—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2021.2120
dhcp security update
15 June 2021
===========================================================================
AusCERT Security Bulletin Summary
———————————
Product: dhcp
Publisher: Red Hat
Operating System: Red Hat
Impact/Access: Denial of Service — Remote/Unauthenticated
Reduced Security — Remote/Unauthenticated
Resolution: Patch/Upgrade
CVE Names: CVE-2021-25217
Reference: ESB-2021.2072
ESB-2021.1950
ESB-2021.1935
ESB-2021.1874
Original Bulletin:
https://access.redhat.com/errata/RHSA-2021:2405
https://access.redhat.com/errata/RHSA-2021:2414
https://access.redhat.com/errata/RHSA-2021:2415
https://access.redhat.com/errata/RHSA-2021:2416
https://access.redhat.com/errata/RHSA-2021:2418
https://access.redhat.com/errata/RHSA-2021:2419
https://access.redhat.com/errata/RHSA-2021:2420
Comment: This bulletin contains seven (7) Red Hat security advisories.
– ————————–BEGIN INCLUDED TEXT——————–
– —–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Important: dhcp security update
Advisory ID: RHSA-2021:2405-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2021:2405
Issue date: 2021-06-14
CVE Names: CVE-2021-25217
=====================================================================
1. Summary:
An update for dhcp is now available for Red Hat Enterprise Linux 7.7
Extended Update Support.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux ComputeNode EUS (v. 7.7) – x86_64
Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7) – x86_64
Red Hat Enterprise Linux Server EUS (v. 7.7) – ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional EUS (v. 7.7) – ppc64, ppc64le, s390x, x86_64
3. Description:
The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows
individual devices on an IP network to get their own network configuration
information, including an IP address, a subnet mask, and a broadcast
address. The dhcp packages provide a relay agent and ISC DHCP service
required to enable and administer DHCP on a network.
Security Fix(es):
* dhcp: stack-based buffer overflow when parsing statements with
colon-separated hex digits in config or lease files in dhcpd and dhclient
(CVE-2021-25217)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1963258 – CVE-2021-25217 dhcp: stack-based buffer overflow when parsing statements with colon-separated hex digits in config or lease files in dhcpd and dhclient
6. Package List:
Red Hat Enterprise Linux ComputeNode EUS (v. 7.7):
Source:
dhcp-4.2.5-77.el7_7.1.src.rpm
x86_64:
dhclient-4.2.5-77.el7_7.1.x86_64.rpm
dhcp-common-4.2.5-77.el7_7.1.x86_64.rpm
dhcp-debuginfo-4.2.5-77.el7_7.1.i686.rpm
dhcp-debuginfo-4.2.5-77.el7_7.1.x86_64.rpm
dhcp-libs-4.2.5-77.el7_7.1.i686.rpm
dhcp-libs-4.2.5-77.el7_7.1.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7):
x86_64:
dhcp-4.2.5-77.el7_7.1.x86_64.rpm
dhcp-debuginfo-4.2.5-77.el7_7.1.i686.rpm
dhcp-debuginfo-4.2.5-77.el7_7.1.x86_64.rpm
dhcp-devel-4.2.5-77.el7_7.1.i686.rpm
dhcp-devel-4.2.5-77.el7_7.1.x86_64.rpm
Red Hat Enterprise Linux Server EUS (v. 7.7):
Source:
dhcp-4.2.5-77.el7_7.1.src.rpm
ppc64:
dhclient-4.2.5-77.el7_7.1.ppc64.rpm
