openSUSE-SU-2019:0044-1: important: Security update for haproxy

openSUSE Security Update: Security update for haproxy

Announcement ID: openSUSE-SU-2019:0044-1
Rating: important
References: #1119368 #1119419
Cross-References: CVE-2018-20102 CVE-2018-20103
Affected Products:
openSUSE Leap 15.0

An update that fixes two vulnerabilities is now available.


This update for haproxy to version 1.8.15 fixes the following issues:

Security issues fixed:

– CVE-2018-20102: Fixed an out-of-bounds read in
dns_validate_dns_response(), which allowed for memory disclosure
– CVE-2018-20103: Fixed an infinite recursion via crafted packet allows
stack exhaustion and denial of service (bsc#1119419)

Other notable bug fixes:

– Fix off-by-one write in dns_validate_dns_response()
– Fix out-of-bounds read via signedness error in
– Prevent out-of-bounds read in dns_validate_dns_response()
– Prevent out-of-bounds read in dns_read_name()
– Prevent stack-exhaustion via recursion loop in dns_read_name

For a full list of changes, please refer to:

This update was imported from the SUSE:SLE-15:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– openSUSE Leap 15.0:

zypper in -t patch openSUSE-2019-44=1

Package List:

– openSUSE Leap 15.0 (x86_64):



To unsubscribe, e-mail:
For additional commands, e-mail: