First published: Tue May 28 2019(Updated: )
It was discovered that Keepalived incorrectly handled certain HTTP status response codes. A remote attacker could use this issue to cause Keepalived to crash, resulting in a denial of service, or possibly execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/keepalived | <1:1.3.9-1ubuntu1.1 | 1:1.3.9-1ubuntu1.1 |
=18.10 | ||
All of | ||
ubuntu/keepalived | <1:1.3.9-1ubuntu0.18.04.2 | 1:1.3.9-1ubuntu0.18.04.2 |
=18.04 | ||
All of | ||
ubuntu/keepalived | <1:1.2.24-1ubuntu0.16.04.2 | 1:1.2.24-1ubuntu0.16.04.2 |
=16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Keepalived vulnerability is USN-3995-1.
The Keepalived vulnerability can cause denial of service or potentially execute arbitrary code.
Versions 1.3.9-1ubuntu1.1, 1.3.9-1ubuntu0.18.04.2, and 1.2.24-1ubuntu0.16.04.2 of Keepalived are affected by this vulnerability.
To fix this Keepalived vulnerability, update Keepalived to version 1.3.9-1ubuntu1.1 if you are using Ubuntu 18.10, 1.3.9-1ubuntu0.18.04.2 if you are using Ubuntu 18.04, or 1.2.24-1ubuntu0.16.04.2 if you are using Ubuntu 16.04.
You can find more information about this Keepalived vulnerability on the Ubuntu Security Notices page (USN-3995-1), the Ubuntu Security Advisory (CVE-2018-19115), and the Launchpad page for Keepalived.