{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"critical"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2023-25725","title":"Title"},{"category":"description","text":"HAProxy before 2.7.3 may allow a bypass of access control because HTTP/1 headers are inadvertently lost in some situations, aka \"request smuggling.\" The HTTP header parsers in HAProxy may accept empty header field names, which could be used to truncate the list of HTTP headers and thus make some headers disappear after being parsed and processed for HTTP/1.0 and HTTP/1.1. For HTTP/2 and HTTP/3, the impact is limited because the headers disappear before being parsed and processed, as if they had not been sent by the client. The fixed versions are 2.7.3, 2.6.9, 2.5.12, 2.4.22, 2.2.29, and 2.0.31.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2023-25725","url":"https://www.suse.com/security/cve/CVE-2023-25725"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1208132 for CVE-2023-25725","url":"https://bugzilla.suse.com/1208132"},{"category":"external","summary":"Advisory link for SUSE-CU-2023:1459-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html"},{"category":"external","summary":"Advisory link for SUSE-CU-2023:499-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html"},{"category":"external","summary":"Advisory link for SUSE-FU-2023:2117-1","url":"https://lists.suse.com/pipermail/sle-updates/2023-May/029207.html"},{"category":"external","summary":"Advisory link for SUSE-FU-2023:2119-1","url":"https://lists.suse.com/pipermail/sle-updates/2023-May/029205.html"},{"category":"external","summary":"Advisory link for SUSE-SU-2023:0411-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2023-February/013760.html"},{"category":"external","summary":"Advisory link for SUSE-SU-2023:0412-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2023-February/013763.html"},{"category":"external","summary":"Advisory link for SUSE-SU-2023:0413-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2023-February/013762.html"}],"title":"SUSE CVE CVE-2023-25725","tracking":{"current_release_date":"2025-09-29T00:16:50Z","generator":{"date":"2023-02-15T03:21:18Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2023-25725","initial_release_date":"2023-02-15T03:21:18Z","revision_history":[{"date":"2023-02-15T03:21:18Z","number":"2","summary":"Current version"},{"date":"2023-03-02T03:59:21Z","number":"3","summary":"Current version"},{"date":"2023-05-08T01:52:37Z","number":"4","summary":"Current version"},{"date":"2024-02-21T03:35:02Z","number":"5","summary":"Current version"},{"date":"2024-06-07T02:40:43Z","number":"6","summary":"Current version"},{"date":"2024-06-08T03:20:19Z","number":"7","summary":"Current version"},{"date":"2024-07-26T03:40:55Z","number":"8","summary":"Current version"},{"date":"2024-11-29T04:19:08Z","number":"9","summary":"Current version"},{"date":"2024-12-21T01:16:04Z","number":"10","summary":"Current version"},{"date":"2025-01-01T02:13:23Z","number":"11","summary":"Current version"},{"date":"2025-01-23T04:11:28Z","number":"12","summary":"Current version"},{"date":"2025-02-14T06:35:57Z","number":"13","summary":"Current version"},{"date":"2025-02-16T06:28:39Z","number":"14","summary":"Current version"},{"date":"2025-03-15T06:26:25Z","number":"15","summary":"Current version"},{"date":"2025-03-22T14:31:16Z","number":"16","summary":"Current version"},{"date":"2025-04-25T02:40:57Z","number":"17","summary":"Current