Bug 895849 (CVE-2014-6269) - VUL-0: CVE-2014-6269: haproxy: read out of bounds
Summary: VUL-0: CVE-2014-6269: haproxy: read out of bounds
Status: RESOLVED FIXED
Alias: CVE-2014-6269
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Deadline: 2015-03-16
Assignee: Tim Serong
QA Contact: Security Team bot
URL:
Whiteboard: maint:released:sle11-sp3-cl5:60933
Keywords:
Depends on:
Blocks:
 
Reported: 2014-09-09 15:44 UTC by Marcus Meissner
Modified: 2015-04-06 10:15 UTC (History)
4 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Marcus Meissner 2014-09-09 15:44:10 UTC
public, via oss-sec

From: Willy Tarreau <w@1wt.eu>
Subject: [oss-security] CVE Request: haproxy read out of bounds
Date: Tue, 9 Sep 2014 15:02:21 +0200

Hi,

I'd like to get a CVE ID for a new vulnerability affecting HAProxy 1.5
before 1.5.4. In short, a user can cause HAProxy to parse contents out
of a buffer by sending multiple gigs of carefully crafted chunks faster
than the target server can read them. No memory write is performed during
this phase, but the process may crash when tring to parse chunked data
out of the request buffer.

All the details and the patch are available here :

   http://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c

The fix was included in 1.5.4.

Thanks,
Willy
Comment 1 Swamp Workflow Management 2014-09-09 22:01:05 UTC
bugbot adjusting priority
Comment 2 Marcus Meissner 2014-09-10 05:56:09 UTC
CVE-2014-6269
Comment 3 Marcus Meissner 2014-09-10 13:19:33 UTC
was apparently introduced on July 10 2014 by

http://git.haproxy.org/?p=haproxy.git;a=commit;h=bb2e669f9e73531ac9cc9277b40066b701eec918

so SUSE:SLE-12:GA haproxy is affected, but SLE11 is not.
Comment 4 Marcus Rückert 2014-09-10 13:47:41 UTC
update opensuse proxy host.
Comment 7 Marcus Meissner 2014-09-11 06:26:36 UTC
solved
Comment 8 Swamp Workflow Management 2015-02-16 10:45:51 UTC
An update workflow for this issue was started.
This issue was rated as low.
Please submit fixed packages until 2015-03-16.
When done, reassign the bug to security-team@suse.de.
https://swamp.suse.de/webswamp/wf/60675
Comment 11 Swamp Workflow Management 2015-04-03 00:05:13 UTC
SUSE-SU-2015:0660-1: An update that solves one vulnerability and has one errata is now available.

Category: security (low)
Bug References: 876438,895849
CVE References: CVE-2014-6269
Sources used:
SUSE Cloud 5 (src):    haproxy-1.5.4-0.7.1
SUSE Cloud 4 (src):    haproxy-1.5.4-0.9.1