Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
DLA-4135-1 | haproxy security update |
![]() |
EUVD-2025-10415 | HAProxy 2.2 through 3.1.6, in certain uncommon configurations, has a sample_conv_regsub heap-based buffer overflow because of mishandling of the replacement of multiple short patterns with a longer one. |
![]() |
USN-7431-1 | HAProxy vulnerability |
![]() |
USN-7431-2 | HAProxy vulnerability |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 23 Apr 2025 22:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 09 Apr 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 09 Apr 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | haproxy: Buffer Overflow via Improper Back-Reference Replacement Length Check | |
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Wed, 09 Apr 2025 03:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | HAProxy 2.2 through 3.1.6, in certain uncommon configurations, has a sample_conv_regsub heap-based buffer overflow because of mishandling of the replacement of multiple short patterns with a longer one. | |
Weaknesses | CWE-1025 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-04-23T22:03:08.605Z
Reserved: 2025-04-09T00:00:00.000Z
Link: CVE-2025-32464

Updated: 2025-04-23T22:03:08.605Z

Status : Awaiting Analysis
Published: 2025-04-09T03:15:16.847
Modified: 2025-04-23T22:15:15.460
Link: CVE-2025-32464


Updated: 2025-07-12T16:01:46Z