Описание
Security update for haproxy
This update for haproxy to version 2.0.10 fixes the following issues:
HAProxy was updated to 2.0.10
Security issues fixed:
- CVE-2019-18277: Fixed a potential HTTP smuggling in messages with transfer-encoding header missing the 'chunked' (bsc#1154980).
- Fixed an improper handling of headers which could have led to injecting LFs in H2-to-H1 transfers creating new attack space (bsc#1157712)
- Fixed an issue where HEADER frames in idle streams are not rejected and
thus trying to decode them HAPrpxy crashes (bsc#1157714).
Other issue addressed:
- Macro change in the spec file (bsc#1082318)
More information regarding the release at: http://git.haproxy.org/?p=haproxy-2.0.git;a=commit;h=ac198b92d461515551b95daae20954b3053ce87e
Список пакетов
SUSE Linux Enterprise High Availability Extension 15
Ссылки
- Link for SUSE-SU-2019:3125-1
- E-Mail link for SUSE-SU-2019:3125-1
- SUSE Security Ratings
- SUSE Bug 1082318
- SUSE Bug 1154980
- SUSE Bug 1157712
- SUSE Bug 1157714
- SUSE CVE CVE-2019-18277 page
Описание
A flaw was found in HAProxy before 2.0.6. In legacy mode, messages featuring a transfer-encoding header missing the "chunked" value were not being correctly rejected. The impact was limited but if combined with the "http-reuse always" setting, it could be used to help construct an HTTP request smuggling attack against a vulnerable component employing a lenient parser that would ignore the content-length header as soon as it saw a transfer-encoding one (even if not entirely valid according to the specification).
Затронутые продукты
Ссылки
- CVE-2019-18277
- SUSE Bug 1154980