dhcp-4.2.5-77.el7_7.1.ppc64.rpm
dhcp-common-4.2.5-77.el7_7.1.ppc64.rpm
dhcp-debuginfo-4.2.5-77.el7_7.1.ppc.rpm
dhcp-debuginfo-4.2.5-77.el7_7.1.ppc64.rpm
dhcp-libs-4.2.5-77.el7_7.1.ppc.rpm
dhcp-libs-4.2.5-77.el7_7.1.ppc64.rpm
ppc64le:
dhclient-4.2.5-77.el7_7.1.ppc64le.rpm
dhcp-4.2.5-77.el7_7.1.ppc64le.rpm
dhcp-common-4.2.5-77.el7_7.1.ppc64le.rpm
dhcp-debuginfo-4.2.5-77.el7_7.1.ppc64le.rpm
dhcp-libs-4.2.5-77.el7_7.1.ppc64le.rpm
s390x:
dhclient-4.2.5-77.el7_7.1.s390x.rpm
dhcp-4.2.5-77.el7_7.1.s390x.rpm
dhcp-common-4.2.5-77.el7_7.1.s390x.rpm
dhcp-debuginfo-4.2.5-77.el7_7.1.s390.rpm
dhcp-debuginfo-4.2.5-77.el7_7.1.s390x.rpm
dhcp-libs-4.2.5-77.el7_7.1.s390.rpm
dhcp-libs-4.2.5-77.el7_7.1.s390x.rpm
x86_64:
dhclient-4.2.5-77.el7_7.1.x86_64.rpm
dhcp-4.2.5-77.el7_7.1.x86_64.rpm
dhcp-common-4.2.5-77.el7_7.1.x86_64.rpm
dhcp-debuginfo-4.2.5-77.el7_7.1.i686.rpm
dhcp-debuginfo-4.2.5-77.el7_7.1.x86_64.rpm
dhcp-libs-4.2.5-77.el7_7.1.i686.rpm
dhcp-libs-4.2.5-77.el7_7.1.x86_64.rpm
Red Hat Enterprise Linux Server Optional EUS (v. 7.7):
ppc64:
dhcp-debuginfo-4.2.5-77.el7_7.1.ppc.rpm
dhcp-debuginfo-4.2.5-77.el7_7.1.ppc64.rpm
dhcp-devel-4.2.5-77.el7_7.1.ppc.rpm
dhcp-devel-4.2.5-77.el7_7.1.ppc64.rpm
ppc64le:
dhcp-debuginfo-4.2.5-77.el7_7.1.ppc64le.rpm
dhcp-devel-4.2.5-77.el7_7.1.ppc64le.rpm
s390x:
dhcp-debuginfo-4.2.5-77.el7_7.1.s390.rpm
dhcp-debuginfo-4.2.5-77.el7_7.1.s390x.rpm
dhcp-devel-4.2.5-77.el7_7.1.s390.rpm
dhcp-devel-4.2.5-77.el7_7.1.s390x.rpm
x86_64:
dhcp-debuginfo-4.2.5-77.el7_7.1.i686.rpm
dhcp-debuginfo-4.2.5-77.el7_7.1.x86_64.rpm
dhcp-devel-4.2.5-77.el7_7.1.i686.rpm
dhcp-devel-4.2.5-77.el7_7.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2021-25217
https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc.
– —–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=jBUb
– —–END PGP SIGNATURE—–
– ——————————————————————————–
– —–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Important: dhcp security update
Advisory ID: RHSA-2021:2414-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2021:2414
Issue date: 2021-06-14
CVE Names: CVE-2021-25217
=====================================================================
1. Summary:
An update for dhcp is now available for Red Hat Enterprise Linux 7.4
Advanced Update Support, Red Hat Enterprise Linux 7.4 Telco Extended Update
Support, and Red Hat Enterprise Linux 7.4 Update Services for SAP
Solutions.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Server AUS (v. 7.4) – x86_64
Red Hat Enterprise Linux Server E4S (v. 7.4) – ppc64le, x86_64
Red Hat Enterprise Linux Server Optional AUS (v. 7.4) – x86_64
Red Hat Enterprise Linux Server Optional E4S (v. 7.4) – ppc64le, x86_64
Red Hat Enterprise Linux Server Optional TUS (v. 7.4) – x86_64
Red Hat Enterprise Linux Server TUS (v. 7.4) – x86_64
3. Description:
The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows
individual devices on an IP network to get their own network configuration
information, including an IP address, a subnet mask, and a broadcast
address. The dhcp packages provide a relay agent and ISC DHCP service
required to enable and administer DHCP on a network.
Security Fix(es):
* dhcp: stack-based buffer overflow when parsing statements with
colon-separated hex digits in config or lease files in dhcpd and dhclient
(CVE-2021-25217)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1963258 – CVE-2021-25217 dhcp: stack-based buffer overflow when parsing statements with colon-separated hex digits in config or lease files in dhcpd and dhclient
6. Package List:
Red Hat Enterprise Linux Server AUS (v. 7.4):
Source:
dhcp-4.2.5-58.el7_4.5.src.rpm
x86_64:
dhclient-4.2.5-58.el7_4.5.x86_64.rpm
dhcp-4.2.5-58.el7_4.5.x86_64.rpm
dhcp-common-4.2.5-58.el7_4.5.x86_64.rpm
dhcp-debuginfo-4.2.5-58.el7_4.5.i686.rpm
dhcp-debuginfo-4.2.5-58.el7_4.5.x86_64.rpm
dhcp-libs-4.2.5-58.el7_4.5.i686.rpm
dhcp-libs-4.2.5-58.el7_4.5.x86_64.rpm
Red Hat Enterprise Linux Server E4S (v. 7.4):
Source:
dhcp-4.2.5-58.el7_4.5.src.rpm
ppc64le:
dhclient-4.2.5-58.el7_4.5.ppc64le.rpm
dhcp-4.2.5-58.el7_4.5.ppc64le.rpm
dhcp-common-4.2.5-58.el7_4.5.ppc64le.rpm
dhcp-debuginfo-4.2.5-58.el7_4.5.ppc64le.rpm
dhcp-libs-4.2.5-58.el7_4.5.ppc64le.rpm
x86_64:
dhclient-4.2.5-58.el7_4.5.x86_64.rpm
dhcp-4.2.5-58.el7_4.5.x86_64.rpm
dhcp-common-4.2.5-58.el7_4.5.x86_64.rpm
dhcp-debuginfo-4.2.5-58.el7_4.5.i686.rpm
dhcp-debuginfo-4.2.5-58.el7_4.5.x86_64.rpm
dhcp-libs-4.2.5-58.el7_4.5.i686.rpm
dhcp-libs-4.2.5-58.el7_4.5.x86_64.rpm
Red Hat Enterprise Linux Server TUS (v. 7.4):
Source:
dhcp-4.2.5-58.el7_4.5.src.rpm
x86_64:
dhclient-4.2.5-58.el7_4.5.x86_64.rpm
dhcp-4.2.5-58.el7_4.5.x86_64.rpm
dhcp-common-4.2.5-58.el7_4.5.x86_64.rpm
dhcp-debuginfo-4.2.5-58.el7_4.5.i686.rpm
dhcp-debuginfo-4.2.5-58.el7_4.5.x86_64.rpm
dhcp-libs-4.2.5-58.el7_4.5.i686.rpm
dhcp-libs-4.2.5-58.el7_4.5.x86_64.rpm
Red Hat Enterprise Linux Server Optional AUS (v. 7.4):
x86_64:
dhcp-debuginfo-4.2.5-58.el7_4.5.i686.rpm
dhcp-debuginfo-4.2.5-58.el7_4.5.x86_64.rpm
dhcp-devel-4.2.5-58.el7_4.5.i686.rpm
dhcp-devel-4.2.5-58.el7_4.5.x86_64.rpm
Red Hat Enterprise Linux Server Optional E4S (v. 7.4):
ppc64le:
dhcp-debuginfo-4.2.5-58.el7_4.5.ppc64le.rpm
dhcp-devel-4.2.5-58.el7_4.5.ppc64le.rpm
x86_64:
dhcp-debuginfo-4.2.5-58.el7_4.5.i686.rpm
dhcp-debuginfo-4.2.5-58.el7_4.5.x86_64.rpm
dhcp-devel-4.2.5-58.el7_4.5.i686.rpm
dhcp-devel-4.2.5-58.el7_4.5.x86_64.rpm
Red Hat Enterprise Linux Server Optional TUS (v. 7.4):
x86_64:
dhcp-debuginfo-4.2.5-58.el7_4.5.i686.rpm
dhcp-debuginfo-4.2.5-58.el7_4.5.x86_64.rpm
dhcp-devel-4.2.5-58.el7_4.5.i686.rpm
dhcp-devel-4.2.5-58.el7_4.5.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2021-25217
https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc.
– —–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=NFTY
– —–END PGP SIGNATURE—–
– ——————————————————————————–
– —–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Important: dhcp security update
Advisory ID: RHSA-2021:2415-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2021:2415
Issue date: 2021-06-14
CVE Names: CVE-2021-25217
=====================================================================
1. Summary:
An update for dhcp is now available for Red Hat Enterprise Linux 7.3
Advanced Update Support.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Server AUS (v. 7.3) – x86_64
Red Hat Enterprise Linux Server Optional AUS (v. 7.3) – x86_64
3. Description:
The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows
individual devices on an IP network to get their own network configuration
information, including an IP address, a subnet mask, and a broadcast
address. The dhcp packages provide a relay agent and ISC DHCP service
required to enable and administer DHCP on a network.
Security Fix(es):
* dhcp: stack-based buffer overflow when parsing statements with
colon-separated hex digits in config or lease files in dhcpd and dhclient
(CVE-2021-25217)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1963258 – CVE-2021-25217 dhcp: stack-based buffer overflow when parsing statements with colon-separated hex digits in config or lease files in dhcpd and dhclient
6. Package List:
Red Hat Enterprise Linux Server AUS (v. 7.3):
Source:
dhcp-4.2.5-47.el7_3.2.src.rpm
x86_64:
dhclient-4.2.5-47.el7_3.2.x86_64.rpm
dhcp-4.2.5-47.el7_3.2.x86_64.rpm
dhcp-common-4.2.5-47.el7_3.2.x86_64.rpm
dhcp-debuginfo-4.2.5-47.el7_3.2.i686.rpm
dhcp-debuginfo-4.2.5-47.el7_3.2.x86_64.rpm
dhcp-libs-4.2.5-47.el7_3.2.i686.rpm
dhcp-libs-4.2.5-47.el7_3.2.x86_64.rpm
Red Hat Enterprise Linux Server Optional AUS (v. 7.3):
x86_64:
dhcp-debuginfo-4.2.5-47.el7_3.2.i686.rpm
dhcp-debuginfo-4.2.5-47.el7_3.2.x86_64.rpm
dhcp-devel-4.2.5-47.el7_3.2.i686.rpm
dhcp-devel-4.2.5-47.el7_3.2.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2021-25217
https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc.
– —–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
iQIVAwUBYMevOtzjgjWX9erEAQjnew/+PuowTw+ecMLl6J0anstu6jdg4vtmfRx3
DSSPxKZglEIKPLEu8/IBbu+FTAMtrS6GSGjHcGkZYkbaF7iTrUlv6h9Si4VEys4K
yA29JWy1wYmvvfWKkJeVrRfC8WB9irFxeXL3gFmYUC2EE2i028eUcaPkFWtcTtlY
TxQ9NLTNIC0tqJcQibZUlS7Jdv7NFgMlGYe2Mt/f1ddxwzt1TKCg5eBSnnn7ysC0
hHvSt8KFQ4Hq79d06sqgPNKSUz5FDEBncDozpvPNfpLIPUpx/wlK8HslE+IySit/
G2RkE1VTnS86HHcaa/tAf2Rkh9mbvnd8b/kwOW62QSeGuqtLou4KYgvtScgmuoyx
NG5HzUq4ly/cuuyxTMLRLuj9ValaLNEKwy2KbiqFuQdUOzYyvsx9R2Pek5h2ID1T
d+CQSboecS3tNBr1+CJ+qCofWwGxuSrO3j5aWfafghxh+kbo1iqK42TuOuav/dmz
zt/5KcqGMZE4588Sg+CHY6Yh4iY53BRa1886pUU9In+d4XKXDEtCXGAABAtj3hMC
fyvSA6mXpKyN6gnhh6yko10LlzYxSNVf/VgRAsyQk8FpPK5RjUhgG48hWNivXiIm
TCj1oukZhj2XFXyHHEVSGmpPat9aAhbvOdAJX0CifQUgC+1rnPMZmPj2qBhqQm6j
6yN1IebYnhQ=
=NxWC
– —–END PGP SIGNATURE—–
– ——————————————————————————–
– —–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Important: dhcp security update
Advisory ID: RHSA-2021:2416-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2021:2416
Issue date: 2021-06-14
CVE Names: CVE-2021-25217
=====================================================================
1. Summary:
An update for dhcp is now available for Red Hat Enterprise Linux 8.1
Extended Update Support.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux BaseOS EUS (v. 8.1) – aarch64, noarch, ppc64le, s390x, x86_64
3. Description:
The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows
individual devices on an IP network to get their own network configuration
information, including an IP address, a subnet mask, and a broadcast
address. The dhcp packages provide a relay agent and ISC DHCP service
required to enable and administer DHCP on a network.
