Security update for haproxy

SUSE Security Update: Security update for haproxy
Announcement ID: SUSE-SU-2019:3126-1
Rating: important
References: #1082318 #1154980 #1157712 #1157714
Cross-References: CVE-2019-18277
Affected Products:
  • SUSE Linux Enterprise High Availability 15-SP1

An update that solves one vulnerability and has three fixes is now available.


This update for haproxy to version 2.0.10 fixes the following issues:
HAProxy was updated to 2.0.10
Security issues fixed:

  • CVE-2019-18277: Fixed a potential HTTP smuggling in messages with transfer-encoding header missing the "chunked" (bsc#1154980).
  • Fixed an improper handling of headers which could have led to injecting LFs in H2-to-H1 transfers creating new attack space (bsc#1157712)
  • Fixed an issue where HEADER frames in idle streams are not rejected and thus trying to decode them HAPrpxy crashes (bsc#1157714).

Other issue addressed:
  • Macro change in the spec file (bsc#1082318)

More information regarding the release at:;a=commit;h=ac198b92d461515551b95d aae20954b3053ce87e

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Linux Enterprise High Availability 15-SP1:
    zypper in -t patch SUSE-SLE-Product-HA-15-SP1-2019-3126=1

Package List:

  • SUSE Linux Enterprise High Availability 15-SP1 (aarch64 ppc64le s390x x86_64):
    • haproxy-2.0.10+git0.ac198b92-8.8.1
    • haproxy-debuginfo-2.0.10+git0.ac198b92-8.8.1
    • haproxy-debugsource-2.0.10+git0.ac198b92-8.8.1