HAProxy's HTTP/3 implementation fails to block a malformed HTTP header field name, and when deployed in front of a server that incorrectly process this malformed header, it may be used to conduct an HTTP request/response smuggling attack. A remote attacker may alter a legitimate user's request. As a result, the attacker may obtain sensitive information or cause a denial-of-service (DoS) condition. Reference: https://jvn.jp/en/jp/JVN38170084/ Upstream commit: https://git.haproxy.org/?p=haproxy-2.7.git;a=commit;h=3ca4223c5e1f18a19dc93b0b09ffdbd295554d46
Created haproxy tracking bugs for this issue: Affects: fedora-all [bug 2186680] Created haproxy18 tracking bugs for this issue: Affects: epel-all [bug 2186681]