Security Fix(es):
* dhcp: stack-based buffer overflow when parsing statements with
colon-separated hex digits in config or lease files in dhcpd and dhclient
(CVE-2021-25217)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1963258 – CVE-2021-25217 dhcp: stack-based buffer overflow when parsing statements with colon-separated hex digits in config or lease files in dhcpd and dhclient
6. Package List:
Red Hat Enterprise Linux BaseOS EUS (v. 8.1):
Source:
dhcp-4.3.6-34.el8_1.2.src.rpm
aarch64:
dhcp-client-4.3.6-34.el8_1.2.aarch64.rpm
dhcp-client-debuginfo-4.3.6-34.el8_1.2.aarch64.rpm
dhcp-debuginfo-4.3.6-34.el8_1.2.aarch64.rpm
dhcp-debugsource-4.3.6-34.el8_1.2.aarch64.rpm
dhcp-libs-4.3.6-34.el8_1.2.aarch64.rpm
dhcp-libs-debuginfo-4.3.6-34.el8_1.2.aarch64.rpm
dhcp-relay-4.3.6-34.el8_1.2.aarch64.rpm
dhcp-relay-debuginfo-4.3.6-34.el8_1.2.aarch64.rpm
dhcp-server-4.3.6-34.el8_1.2.aarch64.rpm
dhcp-server-debuginfo-4.3.6-34.el8_1.2.aarch64.rpm
noarch:
dhcp-common-4.3.6-34.el8_1.2.noarch.rpm
ppc64le:
dhcp-client-4.3.6-34.el8_1.2.ppc64le.rpm
dhcp-client-debuginfo-4.3.6-34.el8_1.2.ppc64le.rpm
dhcp-debuginfo-4.3.6-34.el8_1.2.ppc64le.rpm
dhcp-debugsource-4.3.6-34.el8_1.2.ppc64le.rpm
dhcp-libs-4.3.6-34.el8_1.2.ppc64le.rpm
dhcp-libs-debuginfo-4.3.6-34.el8_1.2.ppc64le.rpm
dhcp-relay-4.3.6-34.el8_1.2.ppc64le.rpm
dhcp-relay-debuginfo-4.3.6-34.el8_1.2.ppc64le.rpm
dhcp-server-4.3.6-34.el8_1.2.ppc64le.rpm
dhcp-server-debuginfo-4.3.6-34.el8_1.2.ppc64le.rpm
s390x:
dhcp-client-4.3.6-34.el8_1.2.s390x.rpm
dhcp-client-debuginfo-4.3.6-34.el8_1.2.s390x.rpm
dhcp-debuginfo-4.3.6-34.el8_1.2.s390x.rpm
dhcp-debugsource-4.3.6-34.el8_1.2.s390x.rpm
dhcp-libs-4.3.6-34.el8_1.2.s390x.rpm
dhcp-libs-debuginfo-4.3.6-34.el8_1.2.s390x.rpm
dhcp-relay-4.3.6-34.el8_1.2.s390x.rpm
dhcp-relay-debuginfo-4.3.6-34.el8_1.2.s390x.rpm
dhcp-server-4.3.6-34.el8_1.2.s390x.rpm
dhcp-server-debuginfo-4.3.6-34.el8_1.2.s390x.rpm
x86_64:
dhcp-client-4.3.6-34.el8_1.2.x86_64.rpm
dhcp-client-debuginfo-4.3.6-34.el8_1.2.i686.rpm
dhcp-client-debuginfo-4.3.6-34.el8_1.2.x86_64.rpm
dhcp-debuginfo-4.3.6-34.el8_1.2.i686.rpm
dhcp-debuginfo-4.3.6-34.el8_1.2.x86_64.rpm
dhcp-debugsource-4.3.6-34.el8_1.2.i686.rpm
dhcp-debugsource-4.3.6-34.el8_1.2.x86_64.rpm
dhcp-libs-4.3.6-34.el8_1.2.i686.rpm
dhcp-libs-4.3.6-34.el8_1.2.x86_64.rpm
dhcp-libs-debuginfo-4.3.6-34.el8_1.2.i686.rpm
dhcp-libs-debuginfo-4.3.6-34.el8_1.2.x86_64.rpm
dhcp-relay-4.3.6-34.el8_1.2.x86_64.rpm
dhcp-relay-debuginfo-4.3.6-34.el8_1.2.i686.rpm
dhcp-relay-debuginfo-4.3.6-34.el8_1.2.x86_64.rpm
dhcp-server-4.3.6-34.el8_1.2.x86_64.rpm
dhcp-server-debuginfo-4.3.6-34.el8_1.2.i686.rpm
dhcp-server-debuginfo-4.3.6-34.el8_1.2.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2021-25217
https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc.
