Debian Security Advisory DSA-4577-1 [email protected]
https://www.debian.org/security/ Sebastien Delafond
November 28, 2019 https://www.debian.org/security/faq
Package : haproxy
CVE ID : CVE-2019-19330
Tim Düsterhus discovered that haproxy, a TCP/HTTP reverse proxy, did
not properly sanitize HTTP headers when converting from HTTP/2 to
HTTP/1. This would allow a remote user to perform CRLF injections.
For the stable distribution (buster), this problem has been fixed in
version 1.8.19-1+deb10u1.
We recommend that you upgrade your haproxy packages.
For the detailed security status of haproxy please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/haproxy
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 10 | mips64el | haproxy | < 1.8.19-1+deb10u1 | haproxy_1.8.19-1+deb10u1_mips64el.deb |
Debian | 10 | mipsel | haproxy-dbgsym | < 1.8.19-1+deb10u1 | haproxy-dbgsym_1.8.19-1+deb10u1_mipsel.deb |
Debian | 10 | ppc64el | haproxy-dbgsym | < 1.8.19-1+deb10u1 | haproxy-dbgsym_1.8.19-1+deb10u1_ppc64el.deb |
Debian | 10 | i386 | haproxy | < 1.8.19-1+deb10u1 | haproxy_1.8.19-1+deb10u1_i386.deb |
Debian | 10 | all | haproxy | < 1.8.19-1+deb10u1 | haproxy_1.8.19-1+deb10u1_all.deb |
Debian | 10 | i386 | haproxy-dbgsym | < 1.8.19-1+deb10u1 | haproxy-dbgsym_1.8.19-1+deb10u1_i386.deb |
Debian | 10 | mips | haproxy-dbgsym | < 1.8.19-1+deb10u1 | haproxy-dbgsym_1.8.19-1+deb10u1_mips.deb |
Debian | 10 | s390x | haproxy-dbgsym | < 1.8.19-1+deb10u1 | haproxy-dbgsym_1.8.19-1+deb10u1_s390x.deb |
Debian | 10 | ppc64el | haproxy | < 1.8.19-1+deb10u1 | haproxy_1.8.19-1+deb10u1_ppc64el.deb |
Debian | 10 | armhf | haproxy | < 1.8.19-1+deb10u1 | haproxy_1.8.19-1+deb10u1_armhf.deb |