rhsa-2019_0547
Vulnerability from csaf_redhat
Published
2019-03-14 07:58
Modified
2024-11-15 00:40
Summary
Red Hat Security Advisory: OpenShift Container Platform 3.9 haproxy security update

Notes

Topic
An update for haproxy is now available for Red Hat OpenShift Container Platform 3.9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The haproxy packages provide a reliable, high-performance network load balancer for TCP and HTTP-based applications. Security fix(es): * haproxy: Mishandling of priority flag in short HEADERS frame by HTTP/2 decoder allows for crash (CVE-2018-20615) For more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for haproxy is now available for Red Hat OpenShift Container Platform 3.9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The haproxy packages provide a reliable, high-performance network load balancer for TCP and HTTP-based applications.\n\nSecurity fix(es):\n\n* haproxy: Mishandling of priority flag in short HEADERS frame by HTTP/2 decoder allows for crash (CVE-2018-20615)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2019:0547",
        "url": "https://access.redhat.com/errata/RHSA-2019:0547"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "1663060",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1663060"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_0547.json"
      }
    ],
    "title": "Red Hat Security Advisory: OpenShift Container Platform 3.9 haproxy security update",
    "tracking": {
      "current_release_date": "2024-11-15T00:40:08+00:00",
      "generator": {
        "date": "2024-11-15T00:40:08+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2019:0547",
      "initial_release_date": "2019-03-14T07:58:31+00:00",
      "revision_history": [
        {
          "date": "2019-03-14T07:58:31+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2019-03-14T07:58:31+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-15T00:40:08+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat OpenShift Container Platform 3.9",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 3.9",
                  "product_id": "7Server-RH7-RHOSE-3.9",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:3.9::el7"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat OpenShift Enterprise"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "haproxy-debuginfo-0:1.8.17-3.el7.x86_64",
                "product": {
                  "name": "haproxy-debuginfo-0:1.8.17-3.el7.x86_64",
                  "product_id": "haproxy-debuginfo-0:1.8.17-3.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/haproxy-debuginfo@1.8.17-3.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "haproxy18-0:1.8.17-3.el7.x86_64",
                "product": {
                  "name": "haproxy18-0:1.8.17-3.el7.x86_64",
                  "product_id": "haproxy18-0:1.8.17-3.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/haproxy18@1.8.17-3.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "haproxy-0:1.8.17-3.el7.src",
                "product": {
                  "name": "haproxy-0:1.8.17-3.el7.src",
                  "product_id": "haproxy-0:1.8.17-3.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/haproxy@1.8.17-3.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "haproxy-0:1.8.17-3.el7.src as a component of Red Hat OpenShift Container Platform 3.9",
          "product_id": "7Server-RH7-RHOSE-3.9:haproxy-0:1.8.17-3.el7.src"
        },
        "product_reference": "haproxy-0:1.8.17-3.el7.src",
        "relates_to_product_reference": "7Server-RH7-RHOSE-3.9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "haproxy-debuginfo-0:1.8.17-3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9",
          "product_id": "7Server-RH7-RHOSE-3.9:haproxy-debuginfo-0:1.8.17-3.el7.x86_64"
        },
        "product_reference": "haproxy-debuginfo-0:1.8.17-3.el7.x86_64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-3.9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "haproxy18-0:1.8.17-3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9",
          "product_id": "7Server-RH7-RHOSE-3.9:haproxy18-0:1.8.17-3.el7.x86_64"
        },
        "product_reference": "haproxy18-0:1.8.17-3.el7.x86_64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-3.9"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2018-20102",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2018-12-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1658874"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds read in dns_validate_dns_response in dns.c was discovered in HAProxy through 1.8.14. Due to a missing check when validating DNS responses, remote attackers might be able read the 16 bytes corresponding to an AAAA record from the non-initialized part of the buffer, possibly accessing anything that was left on the stack, or even past the end of the 8193-byte buffer, depending on the value of accepted_payload_size.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "haproxy: Out-of-bounds read in dns.c:dns_validate_dns_response() allows for memory disclosure",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of haproxy as shipped with Red Hat Enterprise Linux 6 and 7.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RH7-RHOSE-3.9:haproxy-0:1.8.17-3.el7.src",
          "7Server-RH7-RHOSE-3.9:haproxy-debuginfo-0:1.8.17-3.el7.x86_64",
          "7Server-RH7-RHOSE-3.9:haproxy18-0:1.8.17-3.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-20102"
        },
        {
          "category": "external",
