Bug ID 1222825
Summary VUL-0: CVE-2024-28869: traefik: denial of service
Classification openSUSE
Product openSUSE Distribution
Version Leap 15.6
Hardware Other
URL https://smash.suse.de/issue/401695/
OS Other
Status NEW
Severity Major
Priority P5 - None
Component Security
Assignee alexandre.vicenzi@suse.com
Reporter smash_bz@suse.de
QA Contact security-team@suse.de
CC thomas.leroy@suse.com
Target Milestone ---
Found By Security Response Team
Blocker ---

Traefik is an HTTP reverse proxy and load balancer. In affected versions
sending a GET request to any Traefik endpoint with the "Content-length" request
header results in an indefinite hang with the default configuration. This
vulnerability can be exploited by attackers to induce a denial of service. This
vulnerability has been addressed in version 2.11.2 and 3.0.0-rc5. Users are
advised to upgrade. For affected versions, this vulnerability can be mitigated
by configuring the readTimeout option.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-28869
https://www.cve.org/CVERecord?id=CVE-2024-28869
https://doc.traefik.io/traefik/routing/entrypoints/#respondingtimeouts
https://github.com/traefik/traefik/commit/240b83b77351dfd8cadb91c305b84e9d22e0f9c6
https://github.com/traefik/traefik/releases/tag/v2.11.2
https://github.com/traefik/traefik/releases/tag/v3.0.0-rc5
https://github.com/traefik/traefik/security/advisories/GHSA-4vwx-54mw-vqfw
https://bugzilla.redhat.com/show_bug.cgi?id=2274987


You are receiving this mail because: