Security update for dhcp
Announcement ID: | SUSE-SU-2016:0540-1 |
---|---|
Rating: | moderate |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves one vulnerability and has 11 security fixes can now be installed.
Description:
This update for dhcp fixes the following issues:
- CVE-2015-8605: A remote attacker could have used badly formed packets with an invalid IPv4 UDP length field to cause a DHCP server, client, or relay program to terminate abnormally (bsc#961305)
The following bugs were fixed:
- bsc#936923: Improper lease duration checking
- bsc#880984: Integer overflows in the date and time handling code
- bsc#956159: fixed service files to start dhcpd after slapd
- bsc#960506: Improve exit reason and logging when /sbin/dhclient-script is unable to pre-init requested interface
- bsc#947780: DHCP server could abort with "Unable to set up timer: out of range" on very long or infinite timer intervals / lease lifetimes
- bsc#912098: dhclient could pretend to run while silently declining leases
- bsc#919959: server: Do not log success report before send reported success
- bsc#928390: dhclient dit not expose next-server DHCPv4 option to script
- bsc#926159: DHCP preferrend and valid lifetime would be logged incorrectly
- bsc#910686: Prevent a dependency conflict of dhcp-devel with bind-devel package
The following tracked changes affect the build of the package only:
- bsc#891961: Disabled /sbin/service legacy-action hooks
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Desktop 12
zypper in -t patch SUSE-SLE-DESKTOP-12-2016-293=1
-
SUSE Linux Enterprise Software Development Kit 12
zypper in -t patch SUSE-SLE-SDK-12-2016-293=1
-
SUSE Linux Enterprise Server 12
zypper in -t patch SUSE-SLE-SERVER-12-2016-293=1
-
SUSE Linux Enterprise Server for SAP Applications 12
zypper in -t patch SUSE-SLE-SERVER-12-2016-293=1
Package List:
-
SUSE Linux Enterprise Desktop 12 (x86_64)
- dhcp-debuginfo-4.2.6-14.3.1
- dhcp-debugsource-4.2.6-14.3.1
- dhcp-client-debuginfo-4.2.6-14.3.1
- dhcp-4.2.6-14.3.1
- dhcp-client-4.2.6-14.3.1
-
SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64)
- dhcp-debugsource-4.2.6-14.3.1
- dhcp-devel-4.2.6-14.3.1
- dhcp-debuginfo-4.2.6-14.3.1
-
SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64)
- dhcp-debuginfo-4.2.6-14.3.1
- dhcp-debugsource-4.2.6-14.3.1
- dhcp-relay-4.2.6-14.3.1
- dhcp-server-debuginfo-4.2.6-14.3.1
- dhcp-relay-debuginfo-4.2.6-14.3.1
- dhcp-server-4.2.6-14.3.1
- dhcp-client-debuginfo-4.2.6-14.3.1
- dhcp-4.2.6-14.3.1
- dhcp-client-4.2.6-14.3.1
-
SUSE Linux Enterprise Server for SAP Applications 12 (x86_64)
- dhcp-debuginfo-4.2.6-14.3.1
- dhcp-debugsource-4.2.6-14.3.1
- dhcp-relay-4.2.6-14.3.1
- dhcp-server-debuginfo-4.2.6-14.3.1
- dhcp-relay-debuginfo-4.2.6-14.3.1
- dhcp-server-4.2.6-14.3.1
- dhcp-client-debuginfo-4.2.6-14.3.1
- dhcp-4.2.6-14.3.1
- dhcp-client-4.2.6-14.3.1
References:
- https://www.suse.com/security/cve/CVE-2015-8605.html
- https://bugzilla.suse.com/show_bug.cgi?id=880984
- https://bugzilla.suse.com/show_bug.cgi?id=891961
- https://bugzilla.suse.com/show_bug.cgi?id=910686
- https://bugzilla.suse.com/show_bug.cgi?id=912098
- https://bugzilla.suse.com/show_bug.cgi?id=919959
- https://bugzilla.suse.com/show_bug.cgi?id=926159
- https://bugzilla.suse.com/show_bug.cgi?id=928390
- https://bugzilla.suse.com/show_bug.cgi?id=936923
- https://bugzilla.suse.com/show_bug.cgi?id=947780
- https://bugzilla.suse.com/show_bug.cgi?id=956159
- https://bugzilla.suse.com/show_bug.cgi?id=960506
- https://bugzilla.suse.com/show_bug.cgi?id=961305