Hi, * Nico Golde <[EMAIL PROTECTED]> [2007-10-29 22:30]: > * Steve Kemp <[EMAIL PROTECTED]> [2007-10-29 21:59]: > > On Mon Oct 29, 2007 at 19:33:17 +0100, Tomas Hoger wrote: > > > > > During testing of our updated dhcp packages, we have found out that > > > patch for CVE-2007-5365 used by OpenBSD was not sufficient and it was > > > still possible to crash dhcpd. Your dhcp packages released in DSA > > > 1388-1 also seem affected. You can find better patch based on dhcp-3.x > > > code here: > > > > > > https://bugzilla.redhat.com/show_bug.cgi?id=327781#c5 > > > > > > Note: [EMAIL PROTECTED] was notified on 2007-10-23. > > > Updated DSA 1388-3 released on 2007-10-29. > > > > Thanks, we have a built package already. I'm not sure who is > > releasing it - I guess I should since I did the previous one. > > I'll chase it tomorrow/wednesday. > > I'll reupload the NMU for unstable to fix this.
Attached is the patch for this, I am uploading it now. Kind regards Nico -- Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted.
diff -u dhcp-2.0pl5dfsg1/debian/changelog dhcp-2.0pl5dfsg1/debian/changelog
--- dhcp-2.0pl5dfsg1/debian/changelog
+++ dhcp-2.0pl5dfsg1/debian/changelog
@@ -1,3 +1,11 @@
+dhcp (2.0pl5dfsg1-20.2) unstable; urgency=high
+
+ * Non-maintainer upload by testing-security team.
+ * Updated 305_CVE-2007-5365.patch to fix incomplete
+ upstream patch for CVE-2007-5365 (Closes: #446354).
+
+ -- Nico Golde <[EMAIL PROTECTED]> Mon, 29 Oct 2007 22:40:21 +0100
+
dhcp (2.0pl5dfsg1-20.1) unstable; urgency=high
* Non-maintainer upload by the testing-security team
diff -u dhcp-2.0pl5dfsg1/debian/patches/305_CVE-2007-5365.patch dhcp-2.0pl5dfsg1/debian/patches/305_CVE-2007-5365.patch
--- dhcp-2.0pl5dfsg1/debian/patches/305_CVE-2007-5365.patch
+++ dhcp-2.0pl5dfsg1/debian/patches/305_CVE-2007-5365.patch
@@ -1,16 +1,17 @@
---- options.c.orig 2007-10-12 12:22:41.000000000 +0000
-+++ dhcp-2.0pl5dfsg1/common/options.c 2007-10-12 12:23:42.000000000 +0000
-@@ -188,9 +188,12 @@
- inpacket &&
- inpacket -> options [DHO_DHCP_MAX_MESSAGE_SIZE].data &&
- (inpacket -> options [DHO_DHCP_MAX_MESSAGE_SIZE].len >=
-- sizeof (u_int16_t)))
-+ sizeof (u_int16_t))){
- mms = getUShort (inpacket -> options
- [DHO_DHCP_MAX_MESSAGE_SIZE].data);
-+ if (mms < 576)
-+ mms = 576; /* mms must be >= minimum IP MTU */
-+ }
-
- /* If the client has provided a maximum DHCP message size,
- use that; otherwise, if it's BOOTP, only 64 bytes; otherwise
+diff -Nurad dhcp-2.0pl5dfsg1.orig/common/options.c dhcp-2.0pl5dfsg1/common/options.c
+--- dhcp-2.0pl5dfsg1.orig/common/options.c 2007-10-29 22:29:34.000000000 +0100
++++ dhcp-2.0pl5dfsg1/common/options.c 2007-10-29 22:35:22.000000000 +0100
+@@ -197,9 +197,11 @@
+ use up to the minimum IP MTU size (576 bytes). */
+ /* XXX if a BOOTP client specifies a max message size, we will
+ honor it. */
+- if (mms)
++ if (mms){
++ if(mms < 576)
++ mms = 576; /* mms must be >= minimum IP MTU */
+ main_buffer_size = mms - DHCP_FIXED_LEN;
+- else if (bootpp)
++ } else if (bootpp)
+ main_buffer_size = 64;
+ else
+ main_buffer_size = 576 - DHCP_FIXED_LEN;
pgpMn15dbc3uL.pgp
Description: PGP signature

