Recommended update for haproxy

Announcement ID: SUSE-RU-2020:1143-1
Rating: moderate
References:
Affected Products:
  • HPE Helion OpenStack 8
  • SUSE Linux Enterprise High Availability Extension 12 SP3
  • SUSE Linux Enterprise High Availability Extension 12 SP4
  • SUSE Linux Enterprise High Availability Extension 12 SP5
  • SUSE Linux Enterprise High Performance Computing 12 SP2
  • SUSE Linux Enterprise High Performance Computing 12 SP3
  • SUSE Linux Enterprise High Performance Computing 12 SP4
  • SUSE Linux Enterprise High Performance Computing 12 SP5
  • SUSE Linux Enterprise Server 12 SP2
  • SUSE Linux Enterprise Server 12 SP3
  • SUSE Linux Enterprise Server 12 SP4
  • SUSE Linux Enterprise Server 12 SP5
  • SUSE Linux Enterprise Server for SAP Applications 12 SP3
  • SUSE Linux Enterprise Server for SAP Applications 12 SP4
  • SUSE Linux Enterprise Server for SAP Applications 12 SP5
  • SUSE OpenStack Cloud 7
  • SUSE OpenStack Cloud 8
  • SUSE OpenStack Cloud 9
  • SUSE OpenStack Cloud Crowbar 8
  • SUSE OpenStack Cloud Crowbar 9

An update that has one fix can now be installed.

Description:

This update for haproxy fixes the following issues:

Update to version 1.6.15 (bsc#1169457):

  • channel: Fix crash when trying to read from a closed socket
  • channel: Fix the definition order of channel analyzers
  • checks: segfault during tcpcheck_main
  • config: verify that targets of track-sc and stick rules are present
  • connection: update CO_FL_CONNECTED before calling the data layer
  • dns: Broken kqueue events handling (BSD systems).
  • dns: restart sockets after fork()
  • http: call manage_client_side_cookies() before erasing the buffer
  • lua: Dead lock with sockets
  • lua segmentation fault when the request is like 'GET ?arg=val HTTP/1.1'
  • lua/socket: resources not destroyed when the socket is aborted
  • map/acl: real fix segfault during show map/acl on CLI
  • map: fix a segfault when using http-request set-map
  • map: fix segfault during 'show map/acl' on cli.
  • server: Segfault after parsing server state file.
  • stats: Fix how huge POST data are read from the channel
  • stream: avoid double free on unique_id
  • stream: ensure analyzers are always called upon close
  • stream-int: do not depend on connection flags to detect connection
  • stream-int: don't re-arm recv if send fails
  • stream-int: Update the stream expiration date in stream_int_notify()
  • Use -fwrapv.

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • HPE Helion OpenStack 8
    zypper in -t patch HPE-Helion-OpenStack-8-2020-1143=1
  • SUSE OpenStack Cloud 7
    zypper in -t patch SUSE-OpenStack-Cloud-7-2020-1143=1
  • SUSE OpenStack Cloud 8
    zypper in -t patch SUSE-OpenStack-Cloud-8-2020-1143=1
  • SUSE OpenStack Cloud 9
    zypper in -t patch SUSE-OpenStack-Cloud-9-2020-1143=1
  • SUSE OpenStack Cloud Crowbar 8
    zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-8-2020-1143=1
  • SUSE OpenStack Cloud Crowbar 9
    zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-9-2020-1143=1
  • SUSE Linux Enterprise Server for SAP Applications 12 SP3
    zypper in -t patch SUSE-SLE-HA-12-SP3-2020-1143=1
  • SUSE Linux Enterprise High Availability Extension 12 SP3
    zypper in -t patch SUSE-SLE-HA-12-SP3-2020-1143=1
  • SUSE Linux Enterprise Server for SAP Applications 12 SP4
    zypper in -t patch SUSE-SLE-HA-12-SP4-2020-1143=1
  • SUSE Linux Enterprise High Availability Extension 12 SP4
    zypper in -t patch SUSE-SLE-HA-12-SP4-2020-1143=1
  • SUSE Linux Enterprise Server for SAP Applications 12 SP5
    zypper in -t patch SUSE-SLE-HA-12-SP5-2020-1143=1
  • SUSE Linux Enterprise High Availability Extension 12 SP5
    zypper in -t patch SUSE-SLE-HA-12-SP5-2020-1143=1

Package List:

  • HPE Helion OpenStack 8 (x86_64)
    • haproxy-1.6.15-11.6.1
    • haproxy-debugsource-1.6.15-11.6.1
    • haproxy-debuginfo-1.6.15-11.6.1
  • SUSE OpenStack Cloud 7 (x86_64)
    • haproxy-1.6.15-11.6.1
    • haproxy-debugsource-1.6.15-11.6.1
    • haproxy-debuginfo-1.6.15-11.6.1
  • SUSE OpenStack Cloud 8 (x86_64)
    • haproxy-1.6.15-11.6.1
    • haproxy-debugsource-1.6.15-11.6.1
    • haproxy-debuginfo-1.6.15-11.6.1
  • SUSE OpenStack Cloud 9 (x86_64)
    • haproxy-1.6.15-11.6.1
    • haproxy-debugsource-1.6.15-11.6.1
    • haproxy-debuginfo-1.6.15-11.6.1
  • SUSE OpenStack Cloud Crowbar 8 (x86_64)
    • haproxy-1.6.15-11.6.1
    • haproxy-debugsource-1.6.15-11.6.1
    • haproxy-debuginfo-1.6.15-11.6.1
  • SUSE OpenStack Cloud Crowbar 9 (x86_64)
    • haproxy-1.6.15-11.6.1
    • haproxy-debugsource-1.6.15-11.6.1
    • haproxy-debuginfo-1.6.15-11.6.1
  • SUSE Linux Enterprise Server for SAP Applications 12 SP3 (ppc64le x86_64)
    • haproxy-1.6.15-11.6.1
    • haproxy-debugsource-1.6.15-11.6.1
    • haproxy-debuginfo-1.6.15-11.6.1
  • SUSE Linux Enterprise High Availability Extension 12 SP3 (ppc64le s390x x86_64)
    • haproxy-1.6.15-11.6.1
    • haproxy-debugsource-1.6.15-11.6.1
    • haproxy-debuginfo-1.6.15-11.6.1
  • SUSE Linux Enterprise Server for SAP Applications 12 SP4 (ppc64le x86_64)
    • haproxy-1.6.15-11.6.1
    • haproxy-debugsource-1.6.15-11.6.1
    • haproxy-debuginfo-1.6.15-11.6.1
  • SUSE Linux Enterprise High Availability Extension 12 SP4 (ppc64le s390x x86_64)
    • haproxy-1.6.15-11.6.1
    • haproxy-debugsource-1.6.15-11.6.1
    • haproxy-debuginfo-1.6.15-11.6.1
  • SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64)
    • haproxy-1.6.15-11.6.1
    • haproxy-debugsource-1.6.15-11.6.1
    • haproxy-debuginfo-1.6.15-11.6.1
  • SUSE Linux Enterprise High Availability Extension 12 SP5 (ppc64le s390x x86_64)
    • haproxy-1.6.15-11.6.1
    • haproxy-debugsource-1.6.15-11.6.1
    • haproxy-debuginfo-1.6.15-11.6.1

References: