Bug 1733583 (CVE-2019-14241)

Summary: CVE-2019-14241 haproxy: DoS via vectors realted to htx_manage_client_side_cookies in proto_htx.c
Product: [Other] Security Response Reporter: Laura Pardo <lpardo>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: ahardin, bleanhar, bmontgom, bperkins, carl, ccoleman, dbecker, dedgar, eparis, hhorak, jburrell, jeremy, jgoulding, jjoyce, jokerman, jorton, jschluet, kbasil, lhh, lpeer, mburns, mchappel, nstielau, rohara, sclewis, slinaber, sponnaga
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: haproxy 1.9.9, haproxy 2.0.3 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in HAProxy versions 2.0.0 through 2.0.2 and 1.9.0 through 1.9.8. An attacker can cause a denial of service via vectors related to htx_manage_client_side_cookies in proto_htx.c. The highest threat from this vulnerability is to system availability.
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-08-23 01:07:16 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1733584    
Bug Blocks: 1733585    

Description Laura Pardo 2019-07-26 15:59:46 UTC
A vulnerability was found in HAProxy through 2.0.2. This allows attackers to cause a denial of service (ha_panic) via vectors related to htx_manage_client_side_cookies in proto_htx.c.


References:
https://github.com/haproxy/haproxy/issues/181

Comment 1 Laura Pardo 2019-07-26 16:00:31 UTC
Created haproxy tracking bugs for this issue:

Affects: fedora-all [bug 1733584]

Comment 5 Product Security DevOps Team 2019-08-23 01:07:16 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2019-14241

Comment 6 Eric Christensen 2020-04-30 13:08:25 UTC
Statement:

Red Hat Enterprise Linux, Red Hat Software Collections, and Red Hat OpenStack Platform did not package these versions and are therefore not vulnerable to this flaw.