A haproxy security update has been released for openSUSE Leap 15.0
openSUSE Security Update: Security update for haproxy
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:2626-1
Rating: important
References: #1082318 #1154980 #1157712 #1157714
Cross-References: CVE-2019-18277
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________
An update that solves one vulnerability and has three fixes
is now available.
Description:
This update for haproxy to version 2.0.10 fixes the following issues:
HAProxy was updated to 2.0.10
Security issues fixed:
- CVE-2019-18277: Fixed a potential HTTP smuggling in messages with
transfer-encoding header missing the "chunked" (bsc#1154980).
- Fixed an improper handling of headers which could have led to injecting
LFs in H2-to-H1 transfers creating new attack space (bsc#1157712)
- Fixed an issue where HEADER frames in idle streams are not rejected and
thus trying to decode them HAPrpxy crashes (bsc#1157714).
Other issue addressed:
- Macro change in the spec file (bsc#1082318)
More information regarding the release at:
http://git.haproxy.org/?p=haproxy-2.0.git;a=commit;h=ac198b92d461515551b95d
aae20954b3053ce87e
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2019-2626=1
Package List:
- openSUSE Leap 15.0 (x86_64):
haproxy-2.0.10+git0.ac198b92-lp150.2.16.1
haproxy-debuginfo-2.0.10+git0.ac198b92-lp150.2.16.1
haproxy-debugsource-2.0.10+git0.ac198b92-lp150.2.16.1
References:
https://www.suse.com/security/cve/CVE-2019-18277.html
https://bugzilla.suse.com/1082318
https://bugzilla.suse.com/1154980
https://bugzilla.suse.com/1157712
https://bugzilla.suse.com/1157714