Untriaged
Permalink
CVE-2026-25949
7.5 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): NONE
- Availability impact (A): HIGH
Traefik: TCP readTimeout bypass via STARTTLS on Postgres
Traefik is an HTTP reverse proxy and load balancer. Prior to 3.6.8, there is a potential vulnerability in Traefik managing STARTTLS requests. An unauthenticated client can bypass Traefik entrypoint respondingTimeouts.readTimeout by sending the 8-byte Postgres SSLRequest (STARTTLS) prelude and then stalling, causing connections to remain open indefinitely, leading to a denial of service. This vulnerability is fixed in 3.6.8.
References
-
https://github.com/traefik/traefik/security/advisories/GHSA-89p3-4642-cr2w x_refsource_CONFIRM
-
https://github.com/traefik/traefik/releases/tag/v3.6.8 x_refsource_MISC
Affected products
traefik
- ==< 3.6.8
Matching in nixpkgs
pkgs.traefik
Modern reverse proxy
Package maintainers
-
@vdemeester Vincent Demeester <vincent@sbr.pm>
-
@djds djds <git@djds.dev>
-
@NickCao Nick Cao <nickcao@nichi.co>