It was discovered that HAProxy did not properly limit the creation of new HTTP/2 streams. A remote attacker could possibly use this issue to cause HAProxy to consume excessive resources, leading to a denial of service.
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "binary_version": "1.8.8-1ubuntu0.13+esm3", "binary_name": "haproxy" }, { "binary_version": "1.8.8-1ubuntu0.13+esm3", "binary_name": "haproxy-dbgsym" }, { "binary_version": "1.8.8-1ubuntu0.13+esm3", "binary_name": "haproxy-doc" }, { "binary_version": "1.8.8-1ubuntu0.13+esm3", "binary_name": "vim-haproxy" } ] }