openSUSE Security Update : haproxy (openSUSE-2019-2626)

high Nessus Plugin ID 131688


The remote openSUSE host is missing a security update.


This update for haproxy to version 2.0.10 fixes the following issues :

HAProxy was updated to 2.0.10 	

Security issues fixed :

- CVE-2019-18277: Fixed a potential HTTP smuggling in messages with transfer-encoding header missing the 'chunked' (bsc#1154980).

- Fixed an improper handling of headers which could have led to injecting LFs in H2-to-H1 transfers creating new attack space (bsc#1157712)

- Fixed an issue where HEADER frames in idle streams are not rejected and thus trying to decode them HAPrpxy crashes (bsc#1157714).

Other issue addressed :

- Macro change in the spec file (bsc#1082318)

More information regarding the release at:;a=commit;h=ac198b92d46151555 1b95daae20954b3053ce87e

This update was imported from the SUSE:SLE-15:Update update project.


Update the affected haproxy packages.

See Also

Plugin Details

Severity: High

ID: 131688

File Name: openSUSE-2019-2626.nasl

Version: 1.4

Type: local

Agent: unix

Published: 12/4/2019

Updated: 1/19/2021

Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent

Risk Information


Risk Factor: Low

Score: 3.6


Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Temporal Vector: E:U/RL:OF/RC:C


Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Temporal Vector: E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:haproxy, p-cpe:/a:novell:opensuse:haproxy-debuginfo, p-cpe:/a:novell:opensuse:haproxy-debugsource, cpe:/o:novell:opensuse:15.0

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 12/3/2019

Vulnerability Publication Date: 10/23/2019

Reference Information

CVE: CVE-2019-18277