Security update for haproxy

Announcement ID: SUSE-SU-2015:1776-1
Rating: moderate
References:
Cross-References:
CVSS scores:
Affected Products:
  • SUSE Cloud 5

An update that solves one vulnerability and has two security fixes can now be installed.

Description:

haxproy was updated to backport various security fixes and related patches (bsc#937202) (bsc#937042) (CVE-2015-3281)

  • BUG/MAJOR: buffers: make the buffer_slow_realign() function respect output data
  • BUG/MINOR: ssl: fix smp_fetch_ssl_fc_session_id
  • MEDIUM: ssl: replace standards DH groups with custom ones
  • BUG/MEDIUM: ssl: fix tune.ssl.default-dh-param value being overwritten
  • MINOR: ssl: add a destructor to free allocated SSL ressources
  • BUG/MINOR: ssl: Display correct filename in error message
  • MINOR: ssl: load certificates in alphabetical order
  • BUG/MEDIUM: checks: fix conflicts between agent checks and ssl healthchecks
  • BUG/MEDIUM: ssl: force a full GC in case of memory shortage
  • BUG/MEDIUM: ssl: fix bad ssl context init can cause segfault in case of OOM.
  • BUG/MINOR: ssl: correctly initialize ssl ctx for invalid certificates
  • MINOR: ssl: add statement to force some ssl options in global.
  • MINOR: ssl: add fetchs 'ssl_c_der' and 'ssl_f_der' to return DER formatted certs

Also the init script was fixed for the haproxy status checks (bsc#947204)

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Cloud 5
    zypper in -t patch sleclo50sp3-haproxy-12142=1

Package List:

  • SUSE Cloud 5 (x86_64)
    • haproxy-1.5.4-12.1

References: