keepalived before 2.0.7 has a heap-based buffer overflow when parsing HTTP status codes resulting in DoS or possibly unspecified other impact, because extract_status_code in lib/html.c has no validation of the status code and instead writes an unlimited amount of data to the heap.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://security.gentoo.org/glsa/201903-01 | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2018/11/msg00034.html | third party advisory mailing list |
https://bugzilla.suse.com/show_bug.cgi?id=1015141 | third party advisory issue tracking |
https://github.com/acassen/keepalived/pull/961/commits/f28015671a4b04785859d1b4b1327b367b6a10e9 | third party advisory patch |
https://github.com/acassen/keepalived/pull/961 | third party advisory patch |
https://access.redhat.com/errata/RHSA-2019:0022 | third party advisory vendor advisory |
https://usn.ubuntu.com/3995-1/ | vendor advisory |
https://usn.ubuntu.com/3995-2/ | vendor advisory |
https://access.redhat.com/errata/RHSA-2019:1792 | vendor advisory |
https://access.redhat.com/errata/RHSA-2019:1945 | vendor advisory |