SUSE Security Update: Security update for haproxy
______________________________________________________________________________

Announcement ID:    SUSE-SU-2019:3126-1
Rating:             important
References:         #1082318 #1154980 #1157712 #1157714 
Cross-References:   CVE-2019-18277
Affected Products:
                    SUSE Linux Enterprise High Availability 15-SP1
______________________________________________________________________________

   An update that solves one vulnerability and has three fixes
   is now available.

Description:

   This update for haproxy to version 2.0.10 fixes the following issues:

   HAProxy was updated to 2.0.10

   Security issues fixed:

   - CVE-2019-18277: Fixed a potential HTTP smuggling in messages with
     transfer-encoding header missing the "chunked" (bsc#1154980).
   - Fixed an improper handling of headers which could have led to injecting
     LFs in H2-to-H1 transfers creating new attack space (bsc#1157712)
   - Fixed an issue where HEADER frames in idle streams are not rejected and
     thus trying to decode them HAPrpxy crashes (bsc#1157714).

   Other issue addressed:

   - Macro change in the spec file (bsc#1082318)

   More information regarding the release at:
   http://git.haproxy.org/?p=haproxy-2.0.git;a=commit;h=ac198b92d461515551b95d
   aae20954b3053ce87e


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise High Availability 15-SP1:

      zypper in -t patch SUSE-SLE-Product-HA-15-SP1-2019-3126=1



Package List:

   - SUSE Linux Enterprise High Availability 15-SP1 (aarch64 ppc64le s390x x86_64):

      haproxy-2.0.10+git0.ac198b92-8.8.1
      haproxy-debuginfo-2.0.10+git0.ac198b92-8.8.1
      haproxy-debugsource-2.0.10+git0.ac198b92-8.8.1


References:

   https://www.suse.com/security/cve/CVE-2019-18277.html
   https://bugzilla.suse.com/1082318
   https://bugzilla.suse.com/1154980
   https://bugzilla.suse.com/1157712
   https://bugzilla.suse.com/1157714

_______________________________________________
sle-security-updates mailing list
sle-security-updates@lists.suse.com
http://lists.suse.com/mailman/listinfo/sle-security-updates

SUSE: 2019:3126-1 important: haproxy

November 29, 2019
An update that solves one vulnerability and has three fixes is now available

Summary

This update for haproxy to version 2.0.10 fixes the following issues: HAProxy was updated to 2.0.10 Security issues fixed: - CVE-2019-18277: Fixed a potential HTTP smuggling in messages with transfer-encoding header missing the "chunked" (bsc#1154980). - Fixed an improper handling of headers which could have led to injecting LFs in H2-to-H1 transfers creating new attack space (bsc#1157712) - Fixed an issue where HEADER frames in idle streams are not rejected and thus trying to decode them HAPrpxy crashes (bsc#1157714). Other issue addressed: - Macro change in the spec file (bsc#1082318) More information regarding the release at: http://git.haproxy.org/?p=haproxy-2.0.git;a=commit;h=ac198b92d461515551b95d aae20954b3053ce87e Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise High Availability 15-SP1: zypper in -t patch SUSE-SLE-Product-HA-15-SP1-2019-3126=1 Package List: - SUSE Linux Enterprise High Availability 15-SP1 (aarch64 ppc64le s390x x86_64): haproxy-2.0.10+git0.ac198b92-8.8.1 haproxy-debuginfo-2.0.10+git0.ac198b92-8.8.1 haproxy-debugsource-2.0.10+git0.ac198b92-8.8.1

References

#1082318 #1154980 #1157712 #1157714

Cross- CVE-2019-18277

Affected Products:

SUSE Linux Enterprise High Availability 15-SP1

https://www.suse.com/security/cve/CVE-2019-18277.html

https://bugzilla.suse.com/1082318

https://bugzilla.suse.com/1154980

https://bugzilla.suse.com/1157712

https://bugzilla.suse.com/1157714

Severity
Announcement ID: SUSE-SU-2019:3126-1
Rating: important

Related News