Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2019:2626-1

Опубликовано: 03 дек. 2019
Источник: suse-cvrf

Описание

Security update for haproxy

This update for haproxy to version 2.0.10 fixes the following issues:

HAProxy was updated to 2.0.10

Security issues fixed:

  • CVE-2019-18277: Fixed a potential HTTP smuggling in messages with transfer-encoding header missing the 'chunked' (bsc#1154980).
  • Fixed an improper handling of headers which could have led to injecting LFs in H2-to-H1 transfers creating new attack space (bsc#1157712)
  • Fixed an issue where HEADER frames in idle streams are not rejected and
    thus trying to decode them HAPrpxy crashes (bsc#1157714).

Other issue addressed:

  • Macro change in the spec file (bsc#1082318)

More information regarding the release at: http://git.haproxy.org/?p=haproxy-2.0.git;a=commit;h=ac198b92d461515551b95daae20954b3053ce87e

This update was imported from the SUSE:SLE-15:Update update project.

Список пакетов

openSUSE Leap 15.0
haproxy-2.0.10+git0.ac198b92-lp150.2.16.1

Описание

A flaw was found in HAProxy before 2.0.6. In legacy mode, messages featuring a transfer-encoding header missing the "chunked" value were not being correctly rejected. The impact was limited but if combined with the "http-reuse always" setting, it could be used to help construct an HTTP request smuggling attack against a vulnerable component employing a lenient parser that would ignore the content-length header as soon as it saw a transfer-encoding one (even if not entirely valid according to the specification).


Затронутые продукты
openSUSE Leap 15.0:haproxy-2.0.10+git0.ac198b92-lp150.2.16.1

Ссылки