– —–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=VasN
– —–END PGP SIGNATURE—–
– ——————————————————————————–
– —–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Important: dhcp security update
Advisory ID: RHSA-2021:2418-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2021:2418
Issue date: 2021-06-14
CVE Names: CVE-2021-25217
=====================================================================
1. Summary:
An update for dhcp is now available for Red Hat Enterprise Linux 7.2
Advanced Update Support.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Server AUS (v. 7.2) – x86_64
Red Hat Enterprise Linux Server Optional AUS (v. 7.2) – x86_64
3. Description:
The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows
individual devices on an IP network to get their own network configuration
information, including an IP address, a subnet mask, and a broadcast
address. The dhcp packages provide a relay agent and ISC DHCP service
required to enable and administer DHCP on a network.
Security Fix(es):
* dhcp: stack-based buffer overflow when parsing statements with
colon-separated hex digits in config or lease files in dhcpd and dhclient
(CVE-2021-25217)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1963258 – CVE-2021-25217 dhcp: stack-based buffer overflow when parsing statements with colon-separated hex digits in config or lease files in dhcpd and dhclient
6. Package List:
Red Hat Enterprise Linux Server AUS (v. 7.2):
Source:
dhcp-4.2.5-42.el7_2.2.src.rpm
x86_64:
dhclient-4.2.5-42.el7_2.2.x86_64.rpm
dhcp-4.2.5-42.el7_2.2.x86_64.rpm
dhcp-common-4.2.5-42.el7_2.2.x86_64.rpm
dhcp-debuginfo-4.2.5-42.el7_2.2.i686.rpm
dhcp-debuginfo-4.2.5-42.el7_2.2.x86_64.rpm
dhcp-libs-4.2.5-42.el7_2.2.i686.rpm
dhcp-libs-4.2.5-42.el7_2.2.x86_64.rpm
Red Hat Enterprise Linux Server Optional AUS (v. 7.2):
x86_64:
dhcp-debuginfo-4.2.5-42.el7_2.2.i686.rpm
dhcp-debuginfo-4.2.5-42.el7_2.2.x86_64.rpm
dhcp-devel-4.2.5-42.el7_2.2.i686.rpm
dhcp-devel-4.2.5-42.el7_2.2.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2021-25217
https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc.
– —–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=ijSR
– —–END PGP SIGNATURE—–
– ——————————————————————————–
– —–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Important: dhcp security update
Advisory ID: RHSA-2021:2419-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2021:2419
Issue date: 2021-06-14
CVE Names: CVE-2021-25217
=====================================================================
1. Summary:
An update for dhcp is now available for Red Hat Enterprise Linux 6 Extended
Lifecycle Support.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Server (v. 6 ELS) – i386, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 6 ELS) – i386, s390x, x86_64
3. Description:
The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows
individual devices on an IP network to get their own network configuration
information, including an IP address, a subnet mask, and a broadcast
address. The dhcp packages provide a relay agent and ISC DHCP service
required to enable and administer DHCP on a network.
Security Fix(es):
* dhcp: stack-based buffer overflow when parsing statements with
colon-separated hex digits in config or lease files in dhcpd and dhclient
(CVE-2021-25217)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1963258 – CVE-2021-25217 dhcp: stack-based buffer overflow when parsing statements with colon-separated hex digits in config or lease files in dhcpd and dhclient
6. Package List:
Red Hat Enterprise Linux Server (v. 6 ELS):
Source:
dhcp-4.1.1-64.P1.el6_10.src.rpm
i386:
dhclient-4.1.1-64.P1.el6_10.i686.rpm
dhcp-4.1.1-64.P1.el6_10.i686.rpm
dhcp-common-4.1.1-64.P1.el6_10.i686.rpm
dhcp-debuginfo-4.1.1-64.P1.el6_10.i686.rpm
s390x:
dhclient-4.1.1-64.P1.el6_10.s390x.rpm
dhcp-4.1.1-64.P1.el6_10.s390x.rpm
dhcp-common-4.1.1-64.P1.el6_10.s390x.rpm
dhcp-debuginfo-4.1.1-64.P1.el6_10.s390x.rpm
x86_64:
dhclient-4.1.1-64.P1.el6_10.x86_64.rpm
dhcp-4.1.1-64.P1.el6_10.x86_64.rpm
dhcp-common-4.1.1-64.P1.el6_10.x86_64.rpm
dhcp-debuginfo-4.1.1-64.P1.el6_10.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6 ELS):
i386:
dhcp-debuginfo-4.1.1-64.P1.el6_10.i686.rpm
dhcp-devel-4.1.1-64.P1.el6_10.i686.rpm
s390x:
dhcp-debuginfo-4.1.1-64.P1.el6_10.s390.rpm
dhcp-debuginfo-4.1.1-64.P1.el6_10.s390x.rpm
dhcp-devel-4.1.1-64.P1.el6_10.s390.rpm
dhcp-devel-4.1.1-64.P1.el6_10.s390x.rpm
x86_64:
dhcp-debuginfo-4.1.1-64.P1.el6_10.i686.rpm
dhcp-debuginfo-4.1.1-64.P1.el6_10.x86_64.rpm
dhcp-devel-4.1.1-64.P1.el6_10.i686.rpm
dhcp-devel-4.1.1-64.P1.el6_10.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2021-25217
https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc.
