Security update for dhcp
Announcement ID: | SUSE-SU-2016:0541-1 |
Rating: | moderate |
References: | #880984 #936923 #956159 #960506 #961305 |
Affected Products: |
An update that solves one vulnerability and has four fixes is now available.
Description:
This update for dhcp fixes the following issues:
- CVE-2015-8605: A remote attacker could have used badly formed packets
with an invalid IPv4 UDP length field to cause a DHCP server, client, or
relay program to terminate abnormally (bsc#961305)
The following bugs were fixed:
- bsc#936923: Improper lease duration checking
- bsc#880984: Integer overflows in the date and time handling code
- bsc#956159: fixed service files to start dhcpd after slapd
- bsc#960506: Improve exit reason and logging when /sbin/dhclient-script
is unable to pre-init requested interface
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 12-SP1:
zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-294=1
- SUSE Linux Enterprise Server 12-SP1:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-294=1
- SUSE Linux Enterprise Desktop 12-SP1:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-294=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64):
- dhcp-debuginfo-4.3.3-4.1
- dhcp-debugsource-4.3.3-4.1
- dhcp-devel-4.3.3-4.1
- SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64):
- dhcp-4.3.3-4.1
- dhcp-client-4.3.3-4.1
- dhcp-client-debuginfo-4.3.3-4.1
- dhcp-debuginfo-4.3.3-4.1
- dhcp-debugsource-4.3.3-4.1
- dhcp-relay-4.3.3-4.1
- dhcp-relay-debuginfo-4.3.3-4.1
- dhcp-server-4.3.3-4.1
- dhcp-server-debuginfo-4.3.3-4.1
- SUSE Linux Enterprise Desktop 12-SP1 (x86_64):
- dhcp-4.3.3-4.1
- dhcp-client-4.3.3-4.1
- dhcp-client-debuginfo-4.3.3-4.1
- dhcp-debuginfo-4.3.3-4.1
- dhcp-debugsource-4.3.3-4.1