-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Critical: haproxy security update
Advisory ID:       RHSA-2020:1289-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2020:1289
Issue date:        2020-04-02
CVE Names:         CVE-2020-11100 
====================================================================
1. Summary:

An update for haproxy is now available for Red Hat Enterprise Linux 8.0
Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact
of Critical. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AppStream E4S (v. 8.0) - aarch64, ppc64le, s390x, x86_64

3. Description:

The haproxy packages provide a reliable, high-performance network load
balancer for TCP and HTTP-based applications.

Security Fix(es):

* haproxy: malformed HTTP/2 requests can lead to out-of-bounds writes
(CVE-2020-11100)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1819111 - CVE-2020-11100 haproxy: malformed HTTP/2 requests can lead to out-of-bounds writes

6. Package List:

Red Hat Enterprise Linux AppStream E4S (v. 8.0):

Source:
haproxy-1.8.15-5.el8_0.1.src.rpm

aarch64:
haproxy-1.8.15-5.el8_0.1.aarch64.rpm
haproxy-debuginfo-1.8.15-5.el8_0.1.aarch64.rpm
haproxy-debugsource-1.8.15-5.el8_0.1.aarch64.rpm

ppc64le:
haproxy-1.8.15-5.el8_0.1.ppc64le.rpm
haproxy-debuginfo-1.8.15-5.el8_0.1.ppc64le.rpm
haproxy-debugsource-1.8.15-5.el8_0.1.ppc64le.rpm

s390x:
haproxy-1.8.15-5.el8_0.1.s390x.rpm
haproxy-debuginfo-1.8.15-5.el8_0.1.s390x.rpm
haproxy-debugsource-1.8.15-5.el8_0.1.s390x.rpm

x86_64:
haproxy-1.8.15-5.el8_0.1.x86_64.rpm
haproxy-debuginfo-1.8.15-5.el8_0.1.x86_64.rpm
haproxy-debugsource-1.8.15-5.el8_0.1.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2020-11100
https://access.redhat.com/security/updates/classification/#critical
https://access.redhat.com/security/vulnerabilities/haproxy

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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cSWB
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2020-1289:01 Critical: haproxy security update

An update for haproxy is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions

Summary

The haproxy packages provide a reliable, high-performance network load balancer for TCP and HTTP-based applications.
Security Fix(es):
* haproxy: malformed HTTP/2 requests can lead to out-of-bounds writes (CVE-2020-11100)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2020-11100 https://access.redhat.com/security/updates/classification/#critical https://access.redhat.com/security/vulnerabilities/haproxy

Package List

Red Hat Enterprise Linux AppStream E4S (v. 8.0):
Source: haproxy-1.8.15-5.el8_0.1.src.rpm
aarch64: haproxy-1.8.15-5.el8_0.1.aarch64.rpm haproxy-debuginfo-1.8.15-5.el8_0.1.aarch64.rpm haproxy-debugsource-1.8.15-5.el8_0.1.aarch64.rpm
ppc64le: haproxy-1.8.15-5.el8_0.1.ppc64le.rpm haproxy-debuginfo-1.8.15-5.el8_0.1.ppc64le.rpm haproxy-debugsource-1.8.15-5.el8_0.1.ppc64le.rpm
s390x: haproxy-1.8.15-5.el8_0.1.s390x.rpm haproxy-debuginfo-1.8.15-5.el8_0.1.s390x.rpm haproxy-debugsource-1.8.15-5.el8_0.1.s390x.rpm
x86_64: haproxy-1.8.15-5.el8_0.1.x86_64.rpm haproxy-debuginfo-1.8.15-5.el8_0.1.x86_64.rpm haproxy-debugsource-1.8.15-5.el8_0.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2020:1289-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2020:1289
Issued Date: : 2020-04-02
CVE Names: CVE-2020-11100

Topic

An update for haproxy is now available for Red Hat Enterprise Linux 8.0Update Services for SAP Solutions.Red Hat Product Security has rated this update as having a security impactof Critical. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux AppStream E4S (v. 8.0) - aarch64, ppc64le, s390x, x86_64


Bugs Fixed

1819111 - CVE-2020-11100 haproxy: malformed HTTP/2 requests can lead to out-of-bounds writes


Related News