Lucene search

K
redhatcveRedhat.comRH:CVE-2020-11100
HistoryApr 02, 2020 - 1:25 p.m.

CVE-2020-11100

2020-04-0213:25:24
redhat.com
access.redhat.com
29

0.028 Low

EPSS

Percentile

90.7%

A flaw was found in the way HAProxy processed certain HTTP/2 request packets. This flaw allows an attacker to send crafted HTTP/2 request packets, which cause memory corruption, leading to a crash or potential remote arbitrary code execution with the permissions of the user running HAProxy.

Mitigation

This issue can be mitigated by not enabling support for HTTP/2 protocol. Upstream suggests that HTTP/2 can be enabled per front-end server by using the following documentation: <https://www.haproxy.com/documentation/hapee/1-8r1/traffic-management/enable-http2-protocol/&gt;.

You can check if http2 is enabled by searching your haproxy configuration files for a line containing 'h2'.

To mitigate this vulnerability in OpenShift Container Platform 3.11, keep HTTP/2 disabled as it is by default. You can verify if HTTP/2 support is enabled or not by following the instructions in following article: <https://access.redhat.com/security/vulnerabilities/haproxy&gt;

On Red Hat Enterprise Linux 8, haproxy is confined by SELinux, which should mitigate remote arbitrary code execution.