SUSE-SU-2019:3126-1

Source
https://www.suse.com/support/update/announcement/2019/suse-su-20193126-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2019:3126-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2019:3126-1
Related
Published
2019-11-29T16:21:26Z
Modified
2019-11-29T16:21:26Z
Summary
Security update for haproxy
Details

This update for haproxy to version 2.0.10 fixes the following issues:

HAProxy was updated to 2.0.10

Security issues fixed:

  • CVE-2019-18277: Fixed a potential HTTP smuggling in messages with transfer-encoding header missing the 'chunked' (bsc#1154980).
  • Fixed an improper handling of headers which could have led to injecting LFs in H2-to-H1 transfers creating new attack space (bsc#1157712)
  • Fixed an issue where HEADER frames in idle streams are not rejected and
    thus trying to decode them HAPrpxy crashes (bsc#1157714).

Other issue addressed:

  • Macro change in the spec file (bsc#1082318)

More information regarding the release at: http://git.haproxy.org/?p=haproxy-2.0.git;a=commit;h=ac198b92d461515551b95daae20954b3053ce87e

References

Affected packages

SUSE:Linux Enterprise High Availability Extension 15 SP1 / haproxy

Package

Name
haproxy
Purl
pkg:rpm/suse/haproxy&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2015%20SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.10+git0.ac198b92-8.8.1

Ecosystem specific

{
    "binaries": [
        {
            "haproxy": "2.0.10+git0.ac198b92-8.8.1"
        }
    ]
}