{"id":"USN-7067-1","summary":"haproxy vulnerability","details":"It was discovered that HAProxy did not properly limit the creation of new\nHTTP/2 streams. A remote attacker could possibly use this issue to cause\nHAProxy to consume excessive resources, leading to a denial of service.\n","modified":"2026-02-10T04:45:28Z","published":"2024-10-14T12:54:08Z","related":["UBUNTU-CVE-2023-44487"],"upstream":["CVE-2023-44487","UBUNTU-CVE-2023-44487"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7067-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-44487"}],"affected":[{"package":{"name":"haproxy","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/haproxy@1.8.8-1ubuntu0.13+esm3?arch=source&distro=esm-infra/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.8.8-1ubuntu0.13+esm3"}]}],"versions":["1.7.9-1ubuntu1","1.7.9-1ubuntu2","1.8.4-1","1.8.7-1","1.8.8-1","1.8.8-1ubuntu0.1","1.8.8-1ubuntu0.2","1.8.8-1ubuntu0.3","1.8.8-1ubuntu0.4","1.8.8-1ubuntu0.6","1.8.8-1ubuntu0.7","1.8.8-1ubuntu0.8","1.8.8-1ubuntu0.9","1.8.8-1ubuntu0.10","1.8.8-1ubuntu0.11","1.8.8-1ubuntu0.13","1.8.8-1ubuntu0.13+esm2"],"ecosystem_specific":{"binaries":[{"binary_name":"haproxy","binary_version":"1.8.8-1ubuntu0.13+esm3"},{"binary_name":"vim-haproxy","binary_version":"1.8.8-1ubuntu0.13+esm3"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7067-1.json","cves_map":{"ecosystem":"Ubuntu:Pro:18.04:LTS","cves":[{"id":"CVE-2023-44487","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]}]}}}],"schema_version":"1.7.3"}