First published: Thu May 09 2019(Updated: )
HAProxy before 1.9.7 mishandles a reload with rotated keys, which triggers use of uninitialized, and very predictable, HMAC keys. This is related to an include/types/ssl_sock.h error.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Haproxy Haproxy | >=1.9.2<1.9.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-11323 is a vulnerability in HAProxy versions before 1.9.7 that mishandles a reload with rotated keys, leading to the use of uninitialized and predictable HMAC keys.
The severity of CVE-2019-11323 is medium, with a severity value of 5.9.
CVE-2019-11323 affects HAProxy versions before 1.9.7, specifically when performing a reload with rotated keys.
To fix CVE-2019-11323 in HAProxy, you should update to version 1.9.7 or later.
Yes, you can refer to the following links for more information: [1] http://git.haproxy.org/?p=haproxy.git;a=commit;h=8ef706502aa2000531d36e4ac56dbdc7c30f718d [2] https://www.mail-archive.com/haproxy@formilux.org/msg33410.html