version"},{"date":"2025-09-29T00:16:50Z","number":"18","summary":"Current version"}],"status":"interim","version":"18"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_name","name":"HPE Helion OpenStack 8","product":{"name":"HPE Helion OpenStack 8","product_id":"HPE Helion OpenStack 8","product_identification_helper":{"cpe":"cpe:/o:suse:hpe-helion-openstack:8"}}},{"category":"product_name","name":"SUSE Liberty Linux 9","product":{"name":"SUSE Liberty Linux 9","product_id":"SUSE Liberty Linux 9","product_identification_helper":{"cpe":"cpe:/o:suse:sll:9"}}},{"category":"product_name","name":"SUSE Linux Enterprise High Availability Extension 12 SP4","product":{"name":"SUSE Linux Enterprise High Availability Extension 12 SP4","product_id":"SUSE Linux Enterprise High Availability Extension 12 SP4","product_identification_helper":{"cpe":"cpe:/o:suse:sle-ha:12:sp4"}}},{"category":"product_name","name":"SUSE Linux Enterprise High Availability Extension 12 SP5","product":{"name":"SUSE Linux Enterprise High Availability Extension 12 SP5","product_id":"SUSE Linux Enterprise High Availability Extension 12 SP5","product_identification_helper":{"cpe":"cpe:/o:suse:sle-ha:12:sp5"}}},{"category":"product_name","name":"SUSE Linux Enterprise High Availability Extension 15 SP1","product":{"name":"SUSE Linux Enterprise High Availability Extension 15 SP1","product_id":"SUSE Linux Enterprise High Availability Extension 15 SP1","product_identification_helper":{"cpe":"cpe:/o:suse:sle-ha:15:sp1"}}},{"category":"product_name","name":"SUSE Linux Enterprise High Availability Extension 15 SP2","product":{"name":"SUSE Linux Enterprise High Availability Extension 15 SP2","product_id":"SUSE Linux Enterprise High Availability Extension 15 SP2","product_identification_helper":{"cpe":"cpe:/o:suse:sle-ha:15:sp2"}}},{"category":"product_name","name":"SUSE Linux Enterprise High Availability Extension 15 SP3","product":{"name":"SUSE Linux Enterprise High Availability Extension 15 SP3","product_id":"SUSE Linux Enterprise High Availability Extension 15 SP3","product_identification_helper":{"cpe":"cpe:/o:suse:sle-ha:15:sp3"}}},{"category":"product_name","name":"SUSE Linux Enterprise High Availability Extension 15 SP4","product":{"name":"SUSE Linux Enterprise High Availability Extension 15 SP4","product_id":"SUSE Linux Enterprise High Availability Extension 15 SP4","product_identification_helper":{"cpe":"cpe:/o:suse:sle-ha:15:sp4"}}},{"category":"product_name","name":"SUSE Linux Enterprise High Availability Extension 15 SP5","product":{"name":"SUSE Linux Enterprise High Availability Extension 15 SP5","product_id":"SUSE Linux Enterprise High Availability Extension 15 SP5","product_identification_helper":{"cpe":"cpe:/o:suse:sle-ha:15:sp5"}}},{"category":"product_name","name":"SUSE Linux Enterprise Micro 5.3","product":{"name":"SUSE Linux Enterprise Micro 5.3","product_id":"SUSE Linux Enterprise Micro 5.3","product_identification_helper":{"cpe":"cpe:/o:suse:sle-micro:5.3"}}},{"category":"product_name","name":"SUSE Linux Enterprise Server for SAP Applications 12 SP4","product":{"name":"SUSE Linux Enterprise Server for SAP Applications 12 SP4","product_id":"SUSE Linux Enterprise Server for SAP Applications 12 SP4","product_identification_helper":{"cpe":"cpe:/o:suse:sles_sap:12:sp4"}}},{"category":"product_name","name":"SUSE Linux Enterprise Server for SAP Applications 12 SP5","product":{"name":"SUSE Linux Enterprise Server for SAP Applications 12 SP5","product_id":"SUSE Linux Enterprise Server for SAP Applications 