Security update for haproxy
Announcement ID: | SUSE-SU-2019:3126-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves one vulnerability and has three security fixes can now be installed.
Description:
This update for haproxy to version 2.0.10 fixes the following issues:
HAProxy was updated to 2.0.10
Security issues fixed:
- CVE-2019-18277: Fixed a potential HTTP smuggling in messages with transfer-encoding header missing the "chunked" (bsc#1154980).
- Fixed an improper handling of headers which could have led to injecting LFs in H2-to-H1 transfers creating new attack space (bsc#1157712)
- Fixed an issue where HEADER frames in idle streams are not rejected and
thus trying to decode them HAPrpxy crashes (bsc#1157714).
Other issue addressed:
- Macro change in the spec file (bsc#1082318)
More information regarding the release at: http://git.haproxy.org/?p=haproxy-2.0.git;a=commit;h=ac198b92d461515551b95daae20954b3053ce87e
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise High Availability Extension 15 SP1
zypper in -t patch SUSE-SLE-Product-HA-15-SP1-2019-3126=1
Package List:
-
SUSE Linux Enterprise High Availability Extension 15 SP1 (aarch64 ppc64le s390x x86_64)
- haproxy-debugsource-2.0.10+git0.ac198b92-8.8.1
- haproxy-2.0.10+git0.ac198b92-8.8.1
- haproxy-debuginfo-2.0.10+git0.ac198b92-8.8.1