exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2019-1792-01

Red Hat Security Advisory 2019-1792-01
Posted Jul 16, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-1792-01 - The keepalived utility provides simple and robust facilities for load balancing and high availability. The load balancing framework relies on the well-known and widely used IP Virtual Server kernel module providing layer-4 load balancing. Keepalived implements a set of checkers to dynamically and adaptively maintain and manage a load balanced server pool according to the health of the servers. Keepalived also implements the Virtual Router Redundancy Protocol to achieve high availability with director failover. Issues addressed include buffer overflow, code execution, and denial of service vulnerabilities.

tags | advisory, denial of service, overflow, kernel, vulnerability, code execution, protocol
systems | linux, redhat
advisories | CVE-2018-19115
SHA-256 | e8b2c036abafa818c2cbe9af3f514c4d681f196630ae40f766f3fd9ae158e70d

Red Hat Security Advisory 2019-1792-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Important: keepalived security update
Advisory ID: RHSA-2019:1792-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2019:1792
Issue date: 2019-07-16
CVE Names: CVE-2018-19115
====================================================================
1. Summary:

An update for keepalived is now available for Red Hat Enterprise Linux 7.5
Extended Update Support.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Server EUS (v. 7.5) - ppc64, ppc64le, s390x, x86_64

3. Description:

The keepalived utility provides simple and robust facilities for load
balancing and high availability. The load balancing framework relies on the
well-known and widely used IP Virtual Server (IPVS) kernel module providing
layer-4 (transport layer) load balancing. Keepalived implements a set of
checkers to dynamically and adaptively maintain and manage a load balanced
server pool according to the health of the servers. Keepalived also
implements the Virtual Router Redundancy Protocol (VRRPv2) to achieve high
availability with director failover.

Security Fix(es):

* keepalived: Heap-based buffer overflow when parsing HTTP status codes
allows for denial of service or possibly arbitrary code execution
(CVE-2018-19115)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1651871 - CVE-2018-19115 keepalived: Heap-based buffer overflow when parsing HTTP status codes allows for denial of service or possibly arbitrary code execution

6. Package List:

Red Hat Enterprise Linux Server EUS (v. 7.5):

Source:
keepalived-1.3.5-7.el7_5.2.src.rpm

ppc64:
keepalived-1.3.5-7.el7_5.2.ppc64.rpm
keepalived-debuginfo-1.3.5-7.el7_5.2.ppc64.rpm

ppc64le:
keepalived-1.3.5-7.el7_5.2.ppc64le.rpm
keepalived-debuginfo-1.3.5-7.el7_5.2.ppc64le.rpm

s390x:
keepalived-1.3.5-7.el7_5.2.s390x.rpm
keepalived-debuginfo-1.3.5-7.el7_5.2.s390x.rpm

x86_64:
keepalived-1.3.5-7.el7_5.2.x86_64.rpm
keepalived-debuginfo-1.3.5-7.el7_5.2.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2018-19115
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2019 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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wo33
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    43 Files
  • 20
    Aug 20th
    29 Files
  • 21
    Aug 21st
    42 Files
  • 22
    Aug 22nd
    26 Files
  • 23
    Aug 23rd
    25 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close