment 29 errata-xmlrpc 2022-04-11 19:45:06 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.8

Via RHSA-2022:1153 https://access.redhat.com/errata/RHSA-2022:1153

Comment 30 errata-xmlrpc 2022-04-20 12:17:22 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.7

Via RHSA-2022:1336 https://access.redhat.com/errata/RHSA-2022:1336

Comment 31 errata-xmlrpc 2022-05-04 18:19:16 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.6

Via RHSA-2022:1620 https://access.redhat.com/errata/RHSA-2022:1620


Note You need to log in before you can comment on or make changes to this bug.