Bug 17490 - dhcp new security issue CVE-2015-8605
Summary: dhcp new security issue CVE-2015-8605
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 5
Hardware: i586 Linux
Priority: Normal major
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL: http://lwn.net/Vulnerabilities/671736/
Whiteboard: advisory MGA5-64-OK MGA5-32-OK
Keywords: validated_update
Depends on:
Blocks: 17177
  Show dependency treegraph
 
Reported: 2016-01-13 19:59 CET by David Walser
Modified: 2016-01-20 18:54 CET (History)
3 users (show)

See Also:
Source RPM: dhcp-4.3.2-1.1.mga5.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2016-01-13 19:59:10 CET
ISC has issued an advisory on January 12:
https://kb.isc.org/article/AA-01334

Updated packages uploaded for Mageia 5 and Cauldron.

Advisory:
========================

Updated dhcp packages fix security vulnerability:

A badly formed packet with an invalid IPv4 UDP length field can cause an ISC
DHCP server, client, or relay program to terminate abnormally (CVE-2015-8605).

The dhcp package has been updated to version 4.3.3-P1, which fixes this issue
and several other bugs.

Also, the package has also been enhanced to provide better support for running
a DHCPv6 server (mga#17177).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8605
https://kb.isc.org/article/AA-01334
https://kb.isc.org/article/AA-01329
https://bugs.mageia.org/show_bug.cgi?id=17177
https://bugs.mageia.org/show_bug.cgi?id=17490
========================

Updated packages in core/updates_testing:
========================
dhcp-common-4.3.3P1-1.mga5
dhcp-doc-4.3.3P1-1.mga5
dhcp-server-4.3.3P1-1.mga5
dhcp-client-4.3.3P1-1.mga5
dhcp-relay-4.3.3P1-1.mga5
dhcp-devel-4.3.3P1-1.mga5

from dhcp-4.3.3P1-1.mga5.src.rpm

Reproducible: 

Steps to Reproduce:
David Walser 2016-01-13 19:59:34 CET

Blocks: (none) => 17177

Comment 1 David Walser 2016-01-13 20:08:55 CET
Debian has issued an advisory for this today:
https://lists.debian.org/debian-security-announce/2016/msg00011.html
https://www.debian.org/security/2016/dsa-3442

URL: (none) => http://lwn.net/Vulnerabilities/671736/

Comment 2 William Kenney 2016-01-14 19:04:47 CET
In VirtualBox, M5, KDE, 32-bit

Package(s) under test:
dhcp-common dhcp-client

default install of dhcp-common & dhcp-client

[root@localhost wilcal]# urpmi dhcp-common
Package dhcp-common-4.3.2-1.1.mga5.i586 is already installed
[root@localhost wilcal]# urpmi dhcp-client
Package dhcp-client-4.3.2-1.1.mga5.i586 is already installed

Client connects properly to dhcp server in Vbox "router" ( 10.0.2.15 )

install dhcp-common & dhcp-client from updates_testing

[root@localhost wilcal]# urpmi dhcp-common
Package dhcp-common-4.3.3P1-1.mga5.i586 is already installed
[root@localhost wilcal]# urpmi dhcp-client
Package dhcp-client-4.3.3P1-1.mga5.i586 is already installed

Client connects properly to dhcp server in Vbox "router" ( 10.0.2.15 )

CC: (none) => wilcal.int

Comment 3 William Kenney 2016-01-14 19:25:10 CET
In VirtualBox, M5, KDE, 64-bit

Package(s) under test:
dhcp-common dhcp-client

default install of dhcp-common & dhcp-client

[root@localhost wilcal]# urpmi dhcp-common
Package dhcp-common-4.3.2-1.1.mga5.x86_64 is already installed
[root@localhost wilcal]# urpmi dhcp-client
Package dhcp-client-4.3.2-1.1.mga5.x86_64 is already installed

Client connects properly to dhcp server in Vbox "router" ( 10.0.2.15 )

install dhcp-common & dhcp-client from updates_testing

[root@localhost wilcal]# urpmi dhcp-common
Package dhcp-common-4.3.3P1-1.mga5.x86_64 is already installed
[root@localhost wilcal]# urpmi dhcp-client
Package dhcp-client-4.3.3P1-1.mga5.x86_64 is already installed

Client connects properly to dhcp server in Vbox "router" ( 10.0.2.15 )
Comment 4 Dave Hodgins 2016-01-19 22:42:11 CET
Adding the OKs and validating based on comments 2 and 3. Advisory also loaded to svn.

Keywords: (none) => validated_update
Whiteboard: (none) => advisory MGA5-64-OK MGA5-32-OK
CC: (none) => davidwhodgins, sysadmin-bugs

Comment 5 Mageia Robot 2016-01-20 18:54:28 CET
An update for this issue has been pushed to Mageia Updates repository.

http://advisories.mageia.org/MGASA-2016-0028.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.