– —–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=LQn7
– —–END PGP SIGNATURE—–
– ——————————————————————————–
– —–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Important: dhcp security update
Advisory ID: RHSA-2021:2420-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2021:2420
Issue date: 2021-06-14
CVE Names: CVE-2021-25217
=====================================================================
1. Summary:
An update for dhcp is now available for Red Hat Enterprise Linux 8.2
Extended Update Support.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux BaseOS EUS (v. 8.2) – aarch64, noarch, ppc64le, s390x, x86_64
3. Description:
The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows
individual devices on an IP network to get their own network configuration
information, including an IP address, a subnet mask, and a broadcast
address. The dhcp packages provide a relay agent and ISC DHCP service
required to enable and administer DHCP on a network.
Security Fix(es):
* dhcp: stack-based buffer overflow when parsing statements with
colon-separated hex digits in config or lease files in dhcpd and dhclient
(CVE-2021-25217)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1963258 – CVE-2021-25217 dhcp: stack-based buffer overflow when parsing statements with colon-separated hex digits in config or lease files in dhcpd and dhclient
6. Package List:
Red Hat Enterprise Linux BaseOS EUS (v. 8.2):
Source:
dhcp-4.3.6-40.el8_2.2.src.rpm
aarch64:
dhcp-client-4.3.6-40.el8_2.2.aarch64.rpm
dhcp-client-debuginfo-4.3.6-40.el8_2.2.aarch64.rpm
dhcp-debuginfo-4.3.6-40.el8_2.2.aarch64.rpm
dhcp-debugsource-4.3.6-40.el8_2.2.aarch64.rpm
dhcp-libs-4.3.6-40.el8_2.2.aarch64.rpm
dhcp-libs-debuginfo-4.3.6-40.el8_2.2.aarch64.rpm
dhcp-relay-4.3.6-40.el8_2.2.aarch64.rpm
dhcp-relay-debuginfo-4.3.6-40.el8_2.2.aarch64.rpm
dhcp-server-4.3.6-40.el8_2.2.aarch64.rpm
dhcp-server-debuginfo-4.3.6-40.el8_2.2.aarch64.rpm
noarch:
dhcp-common-4.3.6-40.el8_2.2.noarch.rpm
ppc64le:
dhcp-client-4.3.6-40.el8_2.2.ppc64le.rpm
dhcp-client-debuginfo-4.3.6-40.el8_2.2.ppc64le.rpm
dhcp-debuginfo-4.3.6-40.el8_2.2.ppc64le.rpm
dhcp-debugsource-4.3.6-40.el8_2.2.ppc64le.rpm
dhcp-libs-4.3.6-40.el8_2.2.ppc64le.rpm
dhcp-libs-debuginfo-4.3.6-40.el8_2.2.ppc64le.rpm
dhcp-relay-4.3.6-40.el8_2.2.ppc64le.rpm
dhcp-relay-debuginfo-4.3.6-40.el8_2.2.ppc64le.rpm
dhcp-server-4.3.6-40.el8_2.2.ppc64le.rpm
dhcp-server-debuginfo-4.3.6-40.el8_2.2.ppc64le.rpm
s390x:
dhcp-client-4.3.6-40.el8_2.2.s390x.rpm
dhcp-client-debuginfo-4.3.6-40.el8_2.2.s390x.rpm
dhcp-debuginfo-4.3.6-40.el8_2.2.s390x.rpm
dhcp-debugsource-4.3.6-40.el8_2.2.s390x.rpm
dhcp-libs-4.3.6-40.el8_2.2.s390x.rpm
