Bugzilla – Bug 1210505
VUL-0: CVE-2023-29013: traefik,traefik1.7: HTTP header parsing DoS
Last modified: 2024-05-28 11:37:45 UTC
CVE-2023-29013 Traefik (pronounced traffic) is a modern HTTP reverse proxy and load balancer for deploying microservices. There is a vulnerability in Go when parsing the HTTP headers, which impacts Traefik. HTTP header parsing could allocate substantially more memory than required to hold the parsed headers. This behavior could be exploited to cause a denial of service. This issue has been patched in versions 2.9.10 and 2.10.0-rc2. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29013 https://www.cve.org/CVERecord?id=CVE-2023-29013 https://github.com/traefik/traefik/commit/4ed3964b3586565519249bbdc55eb1b961c08c49 https://github.com/traefik/traefik/releases/tag/v2.10.0-rc2 https://github.com/traefik/traefik/releases/tag/v2.9.10 https://github.com/traefik/traefik/security/advisories/GHSA-7hj9-rv74-5g92
Traefik 1.7 reached EOL in 2021, we should drop it from Factory.
This issue has been fixed in https://build.opensuse.org/request/show/1093393. Traefik 1.7 is no longer available in Factory or Devel.
Done, closing.