——————————————————————————–
Fedora Update Notification
FEDORA-2018-cb66bc33e6
2019-01-11 04:32:51.257308
——————————————————————————–
Name : haproxy
Product : Fedora 29
Version : 1.8.15
Release : 1.fc29
URL : http://www.haproxy.org/
Summary : HAProxy reverse proxy for high availability environments
Description :
HAProxy is a TCP/HTTP reverse proxy which is particularly suited for high
availability environments. Indeed, it can:
– route HTTP requests depending on statically assigned cookies
– spread load among several servers while assuring server persistence
through the use of HTTP cookies
– switch to backup servers in the event a main one fails
– accept connections to special ports dedicated to service monitoring
– stop accepting connections without breaking existing ones
– add, modify, and delete HTTP headers in both directions
– block requests matching particular patterns
– report detailed status to authenticated users from a URI
intercepted from the application
——————————————————————————–
Update Information:
Update to 1.8.15
——————————————————————————–
ChangeLog:
* Thu Dec 13 2018 Ryan O’Hara <rohara@redhat.com> – 1.8.15-1
– Update to 1.8.15
– Fix denial of service attack via infinite recursion (CVE-2018-20103, #1658881)
– Fix out-of-bound reads in dns_validate_dns_response (CVE-2018-20102, #1658882)
* Sat Dec 1 2018 Ryan O’Hara <rohara@redhat.com> – 1.8.14-2
– Use of crpyt() is not thread safe (#1643941)
——————————————————————————–
References:
[ 1 ] Bug #1658881 – CVE-2018-20103 haproxy: Infinite recursion via crafted packet allows stack exhaustion and denial of service [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1658881
[ 2 ] Bug #1658882 – CVE-2018-20102 haproxy: Out-of-bounds read in dns.c:dns_validate_dns_response() allows for memory disclosure [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1658882
——————————————————————————–
This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2018-cb66bc33e6’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org
——————————————————————————–
Fedora Update Notification
FEDORA-2018-2abadd4469
2019-01-11 02:58:39.927790
——————————————————————————–
Name : haproxy
Product : Fedora 28
Version : 1.8.15
Release : 1.fc28
URL : http://www.haproxy.org/
Summary : HAProxy reverse proxy for high availability environments
Description :
HAProxy is a TCP/HTTP reverse proxy which is particularly suited for high
availability environments. Indeed, it can:
– route HTTP requests depending on statically assigned cookies
– spread load among several servers while assuring server persistence
through the use of HTTP cookies
– switch to backup servers in the event a main one fails
– accept connections to special ports dedicated to service monitoring
– stop accepting connections without breaking existing ones
– add, modify, and delete HTTP headers in both directions
– block requests matching particular patterns
– report detailed status to authenticated users from a URI
intercepted from the application
——————————————————————————–
Update Information:
Update to 1.8.15
——————————————————————————–
ChangeLog:
* Thu Dec 13 2018 Ryan O’Hara <rohara@redhat.com> – 1.8.15-1
– Update to 1.8.15
– Fix denial of service attack via infinite recursion (CVE-2018-20103, #1658881)
– Fix out-of-bound reads in dns_validate_dns_response (CVE-2018-20102, #1658882)
* Thu Sep 20 2018 Ryan O’Hara <rohara@redhat.com> – 1.8.14-1
– Update to 1.8.14 (#1610066)
* Mon Aug 20 2018 Ryan O’Hara <rohara@redhat.com> – 1.8.13-1
– Update to 1.8.13 (#1610066)
* Thu Aug 16 2018 Ryan O’Hara <rohara@redhat.com> – 1.8.12-3
– Add BuildRequires gcc (#1604308)
* Tue Jul 10 2018 Ryan O’Hara <rohara@redhat.com> – 1.8.12-2
– Fix ownership of /var/lib/haproxy/ to avoid selinux DAC override errors (#1597076)
* Thu Jun 28 2018 Ryan O’Hara <rohara@redhat.com> – 1.8.12-1
– Update to 1.8.12 (#1580036)
* Wed Jun 27 2018 Ryan O’Hara <rohara@redhat.com> – 1.8.11-1
– Update to 1.8.11 (#1580036)
* Mon Jun 25 2018 Ryan O’Hara <rohara@redhat.com> – 1.8.10-1
– Update to 1.8.10 (#1580036)
* Mon May 21 2018 Ryan O’Hara <rohara@redhat.com> – 1.8.9-1
– Update to 1.8.9 (#1580036)
* Thu May 10 2018 Ryan O’Hara <rohara@redhat.com> – 1.8.8-2
– Build with USE_GETADDRINFO option
* Thu Apr 19 2018 Ryan O’Hara <rohara@redhat.com> – 1.8.8-1
– Update to 1.8.8 (#1560121)
* Mon Apr 9 2018 Ryan O’Hara <rohara@redhat.com> – 1.8.7-1
– Update to 1.8.7 (#1560121)
* Fri Apr 6 2018 Ryan O’Hara <rohara@redhat.com> – 1.8.6-1
– Update to 1.8.6 (#1560121)
* Mon Mar 26 2018 Ryan O’Hara <rohara@redhat.com> – 1.8.5-1
– Update to 1.8.5 (#1560121)
——————————————————————————–
References:
[ 1 ] Bug #1658881 – CVE-2018-20103 haproxy: Infinite recursion via crafted packet allows stack exhaustion and denial of service [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1658881
[ 2 ] Bug #1658882 – CVE-2018-20102 haproxy: Out-of-bounds read in dns.c:dns_validate_dns_response() allows for memory disclosure [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1658882
——————————————————————————–
This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2018-2abadd4469’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org