Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package dhcp for openSUSE:Factory checked in 
at 2022-10-10 18:44:16
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/dhcp (Old)
 and      /work/SRC/openSUSE:Factory/.dhcp.new.2275 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "dhcp"

Mon Oct 10 18:44:16 2022 rev:135 rq:1008224 version:4.4.2.P1

Changes:
--------
--- /work/SRC/openSUSE:Factory/dhcp/dhcp.changes        2022-04-28 
23:07:08.068632984 +0200
+++ /work/SRC/openSUSE:Factory/.dhcp.new.2275/dhcp.changes      2022-10-10 
18:44:42.086886593 +0200
@@ -1,0 +2,8 @@
+Wed Oct  5 14:01:47 UTC 2022 - Reinhard Max <m...@suse.com>
+
+- bsc#1203988, CVE-2022-2928, dhcp-CVE-2022-2928.patch:
+  An option refcount overflow exists in dhcpd  
+- bsc#1203989, CVE-2022-2929, dhcp-CVE-2022-2929.patch:
+  DHCP memory leak
+
+-------------------------------------------------------------------

New:
----
  dhcp-CVE-2022-2928.patch
  dhcp-CVE-2022-2929.patch

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ dhcp.spec ++++++
--- /var/tmp/diff_new_pack.8zVhJ3/_old  2022-10-10 18:44:43.854890399 +0200
+++ /var/tmp/diff_new_pack.8zVhJ3/_new  2022-10-10 18:44:43.858890407 +0200
@@ -96,6 +96,8 @@
 # PATCH-FIX-SLE dhcp-4.2.4-P1-interval bsc#947780
 Patch20:        0020-dhcp-4.x.x-fixed-improper-lease-duration-checking.patch
 Patch21:        0021-dhcp-ip-family-symlinks.patch
+Patch22:        dhcp-CVE-2022-2928.patch
+Patch23:        dhcp-CVE-2022-2929.patch
 BuildRequires:  automake
 BuildRequires:  dos2unix
 BuildRequires:  libtool
@@ -209,6 +211,8 @@
 %patch18 -p1
 %patch20
 %patch21
+%patch22
+%patch23
 ##
 find . -type f -name \*.cat\* -exec rm -f {} \;
 dos2unix contrib/ms2isc/*


++++++ dhcp-CVE-2022-2928.patch ++++++
--- common/options.c.orig
+++ common/options.c
@@ -4452,6 +4452,8 @@ add_option(struct option_state *options,
        if (!option_cache_allocate(&oc, MDL)) {
                log_error("No memory for option cache adding %s (option %d).",
                          option->name, option_num);
+               /* Get rid of reference created during hash lookup. */
+               option_dereference(&option, MDL);
                return 0;
        }
 
@@ -4463,6 +4465,8 @@ add_option(struct option_state *options,
                             MDL)) {
                log_error("No memory for constant data adding %s (option %d).",
                          option->name, option_num);
+               /* Get rid of reference created during hash lookup. */
+               option_dereference(&option, MDL);
                option_cache_dereference(&oc, MDL);
                return 0;
        }
@@ -4471,6 +4475,9 @@ add_option(struct option_state *options,
        save_option(&dhcp_universe, options, oc);
        option_cache_dereference(&oc, MDL);
 
+       /* Get rid of reference created during hash lookup. */
+       option_dereference(&option, MDL);
+
        return 1;
 }
 
--- common/tests/option_unittest.c.orig
+++ common/tests/option_unittest.c
@@ -213,6 +213,59 @@ ATF_TC_BODY(parse_X, tc)
     }
 }
 
+ATF_TC(add_option_ref_cnt);
+
+ATF_TC_HEAD(add_option_ref_cnt, tc)
+{
+    atf_tc_set_md_var(tc, "descr",
+        "Verify add_option() does not leak option ref counts.");
+}
+
+ATF_TC_BODY(add_option_ref_cnt, tc)
+{
+    struct option_state *options = NULL;
+    struct option *option = NULL;
+    unsigned int cid_code = DHO_DHCP_CLIENT_IDENTIFIER;
+    char *cid_str = "1234";
+    int refcnt_before = 0;
+
+    // Look up the option we're going to add.
+    initialize_common_option_spaces();
+    if (!option_code_hash_lookup(&option, dhcp_universe.code_hash,
+                                 &cid_code, 0, MDL)) {
+        atf_tc_fail("cannot find option definition?");
+    }
+
+    // Get the option's reference count before we call add_options.
+    refcnt_before = option->refcnt;
+
+    // Allocate a option_state to which to add an option.
+    if (!option_state_allocate(&options, MDL)) {
+           atf_tc_fail("cannot allocat options state");
+    }
+
+    // Call add_option() to add the option to the option state.
+    if (!add_option(options, cid_code, cid_str, strlen(cid_str))) {
+           atf_tc_fail("add_option returned 0");
+    }
+
+    // Verify that calling add_option() only adds 1 to the option ref count.
+    if (option->refcnt != (refcnt_before + 1)) {
+        atf_tc_fail("after add_option(), count is wrong, before %d, after: %d",
+                    refcnt_before, option->refcnt);
+    }
+
+    // Derefrence the option_state, this should reduce the ref count to
+    // it's starting value.
+    option_state_dereference(&options, MDL);
+
+    // Verify that dereferencing option_state restores option ref count.
+    if (option->refcnt != refcnt_before) {
+        atf_tc_fail("after state deref, count is wrong, before %d, after: %d",
+                    refcnt_before, option->refcnt);
+    }
+}
+
 /* This macro defines main() method that will call specified
    test cases. tp and simple_test_case names can be whatever you want
    as long as it is a valid variable identifier. */
@@ -221,6 +274,7 @@ ATF_TP_ADD_TCS(tp)
     ATF_TP_ADD_TC(tp, option_refcnt);
     ATF_TP_ADD_TC(tp, pretty_print_option);
     ATF_TP_ADD_TC(tp, parse_X);
+    ATF_TP_ADD_TC(tp, add_option_ref_cnt);
 
     return (atf_no_error());
 }

++++++ dhcp-CVE-2022-2929.patch ++++++
--- common/options.c.orig
+++ common/options.c
@@ -454,16 +454,16 @@ int fqdn_universe_decode (struct option_
                while (s < &bp -> data[0] + length + 2) {
                        len = *s;
                        if (len > 63) {
-                               log_info ("fancy bits in fqdn option");
-                               return 0;
+                               log_info ("label length exceeds 63 in fqdn 
option");
+                               goto bad;
                        }
                        if (len == 0) {
                                terminated = 1;
                                break;
                        }
                        if (s + len > &bp -> data [0] + length + 3) {
-                               log_info ("fqdn tag longer than buffer");
-                               return 0;
+                               log_info ("fqdn label longer than buffer");
+                               goto bad;
                        }
 
                        if (first_len == 0) {

Reply via email to