SUSE-SU-2019:0061-1

Source
https://www.suse.com/support/update/announcement/2019/suse-su-20190061-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2019:0061-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/SUSE-SU-2019:0061-1
Related
Published
2019-01-10T15:33:37Z
Modified
2019-01-10T15:33:37Z
Summary
Security update for haproxy
Details

This update for haproxy to version 1.8.15 fixes the following issues:

Security issues fixed:

  • CVE-2018-20102: Fixed an out-of-bounds read in dnsvalidatedns_response(), which allowed for memory disclosure (bsc#1119368)
  • CVE-2018-20103: Fixed an infinite recursion via crafted packet allows stack exhaustion and denial of service (bsc#1119419)

Other notable bug fixes:

  • Fix off-by-one write in dnsvalidatedns_response()
  • Fix out-of-bounds read via signedness error in dnsvalidatedns_response()
  • Prevent out-of-bounds read in dnsvalidatedns_response()
  • Prevent out-of-bounds read in dnsreadname()
  • Prevent stack-exhaustion via recursion loop in dnsreadname

For a full list of changes, please refer to: https://www.haproxy.org/download/1.8/src/CHANGELOG

References

Affected packages

SUSE:Linux Enterprise High Availability Extension 15 / haproxy

Package

Name
haproxy
Purl
pkg:rpm/suse/haproxy&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2015

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.15~git0.6b6a350a-3.6.2

Ecosystem specific

{
    "binaries": [
        {
            "haproxy": "1.8.15~git0.6b6a350a-3.6.2"
        }
    ]
}