Security update for dhcp

SUSE Security Update: Security update for dhcp
Announcement ID: SUSE-SU-2012:1002-1
Rating: moderate
References: #762108 #767661 #770236 #772924
Affected Products:
  • SUSE Linux Enterprise Software Development Kit 11 SP2
  • SUSE Linux Enterprise Server 11 SP2 for VMware
  • SUSE Linux Enterprise Server 11 SP2
  • SUSE Linux Enterprise Desktop 11 SP2

  • An update that solves three vulnerabilities and has one errata is now available. It includes one version update.

    Description:


    This update provides dhcp 4.2.4-p1, which fixes the dhcpv6
    server crashing while accessing the lease on heap and
    provides the following additional fixes:

    *

    Security fixes:

    o Previously the server code was relaxed to allow
    packets with zero length client ids to be processed. Under
    some situations use of zero length client ids can cause the
    server to go into an infinite loop. As such ids are not
    valid according to RFC 2132 section 9.14 the server no
    longer accepts them. Client ids with a length of 1 are also
    invalid but the server still accepts them in order to
    minimize disruption. The restriction will likely be
    tightened in the future to disallow ids with a length of 1.
    (ISC-Bugs #29851, CVE-2012-3571
    > ) o When attempting to convert a DUID from a client id
    option into a hardware address handle unexpected client ids
    properly. (ISC-Bugs #29852, CVE-2012-3570
    > ) o A pair of memory leaks were found and fixed.
    (ISC-Bugs #30024, CVE-2012-3954
    > )
    *

    Further upstream fixes:

    o Moved lease file check to a separate action so
    it is not used in restart -- it can fail when the daemon
    rewrites the lease causing a restart failure then. o
    Request dhcp6.sntp-servers in /etc/dhclient6.conf and
    forward to netconfig for processing. o Rotate the lease
    file when running in v6 mode. (ISC-Bugs #24887) o Fixed the
    code that checks if an address the server is planning to
    hand out is in a reserved range. This would appear as the
    server being out of addresses in pools with particular
    ranges. (ISC-Bugs #26498) o In the DDNS code handle error
    conditions more gracefully and add more logging code. The
    major change is to handle unexpected cancel events from the
    DNS client code. (ISC-Bugs #26287) o Tidy up the receive
    calls and eliminate the need for found_pkt. (ISC-Bugs
    #25066) o Add support for Infiniband over sockets to the
    server and relay code. o Modify the code that determines if
    an outstanding DDNS request should be cancelled. This patch
    results in cancelling the outstanding request less often.
    It fixes the problem caused by a client doing a release
    where the TXT and PTR records weren't removed from the DNS.
    (ISC-BUGS #27858) o Remove outdated note in the description
    of the bootp keyword about the option not satisfying the
    requirement of failover peers for denying dynamic bootp
    clients. (ISC-bugs #28574) o Multiple items to clean up
    IPv6 address processing. When processing an IA that we've
    seen check to see if the addresses are usable (not in use
    by somebody else) before handing it out. When reading in
    leases from the file discard expired addresses. When
    picking an address for a client include the IA ID in
    addition to the client ID to generally pick different
    addresses for different IAs. (ISC-Bugs #23138, #27945,
    #25586, #27684) o Remove unnecessary checks in the lease
    query code and clean up several compiler issues (some
    dereferences of NULL and treating an int as a boolean).
    (ISC-Bugs #26203) o Fix the NA and PD allocation code to
    handle the case where a client provides a preference and
    the server doesn't have any addresses or prefixes
    available. Previoulsy the server ignored the request with
    this patch it replies with a NoAddrsAvail or NoPrefixAvail
    response. By default the code performs according to the
    errata of August 2010 for RFC 3315 section 17.2.2; to
    enable the previous style see the section on
    RFC3315_PRE_ERRATA_2010_08 in includes/site.h. o Fix up
    some issues found by static analysis. A potential memory
    leak and NULL dereference in omapi. The use of a boolean
    test instead of a bitwise test in dst. (ISC-Bugs #28941)

    In addition, the dhcp-server init script now checks the
    syntax prior restarting the daemon to avoid stopping of
    the daemon when a start would fail.

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Linux Enterprise Software Development Kit 11 SP2:
      zypper in -t patch sdksp2-dhcp-6606
    • SUSE Linux Enterprise Server 11 SP2 for VMware:
      zypper in -t patch slessp2-dhcp-6606
    • SUSE Linux Enterprise Server 11 SP2:
      zypper in -t patch slessp2-dhcp-6606
    • SUSE Linux Enterprise Desktop 11 SP2:
      zypper in -t patch sledsp2-dhcp-6606

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 4.2.4.P1]:
    • dhcp-devel-4.2.4.P1-0.5.1
    • SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64) [New Version: 4.2.4.P1]:
    • dhcp-4.2.4.P1-0.5.1
    • dhcp-client-4.2.4.P1-0.5.1
    • dhcp-relay-4.2.4.P1-0.5.1
    • dhcp-server-4.2.4.P1-0.5.1
    • SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 4.2.4.P1]:
    • dhcp-4.2.4.P1-0.5.1
    • dhcp-client-4.2.4.P1-0.5.1
    • dhcp-relay-4.2.4.P1-0.5.1
    • dhcp-server-4.2.4.P1-0.5.1
    • SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64) [New Version: 4.2.4.P1]:
    • dhcp-4.2.4.P1-0.5.1
    • dhcp-client-4.2.4.P1-0.5.1

    References:

  • http://support.novell.com/security/cve/CVE-2012-3570.html
  • http://support.novell.com/security/cve/CVE-2012-3571.html
  • http://support.novell.com/security/cve/CVE-2012-3954.html
  • https://bugzilla.novell.com/762108
  • https://bugzilla.novell.com/767661
  • https://bugzilla.novell.com/770236
  • https://bugzilla.novell.com/772924
  • http://download.suse.com/patch/finder/?keywords=be5649bf71f404d2c7566610f48e0de9