Bug 28976

Summary: dhcp new security issue CVE-2021-25217
Product: Mageia Reporter: David Walser <luigiwalser>
Component: SecurityAssignee: QA Team <qa-bugs>
Status: RESOLVED FIXED QA Contact: Sec team <security>
Severity: critical    
Priority: Normal CC: alien, ouaurelien, sysadmin-bugs
Version: 8Keywords: advisory, validated_update
Target Milestone: ---   
Hardware: All   
OS: Linux   
Whiteboard: MGA7TOO MGA7-64-OK MGA8-64-OK
Source RPM: dhcp-4.4.2-8.mga8.src.rpm CVE: CVE-2021-25217
Status comment:
Bug Depends on:    
Bug Blocks: 28358    

Description David Walser 2021-05-27 18:20:54 CEST
ISC has issued an advisory on May 26:
https://kb.isc.org/docs/cve-2021-25217

The issue is fixed upstream in 4.4.2-P1, and there is a patch available:
https://www.openwall.com/lists/oss-security/2021/05/26/6

Mageia 7 and Mageia 8 are also affected.
David Walser 2021-05-27 18:21:37 CEST

Whiteboard: (none) => MGA8TOO, MGA7TOO
Status comment: (none) => Fixed upstream in 4.4.2-P1
Blocks: (none) => 28358

Comment 1 Lewis Smith 2021-05-27 20:36:53 CEST
dhcp is maintained by all sorts of people, so assigning this to everybody.

Assignee: bugsquad => pkg-bugs

Comment 2 David Walser 2021-05-28 21:38:46 CEST
Ubuntu has issued an advisory for this on May 27:
https://ubuntu.com/security/notices/USN-4969-1
Comment 3 David Walser 2021-06-06 18:44:41 CEST
Fedora has issued an advisory for this on June 2:
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/Z2LB42JWIV4M4WDNXX5VGIP26FEYWKIF/
Comment 4 David Walser 2021-06-27 21:17:14 CEST
Advisory:
========================

Updated dhcp packages fix security vulnerability:

A flaw was found in the Dynamic Host Configuration Protocol (DHCP). There is a
discrepancy between the code that handles encapsulated option information in
leases transmitted "on the wire" and the code which reads and parses lease
information after it has been written to disk storage. This flaw allows an
attacker to deliberately cause a situation where dhcpd while running in DHCPv4
or DHCPv6 mode, or the dhclient attempts to read a stored lease that contains
option information, to trigger a stack-based buffer overflow in the option
parsing code for colon-separated hex digits values. The highest threat from
this vulnerability is to data confidentiality and integrity as well as service
availability (CVE-2021-25217).

References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25217
https://kb.isc.org/docs/cve-2021-25217
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/Z2LB42JWIV4M4WDNXX5VGIP26FEYWKIF/
========================

Updated packages in core/updates_testing:
========================
dhcp-common-4.4.1-3.1.mga7
dhcp-doc-4.4.1-3.1.mga7
dhcp-server-4.4.1-3.1.mga7
dhcp-client-4.4.1-3.1.mga7
dhcp-relay-4.4.1-3.1.mga7
dhcp-devel-4.4.1-3.1.mga7
dhcp-server-4.4.2-10.1.mga8
dhcp-client-4.4.2-10.1.mga8
dhcp-common-4.4.2-10.1.mga8
dhcp-doc-4.4.2-10.1.mga8
dhcp-devel-4.4.2-10.1.mga8
dhcp-relay-4.4.2-10.1.mga8

from SRPMS:
dhcp-4.4.1-3.1.mga7.src.rpm
dhcp-4.4.2-10.1.mga8.src.rpm

Status comment: Fixed upstream in 4.4.2-P1 => (none)
Whiteboard: MGA8TOO, MGA7TOO => MGA7TOO
Assignee: pkg-bugs => qa-bugs
Version: Cauldron => 8

Comment 5 AL13N 2021-06-28 20:37:37 CEST
in the previous version, there was a bug with the notify to systemd; which meant that the service seemed to work at first and then stop with timeout after 1.5min.

This version actually solves my issue...

CC: (none) => alien

David Walser 2021-06-28 23:20:25 CEST

Whiteboard: MGA7TOO => MGA7TOO MGA8-64-OK

Comment 6 David Walser 2021-06-30 21:54:56 CEST
dhcp-server (and common) on mga7-64 working fine.

Whiteboard: MGA7TOO MGA8-64-OK => MGA7TOO MGA7-64-OK MGA8-64-OK

Comment 7 Aurelien Oudelet 2021-06-30 22:01:30 CEST
Validating.

Keywords: (none) => advisory, validated_update
CVE: (none) => CVE-2021-25217
CC: (none) => ouaurelien, sysadmin-bugs

Aurelien Oudelet 2021-06-30 22:03:22 CEST

Source RPM: dhcp-4.4.2-11.mga9.src.rpm => dhcp-4.4.2-8.mga8.src.rpm

Comment 8 Mageia Robot 2021-07-01 02:00:37 CEST
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2021-0307.html

Resolution: (none) => FIXED
Status: NEW => RESOLVED