12 SP5","product_identification_helper":{"cpe":"cpe:/o:suse:sles_sap:12:sp5"}}},{"category":"product_name","name":"SUSE Linux Micro 6.0","product":{"name":"SUSE Linux Micro 6.0","product_id":"SUSE Linux Micro 6.0","product_identification_helper":{"cpe":"cpe:/o:suse:sl-micro:6.0"}}},{"category":"product_name","name":"SUSE Linux Micro 6.1","product":{"name":"SUSE Linux Micro 6.1","product_id":"SUSE Linux Micro 6.1","product_identification_helper":{"cpe":"cpe:/o:suse:sl-micro:6.1"}}},{"category":"product_name","name":"SUSE OpenStack Cloud 8","product":{"name":"SUSE OpenStack Cloud 8","product_id":"SUSE OpenStack Cloud 8","product_identification_helper":{"cpe":"cpe:/o:suse:suse-openstack-cloud:8"}}},{"category":"product_name","name":"SUSE OpenStack Cloud 9","product":{"name":"SUSE OpenStack Cloud 9","product_id":"SUSE OpenStack Cloud 9","product_identification_helper":{"cpe":"cpe:/o:suse:suse-openstack-cloud:9"}}},{"category":"product_name","name":"SUSE OpenStack Cloud Crowbar 8","product":{"name":"SUSE OpenStack Cloud Crowbar 8","product_id":"SUSE OpenStack Cloud Crowbar 8","product_identification_helper":{"cpe":"cpe:/o:suse:suse-openstack-cloud-crowbar:8"}}},{"category":"product_name","name":"SUSE OpenStack Cloud Crowbar 9","product":{"name":"SUSE OpenStack Cloud Crowbar 9","product_id":"SUSE OpenStack Cloud Crowbar 9","product_identification_helper":{"cpe":"cpe:/o:suse:suse-openstack-cloud-crowbar:9"}}},{"category":"product_name","name":"openSUSE Leap 15.4","product":{"name":"openSUSE Leap 15.4","product_id":"openSUSE Leap 15.4","product_identification_helper":{"cpe":"cpe:/o:opensuse:leap:15.4"}}},{"category":"product_name","name":"openSUSE Leap Micro 5.3","product":{"name":"openSUSE Leap Micro 5.3","product_id":"openSUSE Leap Micro 5.3","product_identification_helper":{"cpe":"cpe:/o:opensuse:leap-micro:5.3"}}},{"category":"product_name","name":"openSUSE Tumbleweed","product":{"name":"openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed","product_identification_helper":{"cpe":"cpe:/o:opensuse:tumbleweed"}}},{"category":"product_version","name":"haproxy","product":{"name":"haproxy","product_id":"haproxy","product_identification_helper":{"cpe":"cpe:2.3:a:haproxy:haproxy:*:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/haproxy@?upstream=haproxy.src.rpm"}}},{"category":"product_version","name":"haproxy-2.0.31-150100.8.31.1","product":{"name":"haproxy-2.0.31-150100.8.31.1","product_id":"haproxy-2.0.31-150100.8.31.1","product_identification_helper":{"cpe":"cpe:2.3:a:haproxy:haproxy:2.0.31:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/haproxy@2.0.31-150100.8.31.1?upstream=haproxy-2.0.31-150100.8.31.1.src.rpm"}}},{"category":"product_version","name":"haproxy-2.0.31-150200.11.20.1","product":{"name":"haproxy-2.0.31-150200.11.20.1","product_id":"haproxy-2.0.31-150200.11.20.1","product_identification_helper":{"cpe":"cpe:2.3:a:haproxy:haproxy:2.0.31:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/haproxy@2.0.31-150200.11.20.1?upstream=haproxy-2.0.31-150200.11.20.1.src.rpm"}}},{"category":"product_version","name":"haproxy-2.4.17-3.el9_1.2","product":{"name":"haproxy-2.4.17-3.el9_1.2","product_id":"haproxy-2.4.17-3.el9_1.2","product_identification_helper":{"cpe":"cpe:2.3:a:haproxy:haproxy:2.4.17:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/haproxy@2.4.17-3.el9_1.2?upstream=haproxy-2.4.17-3.el9_1.2.src.rpm"}}},{"category":"product_version","name":"haproxy-2.4.8+git0.d1f8d41e0-150400.3.10.1","product":{"name":"haproxy