{"id":"USN-7067-1","summary":"haproxy vulnerability","details":"It was discovered that HAProxy did not properly limit the creation of new\nHTTP/2 streams. A remote attacker could possibly use this issue to cause\nHAProxy to consume excessive resources, leading to a denial of service.\n","modified":"2026-04-27T17:06:27.765954Z","published":"2024-10-14T12:54:08Z","related":["UBUNTU-CVE-2023-44487"],"upstream":["CVE-2023-44487","UBUNTU-CVE-2023-44487"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7067-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-44487"}],"affected":[{"package":{"name":"haproxy","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/haproxy@1.8.8-1ubuntu0.13+esm3?arch=source&distro=esm-infra/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.8.8-1ubuntu0.13+esm3"}]}],"versions":["1.7.9-1ubuntu1","1.7.9-1ubuntu2","1.8.4-1","1.8.7-1","1.8.8-1","1.8.8-1ubuntu0.1","1.8.8-1ubuntu0.2","1.8.8-1ubuntu0.3","1.8.8-1ubuntu0.4","1.8.8-1ubuntu0.6","1.8.8-1ubuntu0.7","1.8.8-1ubuntu0.8","1.8.8-1ubuntu0.9","1.8.8-1ubuntu0.10","1.8.8-1ubuntu0.11","1.8.8-1ubuntu0.13","1.8.8-1ubuntu0.13+esm2"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro","binaries":[{"binary_name":"haproxy","binary_version":"1.8.8-1ubuntu0.13+esm3"},{"binary_name":"vim-haproxy","binary_version":"1.8.8-1ubuntu0.13+esm3"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2023-44487"}],"ecosystem":"Ubuntu:Pro:18.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7067-1.json"}}],"schema_version":"1.7.5"}