An issue was discovered in dns.c in HAProxy through 1.8.14. In the case of a compressed pointer, a crafted packet can trigger infinite recursion by making the pointer point to itself, or create a long chain of valid pointers resulting in stack exhaustion. Upstream Patch: http://git.haproxy.org/?p=haproxy.git;a=commit;h=58df5aea
Created haproxy tracking bugs for this issue: Affects: fedora-all [bug 1658881]
External Reference: https://www.mail-archive.com/haproxy@formilux.org/msg32055.html
Statement: This issue did not affect the versions of haproxy as shipped with Red Hat Enterprise Linux 6 and 7.
This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS Via RHSA-2019:1436 https://access.redhat.com/errata/RHSA-2019:1436
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2018-20103