DSA-4577-1 haproxy -- security update

Related Vulnerabilities: CVE-2019-19330  

Tim Düsterhus discovered that haproxy, a TCP/HTTP reverse proxy, did not properly sanitize HTTP headers when converting from HTTP/2 to HTTP/1. This would allow a remote user to perform CRLF injections. For the stable distribution (buster), this problem has been fixed in version 1.8.19-1+deb10u1. We recommend that you upgrade your haproxy packages. For the detailed security status of haproxy please refer to its security tracker page at: https://security-tracker.debian.org/tracker/haproxy

Debian Security Advisory

DSA-4577-1 haproxy -- security update

Date Reported:
28 Nov 2019
Affected Packages:
haproxy
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2019-19330.
More information:

Tim Düsterhus discovered that haproxy, a TCP/HTTP reverse proxy, did not properly sanitize HTTP headers when converting from HTTP/2 to HTTP/1. This would allow a remote user to perform CRLF injections.

For the stable distribution (buster), this problem has been fixed in version 1.8.19-1+deb10u1.

We recommend that you upgrade your haproxy packages.

For the detailed security status of haproxy please refer to its security tracker page at: https://security-tracker.debian.org/tracker/haproxy