drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Zwei Probleme in haproxy
Name: |
Zwei Probleme in haproxy |
|
ID: |
FEDORA-2018-cb66bc33e6 |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 29 |
|
Datum: |
Fr, 11. Januar 2019, 07:30 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20103
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20102 |
|
Applikationen: |
HAproxy |
|
Originalnachricht |
------------------------------------------------------------------------------- - Fedora Update Notification FEDORA-2018-cb66bc33e6 2019-01-11 04:32:51.257308 ------------------------------------------------------------------------------- -
Name : haproxy Product : Fedora 29 Version : 1.8.15 Release : 1.fc29 URL : http://www.haproxy.org/ Summary : HAProxy reverse proxy for high availability environments Description : HAProxy is a TCP/HTTP reverse proxy which is particularly suited for high availability environments. Indeed, it can: - route HTTP requests depending on statically assigned cookies - spread load among several servers while assuring server persistence through the use of HTTP cookies - switch to backup servers in the event a main one fails - accept connections to special ports dedicated to service monitoring - stop accepting connections without breaking existing ones - add, modify, and delete HTTP headers in both directions - block requests matching particular patterns - report detailed status to authenticated users from a URI intercepted from the application
------------------------------------------------------------------------------- - Update Information:
Update to 1.8.15 ------------------------------------------------------------------------------- - ChangeLog:
* Thu Dec 13 2018 Ryan O'Hara <rohara@redhat.com> - 1.8.15-1 - Update to 1.8.15 - Fix denial of service attack via infinite recursion (CVE-2018-20103, #1658881) - Fix out-of-bound reads in dns_validate_dns_response (CVE-2018-20102, #1658882) * Sat Dec 1 2018 Ryan O'Hara <rohara@redhat.com> - 1.8.14-2 - Use of crpyt() is not thread safe (#1643941) ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #1658881 - CVE-2018-20103 haproxy: Infinite recursion via crafted packet allows stack exhaustion and denial of service [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1658881 [ 2 ] Bug #1658882 - CVE-2018-20102 haproxy: Out-of-bounds read in dns.c:dns_validate_dns_response() allows for memory disclosure [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1658882 ------------------------------------------------------------------------------- -
This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2018-cb66bc33e6' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org
|
|
|
|