-2.4.8+git0.d1f8d41e0-150400.3.10.1","product_id":"haproxy-2.4.8+git0.d1f8d41e0-150400.3.10.1","product_identification_helper":{"cpe":"cpe:2.3:a:haproxy:haproxy:2.4.8+git0.d1f8d41e0:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/haproxy@2.4.8+git0.d1f8d41e0-150400.3.10.1?upstream=haproxy-2.4.8+git0.d1f8d41e0-150400.3.10.1.src.rpm"}}},{"category":"product_version","name":"haproxy-2.7.3+git0.1065b1000-1.1","product":{"name":"haproxy-2.7.3+git0.1065b1000-1.1","product_id":"haproxy-2.7.3+git0.1065b1000-1.1","product_identification_helper":{"cpe":"cpe:2.3:a:haproxy:haproxy:2.7.3+git0.1065b1000:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/haproxy@2.7.3+git0.1065b1000-1.1?upstream=haproxy-2.7.3+git0.1065b1000-1.1.src.rpm"}}},{"category":"product_version","name":"haproxy-2.8.3+git0.86e043add-1.7","product":{"name":"haproxy-2.8.3+git0.86e043add-1.7","product_id":"haproxy-2.8.3+git0.86e043add-1.7","product_identification_helper":{"cpe":"cpe:2.3:a:haproxy:haproxy:2.8.3+git0.86e043add:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/haproxy@2.8.3+git0.86e043add-1.7?upstream=haproxy-2.8.3+git0.86e043add-1.7.src.rpm"}}},{"category":"product_version","name":"haproxy-2.8.3+git0.86e043add-slfo.1.1_1.2","product":{"name":"haproxy-2.8.3+git0.86e043add-slfo.1.1_1.2","product_id":"haproxy-2.8.3+git0.86e043add-slfo.1.1_1.2","product_identification_helper":{"cpe":"cpe:2.3:a:haproxy:haproxy:2.8.3+git0.86e043add:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/haproxy@2.8.3+git0.86e043add-slfo.1.1_1.2?upstream=haproxy-2.8.3+git0.86e043add-slfo.1.1_1.2.src.rpm"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"haproxy-2.4.17-3.el9_1.2 as component of SUSE Liberty Linux 9","product_id":"SUSE Liberty Linux 9:haproxy-2.4.17-3.el9_1.2"},"product_reference":"haproxy-2.4.17-3.el9_1.2","relates_to_product_reference":"SUSE Liberty Linux 9"},{"category":"default_component_of","full_product_name":{"name":"haproxy-2.0.31-150100.8.31.1 as component of SUSE Linux Enterprise High Availability Extension 15 SP1","product_id":"SUSE Linux Enterprise High Availability Extension 15 SP1:haproxy-2.0.31-150100.8.31.1"},"product_reference":"haproxy-2.0.31-150100.8.31.1","relates_to_product_reference":"SUSE Linux Enterprise High Availability Extension 15 SP1"},{"category":"default_component_of","full_product_name":{"name":"haproxy-2.0.31-150200.11.20.1 as component of SUSE Linux Enterprise High Availability Extension 15 SP2","product_id":"SUSE Linux Enterprise High Availability Extension 15 SP2:haproxy-2.0.31-150200.11.20.1"},"product_reference":"haproxy-2.0.31-150200.11.20.1","relates_to_product_reference":"SUSE Linux Enterprise High Availability Extension 15 SP2"},{"category":"default_component_of","full_product_name":{"name":"haproxy-2.0.31-150200.11.20.1 as component of SUSE Linux Enterprise High Availability Extension 15 SP3","product_id":"SUSE Linux Enterprise High Availability Extension 15 SP3:haproxy-2.0.31-150200.11.20.1"},"product_reference":"haproxy-2.0.31-150200.11.20.1","relates_to_product_reference":"SUSE Linux Enterprise High Availability Extension 15 SP3"},{"category":"default_component_of","full_product_name":{"name":"haproxy-2.4.8+git0.d1f8d41e0-150400.3.10.1 as component of SUSE Linux Enterprise High Availability Extension 15 SP4","product_id":"SUSE Linux Enterprise High Availability Extension 15 SP4:haproxy-2.4.8+git0.d1f8d41e0-150400.3.10.1"},"product_reference":"haproxy-2.4.8+git0.d1f8d41e0-150400.3.10.1","relates_to_product_reference":"SUSE