{"id":"CVE-2019-11323","details":"HAProxy before 1.9.7 mishandles a reload with rotated keys, which triggers use of uninitialized, and very predictable, HMAC keys. This is related to an include/types/ssl_sock.h error.","modified":"2026-03-14T09:31:59.517655Z","published":"2019-05-09T14:29:00.307Z","references":[{"type":"WEB","url":"http://git.haproxy.org/?p=haproxy.git%3Ba=commit%3Bh=8ef706502aa2000531d36e4ac56dbdc7c30f718d"},{"type":"WEB","url":"https://www.mail-archive.com/haproxy%40formilux.org/msg33410.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/haproxy/haproxy","events":[{"introduced":"253006deed4eacf6cc36811f430ab6ae7f6fc4dc"},{"fixed":"5c0e41b7cb740db9c0ff66d36767e0a3db44f1f6"}],"database_specific":{"versions":[{"introduced":"1.9.2"},{"fixed":"1.9.7"}]}}],"versions":["v1.9-dev2","v1.9-dev3","v1.9-dev4","v1.9-dev5","v1.9-dev6"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-11323.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}