SB2026051603 - Fedora 43 update for haproxy



SB2026051603 - Fedora 43 update for haproxy

Published: May 16, 2026

Security Bulletin ID SB2026051603
CSH Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 vulnerabilities.


1) Input validation error (CVE-ID: CVE-2025-11230)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input when parsing number in mjson. A remote attacker can pass specially crafted input to the server and perform a denial of service (DoS) attack.


2) Inconsistent interpretation of HTTP requests (CVE-ID: CVE-2026-33555)

The vulnerability allows a remote attacker to perform HTTP request smuggling attacks.

The vulnerability exists due to improper validation of HTTP/3 requests. A remote attacker can send a specially crafted HTTP/3 request to the server and smuggle arbitrary HTTP headers.

Successful exploitation of vulnerability may allow an attacker to poison HTTP cache and perform phishing attacks.


Remediation

Install update from vendor's website.