Debian alert DSA-6017-1 (haproxy)
| From: | Salvatore Bonaccorso <carnil@debian.org> | |
| To: | debian-security-announce@lists.debian.org | |
| Subject: | [SECURITY] [DSA 6017-1] haproxy security update | |
| Date: | Fri, 03 Oct 2025 12:30:26 +0000 | |
| Message-ID: | <E1v4eva-007nQF-0i@seger.debian.org> |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-6017-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso October 03, 2025 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : haproxy CVE ID : CVE-2025-11230 Oula Kivalo reported that HAProxy, a fast and reliable load balancing reverse proxy, is prone to a denial of service vulnerability when parsing JSON numbers. For the oldstable distribution (bookworm), this problem has been fixed in version 2.6.12-1+deb12u3. For the stable distribution (trixie), this problem has been fixed in version 3.0.11-1+deb13u1. We recommend that you upgrade your haproxy packages. For the detailed security status of haproxy please refer to its security tracker page at: https://security-tracker.debian.org/tracker/haproxy Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmjfwbtfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0Sj4A/7BcgW4jmK8e9VZ5DmzRp61RX+fJd842j5Km/EXA2MlxA/4WS3Ojt+KXw0 DrjG5JgQhRmznFPFGBklsRTxY+/rmPLgHDbg3wwKEKlhRvN67+Kc1Yw2eC30w3mM fFJJ3vIknnpZBK67rdsi0vClCvcYsfiO00cKQuGiHjrppCmweh/vDuafahUkxr8c E2+M3cYWonsQ46LuDJ+lShqBQHhguwC8R5YcYYexXd/4mrhVHg0yX3xwQmW3T1LT kEHSQXea/QMjdR8ak6+7gvQOfr4slU+OtD0dPlz6/srxDNZdSrZhmMZzC38PG3fh kuWjNd6tKB8TBe2A3TWBgzrFitMug4+EDJpYGur8Dd51g23+JyOtayLCA2peJoSK arfF8tw00VC2m+RrG4XL+1L82IxUVgLJ2LfAprfrriZth/QhoObChQgf1bMzfHsI W/vDizpeSrRi+aViGzdi7ieJWa1SsNVNwMg7iM5l+unGXVUsdi2Twmx7ddFElNXn 8+xQw2v0WiTawV/Rwp8JuZ7Hj7exvU8nXl4qDfcsHAQVOl9bAaSowydwhqBJ07lO dC9Vcuy1MNnNM4mffwl2dIlZsbPJOBF5D0bob55P3KDR+sgGXW65TW/Dc+tPsNHy dm6aM8dOp7KMth0vnUx63B4pbWArgexi1k2TcKqn9S4xZC00mAI= =u/2D -----END PGP SIGNATURE-----
