Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2019:0061-1

Опубликовано: 10 янв. 2019
Источник: suse-cvrf

Описание

Security update for haproxy

This update for haproxy to version 1.8.15 fixes the following issues:

Security issues fixed:

  • CVE-2018-20102: Fixed an out-of-bounds read in dns_validate_dns_response(), which allowed for memory disclosure (bsc#1119368)
  • CVE-2018-20103: Fixed an infinite recursion via crafted packet allows stack exhaustion and denial of service (bsc#1119419)

Other notable bug fixes:

  • Fix off-by-one write in dns_validate_dns_response()
  • Fix out-of-bounds read via signedness error in dns_validate_dns_response()
  • Prevent out-of-bounds read in dns_validate_dns_response()
  • Prevent out-of-bounds read in dns_read_name()
  • Prevent stack-exhaustion via recursion loop in dns_read_name

For a full list of changes, please refer to: https://www.haproxy.org/download/1.8/src/CHANGELOG

Список пакетов

SUSE Linux Enterprise High Availability Extension 15
haproxy-1.8.15~git0.6b6a350a-3.6.2

Описание

An out-of-bounds read in dns_validate_dns_response in dns.c was discovered in HAProxy through 1.8.14. Due to a missing check when validating DNS responses, remote attackers might be able read the 16 bytes corresponding to an AAAA record from the non-initialized part of the buffer, possibly accessing anything that was left on the stack, or even past the end of the 8193-byte buffer, depending on the value of accepted_payload_size.


Затронутые продукты
SUSE Linux Enterprise High Availability Extension 15:haproxy-1.8.15~git0.6b6a350a-3.6.2

Ссылки

Описание

An issue was discovered in dns.c in HAProxy through 1.8.14. In the case of a compressed pointer, a crafted packet can trigger infinite recursion by making the pointer point to itself, or create a long chain of valid pointers resulting in stack exhaustion.


Затронутые продукты
SUSE Linux Enterprise High Availability Extension 15:haproxy-1.8.15~git0.6b6a350a-3.6.2

Ссылки