Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4135-1 | haproxy security update |
EUVD |
EUVD-2025-10415 | HAProxy 2.2 through 3.1.6, in certain uncommon configurations, has a sample_conv_regsub heap-based buffer overflow because of mishandling of the replacement of multiple short patterns with a longer one. |
Ubuntu USN |
USN-7431-1 | HAProxy vulnerability |
Ubuntu USN |
USN-7431-2 | HAProxy vulnerability |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 23 Apr 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 09 Apr 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 09 Apr 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | haproxy: Buffer Overflow via Improper Back-Reference Replacement Length Check | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Wed, 09 Apr 2025 03:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | HAProxy 2.2 through 3.1.6, in certain uncommon configurations, has a sample_conv_regsub heap-based buffer overflow because of mishandling of the replacement of multiple short patterns with a longer one. | |
| Weaknesses | CWE-1025 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-04-23T22:03:08.605Z
Reserved: 2025-04-09T00:00:00.000Z
Link: CVE-2025-32464
Updated: 2025-04-23T22:03:08.605Z
Status : Awaiting Analysis
Published: 2025-04-09T03:15:16.847
Modified: 2025-04-23T22:15:15.460
Link: CVE-2025-32464
OpenCVE Enrichment
Updated: 2025-07-12T16:01:46Z
Debian DLA
EUVD
Ubuntu USN