Linux Enterprise High Availability Extension 15 SP4"},{"category":"default_component_of","full_product_name":{"name":"haproxy-2.4.8+git0.d1f8d41e0-150400.3.10.1 as component of SUSE Linux Enterprise High Availability Extension 15 SP5","product_id":"SUSE Linux Enterprise High Availability Extension 15 SP5:haproxy-2.4.8+git0.d1f8d41e0-150400.3.10.1"},"product_reference":"haproxy-2.4.8+git0.d1f8d41e0-150400.3.10.1","relates_to_product_reference":"SUSE Linux Enterprise High Availability Extension 15 SP5"},{"category":"default_component_of","full_product_name":{"name":"haproxy-2.4.8+git0.d1f8d41e0-150400.3.10.1 as component of SUSE Linux Enterprise Micro 5.3","product_id":"SUSE Linux Enterprise Micro 5.3:haproxy-2.4.8+git0.d1f8d41e0-150400.3.10.1"},"product_reference":"haproxy-2.4.8+git0.d1f8d41e0-150400.3.10.1","relates_to_product_reference":"SUSE Linux Enterprise Micro 5.3"},{"category":"default_component_of","full_product_name":{"name":"haproxy-2.8.3+git0.86e043add-1.7 as component of SUSE Linux Micro 6.0","product_id":"SUSE Linux Micro 6.0:haproxy-2.8.3+git0.86e043add-1.7"},"product_reference":"haproxy-2.8.3+git0.86e043add-1.7","relates_to_product_reference":"SUSE Linux Micro 6.0"},{"category":"default_component_of","full_product_name":{"name":"haproxy-2.8.3+git0.86e043add-slfo.1.1_1.2 as component of SUSE Linux Micro 6.1","product_id":"SUSE Linux Micro 6.1:haproxy-2.8.3+git0.86e043add-slfo.1.1_1.2"},"product_reference":"haproxy-2.8.3+git0.86e043add-slfo.1.1_1.2","relates_to_product_reference":"SUSE Linux Micro 6.1"},{"category":"default_component_of","full_product_name":{"name":"haproxy-2.4.8+git0.d1f8d41e0-150400.3.10.1 as component of openSUSE Leap 15.4","product_id":"openSUSE Leap 15.4:haproxy-2.4.8+git0.d1f8d41e0-150400.3.10.1"},"product_reference":"haproxy-2.4.8+git0.d1f8d41e0-150400.3.10.1","relates_to_product_reference":"openSUSE Leap 15.4"},{"category":"default_component_of","full_product_name":{"name":"haproxy-2.4.8+git0.d1f8d41e0-150400.3.10.1 as component of openSUSE Leap Micro 5.3","product_id":"openSUSE Leap Micro 5.3:haproxy-2.4.8+git0.d1f8d41e0-150400.3.10.1"},"product_reference":"haproxy-2.4.8+git0.d1f8d41e0-150400.3.10.1","relates_to_product_reference":"openSUSE Leap Micro 5.3"},{"category":"default_component_of","full_product_name":{"name":"haproxy-2.7.3+git0.1065b1000-1.1 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:haproxy-2.7.3+git0.1065b1000-1.1"},"product_reference":"haproxy-2.7.3+git0.1065b1000-1.1","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"haproxy as component of HPE Helion OpenStack 8","product_id":"HPE Helion OpenStack 8:haproxy"},"product_reference":"haproxy","relates_to_product_reference":"HPE Helion OpenStack 8"},{"category":"default_component_of","full_product_name":{"name":"haproxy as component of SUSE Linux Enterprise High Availability Extension 12 SP4","product_id":"SUSE Linux Enterprise High Availability Extension 12 SP4:haproxy"},"product_reference":"haproxy","relates_to_product_reference":"SUSE Linux Enterprise High Availability Extension 12 SP4"},{"category":"default_component_of","full_product_name":{"name":"haproxy as component of SUSE Linux Enterprise High Availability Extension 12 SP5","product_id":"SUSE Linux Enterprise High Availability Extension 12 SP5:haproxy"},"product_reference":"haproxy","relates_to_product_reference":"SUSE Linux Enterprise High Availability Extension 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"haproxy