dhcp-libs-debuginfo-4.3.6-40.el8_2.2.s390x.rpm
dhcp-relay-4.3.6-40.el8_2.2.s390x.rpm
dhcp-relay-debuginfo-4.3.6-40.el8_2.2.s390x.rpm
dhcp-server-4.3.6-40.el8_2.2.s390x.rpm
dhcp-server-debuginfo-4.3.6-40.el8_2.2.s390x.rpm
x86_64:
dhcp-client-4.3.6-40.el8_2.2.x86_64.rpm
dhcp-client-debuginfo-4.3.6-40.el8_2.2.i686.rpm
dhcp-client-debuginfo-4.3.6-40.el8_2.2.x86_64.rpm
dhcp-debuginfo-4.3.6-40.el8_2.2.i686.rpm
dhcp-debuginfo-4.3.6-40.el8_2.2.x86_64.rpm
dhcp-debugsource-4.3.6-40.el8_2.2.i686.rpm
dhcp-debugsource-4.3.6-40.el8_2.2.x86_64.rpm
dhcp-libs-4.3.6-40.el8_2.2.i686.rpm
dhcp-libs-4.3.6-40.el8_2.2.x86_64.rpm
dhcp-libs-debuginfo-4.3.6-40.el8_2.2.i686.rpm
dhcp-libs-debuginfo-4.3.6-40.el8_2.2.x86_64.rpm
dhcp-relay-4.3.6-40.el8_2.2.x86_64.rpm
dhcp-relay-debuginfo-4.3.6-40.el8_2.2.i686.rpm
dhcp-relay-debuginfo-4.3.6-40.el8_2.2.x86_64.rpm
dhcp-server-4.3.6-40.el8_2.2.x86_64.rpm
dhcp-server-debuginfo-4.3.6-40.el8_2.2.i686.rpm
dhcp-server-debuginfo-4.3.6-40.el8_2.2.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2021-25217
https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc.
– —–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
iQIVAwUBYMfC6tzjgjWX9erEAQhaRA//W3hAS2WM8vVupkiHgBZmcQmL5I29cqvb
s567FIIarkTztZ0h2YLrg/wQCUz94Rqb1PgpNJ8gecVDa3MmSzGh/dxiJP8KnZDY
TxOjUhQdzVtjU/av2V/3eP4v3qsqcz7nDsd8OzFuJueuOb/YWtlh1pbBtRrR37df
2qQIVwyUdzefVKSwzEZZB+WedXFqR8Ctu2sZuGLb9FzYMhdlfhx1V0ZdJUunrNw8
yvEOofb0o3i5aF0bWlUgZnFxNaEWE4smOFvAvZ5OmeMnlhC+9qRsViHUq4DhOaz7
cpTjpDQbjRmxG98UTSp3ESpcQosRPsXoTB6BxGZNhDWHweixv9SrVPvSTXBxcers
PG0OGr0I6L+1JPa3JH1YnUNwn0+11H2mi+5/+L8On90YpyCcpi2NmfG4dV8GGXKF
sklF4L8fwH/Bf81/OG/QUvcqFooD6clw/1f3Tb3or+NhObN/llmsbexPrYj8/dZD
BZdrPQ7e42k6AqIaoqECEZAXmYnCQmIkSJblZyhiQfmSW3/EVrWVH2NgKY4EiO13
DFyBXXA4TCEoUq4Px6fQEdc/2kDmzg1oOllzp7Y5xRt4/pJy9SQI5/fxCIKC3GAB
tcSgSn6++fwG1XM8oYALahAqgd2oPDkel8UJKcbbiRnjLBNli+Hm2Em6XE4I0VsB
88r2/ho+HXE=
=HWCR
– —–END PGP SIGNATURE—–
– ————————–END INCLUDED TEXT——————–
You have received this e-mail bulletin as a result of your organisation’s
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT’s members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation’s
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author’s website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967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=MHEr
—–END PGP SIGNATURE—–
The post ESB-2021.2120 – [RedHat] dhcp: Multiple vulnerabilities appeared first on Malware Devil.
https://malwaredevil.com/2021/06/15/esb-2021-2120-redhat-dhcp-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-2120-redhat-dhcp-multiple-vulnerabilities
No comments:
Post a Comment