keepalived before 2.0.7 has a heap-based buffer overflow when parsing HTTP status codes resulting in DoS or possibly unspecified other impact, because extract_status_code in lib/html.c has no validation of the status code and instead writes an unlimited amount of data to the heap.
CPE | Name | Operator | Version |
---|---|---|---|
keepalived | eq | 1.2.24 | |
keepalived | eq | 1.2.18 | |
keepalived | eq | 1.2.5 | |
keepalived | eq | 1.2.2 | |
keepalived | eq | 0.4.9 | |
keepalived | eq | 1.3.6 | |
keepalived | eq | 1.4.1 | |
keepalived | eq | 1.2.14 | |
keepalived | eq | 1.0.0 | |
keepalived | eq | 1.1.17 |
access.redhat.com/errata/RHSA-2019:0022
access.redhat.com/errata/RHSA-2019:1792
access.redhat.com/errata/RHSA-2019:1945
bugzilla.suse.com/show_bug.cgi?id=1015141
github.com/acassen/keepalived/pull/961
github.com/acassen/keepalived/pull/961/commits/f28015671a4b04785859d1b4b1327b367b6a10e9
lists.debian.org/debian-lts-announce/2018/11/msg00034.html
security.gentoo.org/glsa/201903-01
usn.ubuntu.com/3995-1/
usn.ubuntu.com/3995-2/