          "summary": "RHBZ#1658874",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1658874"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-20102",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-20102"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-20102",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20102"
        },
        {
          "category": "external",
          "summary": "https://www.mail-archive.com/haproxy@formilux.org/msg32055.html",
          "url": "https://www.mail-archive.com/haproxy@formilux.org/msg32055.html"
        }
      ],
      "release_date": "2018-12-12T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-03-14T07:58:31+00:00",
          "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nSee the following documentation for important instructions on how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/3.9/release_notes/ocp_3_9_release_notes.html\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258.",
          "product_ids": [
            "7Server-RH7-RHOSE-3.9:haproxy-0:1.8.17-3.el7.src",
            "7Server-RH7-RHOSE-3.9:haproxy-debuginfo-0:1.8.17-3.el7.x86_64",
            "7Server-RH7-RHOSE-3.9:haproxy18-0:1.8.17-3.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2019:0547"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "7Server-RH7-RHOSE-3.9:haproxy-0:1.8.17-3.el7.src",
            "7Server-RH7-RHOSE-3.9:haproxy-debuginfo-0:1.8.17-3.el7.x86_64",
            "7Server-RH7-RHOSE-3.9:haproxy18-0:1.8.17-3.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "haproxy: Out-of-bounds read in dns.c:dns_validate_dns_response() allows for memory disclosure"
    },
    {
      "cve": "CVE-2018-20615",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2019-01-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1663060"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in HAProxy, versions before 1.8.17 and 1.9.1. Mishandling occurs when a priority flag is set on too short HEADERS frame in the HTTP/2 decoder, allowing an out-of-bounds read and a subsequent crash to occur. A remote attacker can exploit this flaw to cause a denial of service. Those who do not use HTTP/2 are unaffected.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "haproxy: Mishandling of priority flag in short HEADERS frame by HTTP/2 decoder allows for crash",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "HTTP/2 support was added to haproxy in version 1.8, therefore OpenShift Container Platform (OCP) 3.7 and earlier are unaffected by this flaw, see [1]. OCP 3.11 added a configuration option to ose-haproxy-router that made enabling HTTP/2 support easy, [2]. Prior to that, in versions OCP 3.9 and 3.10, an administrator had to customize the haproxy router configuration to add HTTP/2 support, [3]. OCP 3.9, and 3.10 are rated as moderate because HTTP/2 support was not a standard configuration option, and therefore unlikely to be enabled.\n\nVersions of haproxy included in Red Hat Enterprise Linux 6 and 7, excluding rh-haproxy18-haproxy in Red Hat Software Collections, are unaffected as they package versions of haproxy before 1.7.\n\n[1] http://www.haproxy.org/news.html\n\n[2] https://github.com/openshift/origin/pull/19968\n\n[3] https://docs.openshift.com/container-platform/3.10/install_config/router/customized_haproxy_router.html",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RH7-RHOSE-3.9:haproxy-0:1.8.17-3.el7.src",
          "7Server-RH7-RHOSE-3.9:haproxy-debuginfo-0:1.8.17-3.el7.x86_64",
          "7Server-RH7-RHOSE-3.9:haproxy18-0:1.8.17-3.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-20615"
        },
        {
          "category": "external",
          "summary": "RHBZ#1663060",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1663060"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-20615",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-20615"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-20615",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20615"
        }
      ],
      "release_date": "2019-01-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-03-14T07:58:31+00:00",
          "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nSee the following documentation for important instructions on how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/3.9/release_notes/ocp_3_9_release_notes.html\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258.",
          "product_ids": [
            "7Server-RH7-RHOSE-3.9:haproxy-0:1.8.17-3.el7.src",
            "7Server-RH7-RHOSE-3.9:haproxy-debuginfo-0:1.8.17-3.el7.x86_64",
            "7Server-RH7-RHOSE-3.9:haproxy18-0:1.8.17-3.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2019:0547"
        },
        {
          "category": "workaround",
          "details": "HTTP/2 support is disabled by default on OpenShift Container Platform 3.11. To mitigate this vulnerability keep it disabled. You can verify if HTTP/2 support is enabled by following the instructions in the upstream pull request, [1].\n\n[1] https://github.com/openshift/origin/pull/19968",
          "product_ids": [
            "7Server-RH7-RHOSE-3.9:haproxy-0:1.8.17-3.el7.src",
            "7Server-RH7-RHOSE-3.9:haproxy-debuginfo-0:1.8.17-3.el7.x86_64",
            "7Server-RH7-RHOSE-3.9:haproxy18-0:1.8.17-3.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "7Server-RH7-RHOSE-3.9:haproxy-0:1.8.17-3.el7.src",
            "7Server-RH7-RHOSE-3.9:haproxy-debuginfo-0:1.8.17-3.el7.x86_64",
            "7Server-RH7-RHOSE-3.9:haproxy18-0:1.8.17-3.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "haproxy: Mishandling of priority flag in short HEADERS frame by HTTP/2 decoder allows for crash"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.