-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Moderate: haproxy security, bug fix, and enhancement update
Advisory ID:       RHSA-2020:1725-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2020:1725
Issue date:        2020-04-28
CVE Names:         CVE-2019-18277 CVE-2019-19330 
====================================================================
1. Summary:

An update for haproxy is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64

3. Description:

The haproxy packages provide a reliable, high-performance network load
balancer for TCP and HTTP-based applications.

The following packages have been upgraded to a later upstream version:
haproxy (1.8.23). (BZ#1774745)

Security Fix(es):

* haproxy: HTTP request smuggling issue with transfer-encoding header
containing an obfuscated "chunked" value (CVE-2019-18277)

* haproxy: HTTP/2 implementation vulnerable to intermediary encapsulation
attacks (CVE-2019-19330)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat
Enterprise Linux 8.2 Release Notes linked from the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1759697 - CVE-2019-18277 haproxy: HTTP request smuggling issue with transfer-encoding header containing an obfuscated "chunked" value
1774745 - Rebase haproxy to latest upstream for RHEL 8.2
1777584 - CVE-2019-19330 haproxy: HTTP/2 implementation vulnerable to intermediary encapsulation attacks
1778844 - haproxy status failed after stopping the service

6. Package List:

Red Hat Enterprise Linux AppStream (v. 8):

Source:
haproxy-1.8.23-3.el8.src.rpm

aarch64:
haproxy-1.8.23-3.el8.aarch64.rpm
haproxy-debuginfo-1.8.23-3.el8.aarch64.rpm
haproxy-debugsource-1.8.23-3.el8.aarch64.rpm

ppc64le:
haproxy-1.8.23-3.el8.ppc64le.rpm
haproxy-debuginfo-1.8.23-3.el8.ppc64le.rpm
haproxy-debugsource-1.8.23-3.el8.ppc64le.rpm

s390x:
haproxy-1.8.23-3.el8.s390x.rpm
haproxy-debuginfo-1.8.23-3.el8.s390x.rpm
haproxy-debugsource-1.8.23-3.el8.s390x.rpm

x86_64:
haproxy-1.8.23-3.el8.x86_64.rpm
haproxy-debuginfo-1.8.23-3.el8.x86_64.rpm
haproxy-debugsource-1.8.23-3.el8.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-18277
https://access.redhat.com/security/cve/CVE-2019-19330
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.2_release_notes/index

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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C/Ds
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2020-1725:01 Moderate: haproxy security, bug fix,

An update for haproxy is now available for Red Hat Enterprise Linux 8

Summary

The haproxy packages provide a reliable, high-performance network load balancer for TCP and HTTP-based applications.
The following packages have been upgraded to a later upstream version: haproxy (1.8.23). (BZ#1774745)
Security Fix(es):
* haproxy: HTTP request smuggling issue with transfer-encoding header containing an obfuscated "chunked" value (CVE-2019-18277)
* haproxy: HTTP/2 implementation vulnerable to intermediary encapsulation attacks (CVE-2019-19330)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2019-18277 https://access.redhat.com/security/cve/CVE-2019-19330 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.2_release_notes/index

Package List

Red Hat Enterprise Linux AppStream (v. 8):
Source: haproxy-1.8.23-3.el8.src.rpm
aarch64: haproxy-1.8.23-3.el8.aarch64.rpm haproxy-debuginfo-1.8.23-3.el8.aarch64.rpm haproxy-debugsource-1.8.23-3.el8.aarch64.rpm
ppc64le: haproxy-1.8.23-3.el8.ppc64le.rpm haproxy-debuginfo-1.8.23-3.el8.ppc64le.rpm haproxy-debugsource-1.8.23-3.el8.ppc64le.rpm
s390x: haproxy-1.8.23-3.el8.s390x.rpm haproxy-debuginfo-1.8.23-3.el8.s390x.rpm haproxy-debugsource-1.8.23-3.el8.s390x.rpm
x86_64: haproxy-1.8.23-3.el8.x86_64.rpm haproxy-debuginfo-1.8.23-3.el8.x86_64.rpm haproxy-debugsource-1.8.23-3.el8.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2020:1725-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2020:1725
Issued Date: : 2020-04-28
CVE Names: CVE-2019-18277 CVE-2019-19330

Topic

An update for haproxy is now available for Red Hat Enterprise Linux 8.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64


Bugs Fixed

1759697 - CVE-2019-18277 haproxy: HTTP request smuggling issue with transfer-encoding header containing an obfuscated "chunked" value

1774745 - Rebase haproxy to latest upstream for RHEL 8.2

1777584 - CVE-2019-19330 haproxy: HTTP/2 implementation vulnerable to intermediary encapsulation attacks

1778844 - haproxy status failed after stopping the service


Related News