as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4","product_id":"SUSE Linux Enterprise Server for SAP Applications 12 SP4:haproxy"},"product_reference":"haproxy","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12 SP4"},{"category":"default_component_of","full_product_name":{"name":"haproxy as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5","product_id":"SUSE Linux Enterprise Server for SAP Applications 12 SP5:haproxy"},"product_reference":"haproxy","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"haproxy as component of SUSE OpenStack Cloud 8","product_id":"SUSE OpenStack Cloud 8:haproxy"},"product_reference":"haproxy","relates_to_product_reference":"SUSE OpenStack Cloud 8"},{"category":"default_component_of","full_product_name":{"name":"haproxy as component of SUSE OpenStack Cloud 9","product_id":"SUSE OpenStack Cloud 9:haproxy"},"product_reference":"haproxy","relates_to_product_reference":"SUSE OpenStack Cloud 9"},{"category":"default_component_of","full_product_name":{"name":"haproxy as component of SUSE OpenStack Cloud Crowbar 8","product_id":"SUSE OpenStack Cloud Crowbar 8:haproxy"},"product_reference":"haproxy","relates_to_product_reference":"SUSE OpenStack Cloud Crowbar 8"},{"category":"default_component_of","full_product_name":{"name":"haproxy as component of SUSE OpenStack Cloud Crowbar 9","product_id":"SUSE OpenStack Cloud Crowbar 9:haproxy"},"product_reference":"haproxy","relates_to_product_reference":"SUSE OpenStack Cloud Crowbar 9"}]},"vulnerabilities":[{"cve":"CVE-2023-25725","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-25725"}],"notes":[{"category":"general","text":"HAProxy before 2.7.3 may allow a bypass of access control because HTTP/1 headers are inadvertently lost in some situations, aka \"request smuggling.\" The HTTP header parsers in HAProxy may accept empty header field names, which could be used to truncate the list of HTTP headers and thus make some headers disappear after being parsed and processed for HTTP/1.0 and HTTP/1.1. For HTTP/2 and HTTP/3, the impact is limited because the headers disappear before being parsed and processed, as if they had not been sent by the client. The fixed versions are 2.7.3, 2.6.9, 2.5.12, 2.4.22, 2.2.29, and 2.0.31.","title":"CVE description"}],"product_status":{"known_not_affected":["HPE Helion OpenStack 8:haproxy","SUSE Linux Enterprise High Availability Extension 12 SP4:haproxy","SUSE Linux Enterprise High Availability Extension 12 SP5:haproxy","SUSE Linux Enterprise Server for SAP Applications 12 SP4:haproxy","SUSE Linux Enterprise Server for SAP Applications 12 SP5:haproxy","SUSE OpenStack Cloud 8:haproxy","SUSE OpenStack Cloud 9:haproxy","SUSE OpenStack Cloud Crowbar 8:haproxy","SUSE OpenStack Cloud Crowbar 9:haproxy"],"recommended":["SUSE Liberty Linux 9:haproxy-2.4.17-3.el9_1.2","SUSE Linux Enterprise High Availability Extension 15 SP1:haproxy-2.0.31-150100.8.31.1","SUSE Linux Enterprise High Availability Extension 15 SP2:haproxy-2.0.31-150200.11.20.1","SUSE Linux Enterprise High Availability Extension 15 SP3:haproxy-2.0.31-150200.11.20.1","SUSE Linux Enterprise High Availability Extension 15 SP4:haproxy-2.4.8+git0.d1f8d41e0-150400.3.10.1","SUSE Linux Enterprise High Availability Extension 15 SP5:haproxy-2.4.8+git0.d1f8d41e0-150400.3.10.1","SUSE Linux Enterprise Micro 5.3:haproxy-2.4.8+git0.d1f8d41e0-150400.3.10.1","SUSE Linux Micro 6.0:haproxy-2.8.3+git0.86e043add-1.7","SUSE Linux Micro 6.1:haproxy-2.8.3+git0.86e043add-slfo.1.1_1.2","openSUSE Leap 15.4:haproxy-2.4.8+git0.d1f8d41e0-150400.3.10.1","openSUSE Leap Micro 5.3:haproxy-2.4.8+git0.d1f8d41e0-150400.3.10.1","openSUSE Tumbleweed:haproxy-2.7.3+git0.1065b1000-1.1"]},"references":[{"category":"external","summary":"CVE-2023-25725","url":"https://www.suse.com/security/cve/CVE-2023-25725"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1208132 for CVE-2023-25725","url":"https://bugzilla.suse.com/1208132"},{"category":"external","summary":"Advisory link for SUSE-CU-2023:1459-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html"},{"category":"external","summary":"Advisory link for SUSE-CU-2023:499-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html"},{"category":"external","summary":"Advisory link for SUSE-FU-2023:2117-1","url":"https://lists.suse.com/pipermail/sle-updates/2023-May/029207.html"},{"category":"external","summary":"Advisory link for SUSE-FU-2023:2119-1","url":"https://lists.suse.com/pipermail/sle-updates/2023-May/029205.html"},{"category":"external","summary":"Advisory link for SUSE-SU-2023:0411-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2023-February/013760.html"},{"category":"external","summary":"Advisory link for SUSE-SU-2023:0412-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2023-February/013763.html"},{"category":"external","summary":"Advisory link for SUSE-SU-2023:0413-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2023-February/013762.html"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Liberty Linux 9:haproxy-2.4.17-3.el9_1.2","SUSE Linux Enterprise High Availability Extension 15 SP1:haproxy-2.0.31-150100.8.31.1","SUSE Linux Enterprise High Availability Extension 15 SP2:haproxy-2.0.31-150200.11.20.1","SUSE Linux Enterprise High Availability Extension 15 SP3:haproxy-2.0.31-150200.11.20.1","SUSE Linux Enterprise High Availability Extension 15 SP4:haproxy-2.4.8+git0.d1f8d41e0-150400.3.10.1","SUSE Linux Enterprise High Availability Extension 15 SP5:haproxy-2.4.8+git0.d1f8d41e0-150400.3.10.1","SUSE Linux Enterprise Micro 5.3:haproxy-2.4.8+git0.d1f8d41e0-150400.3.10.1","SUSE Linux Micro 6.0:haproxy-2.8.3+git0.86e043add-1.7","SUSE Linux Micro 6.1:haproxy-2.8.3+git0.86e043add-slfo.1.1_1.2","openSUSE Leap 15.4:haproxy-2.4.8+git0.d1f8d41e0-150400.3.10.1","openSUSE Leap Micro 5.3:haproxy-2.4.8+git0.d1f8d41e0-150400.3.10.1","openSUSE Tumbleweed:haproxy-2.7.3+git0.1065b1000-1.1"]}],"scores":[{"cvss_v3":{"baseScore":9.3,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:L","version":"3.1"},"products":["SUSE Liberty Linux 9:haproxy-2.4.17-3.el9_1.2","SUSE Linux Enterprise High Availability Extension 15 SP1:haproxy-2.0.31-150100.8.31.1","SUSE Linux Enterprise High Availability Extension 15 SP2:haproxy-2.0.31-150200.11.20.1","SUSE Linux Enterprise High Availability Extension 15 SP3:haproxy-2.0.31-150200.11.20.1","SUSE Linux Enterprise High Availability Extension 15 SP4:haproxy-2.4.8+git0.d1f8d41e0-150400.3.10.1","SUSE Linux Enterprise High Availability Extension 15 SP5:haproxy-2.4.8+git0.d1f8d41e0-150400.3.10.1","SUSE Linux Enterprise Micro 5.3:haproxy-2.4.8+git0.d1f8d41e0-150400.3.10.1","SUSE Linux Micro 6.0:haproxy-2.8.3+git0.86e043add-1.7","SUSE Linux Micro 6.1:haproxy-2.8.3+git0.86e043add-slfo.1.1_1.2","openSUSE Leap 15.4:haproxy-2.4.8+git0.d1f8d41e0-150400.3.10.1","openSUSE Leap Micro 5.3:haproxy-2.4.8+git0.d1f8d41e0-150400.3.10.1","openSUSE Tumbleweed:haproxy-2.7.3+git0.1065b1000-1.1"]}],"threats":[{"category":"impact","date":"2023-02-10T08:15:10Z","details":"critical"}],"title":"CVE-2023-25725"}]}