<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for dhcp</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2019:2341-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2019-10-19T22:19:29Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2019-10-19T22:19:29Z</InitialReleaseDate>
    <CurrentReleaseDate>2019-10-19T22:19:29Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for dhcp</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for dhcp fixes the following issues:

Secuirty issue fixed:

- CVE-2019-6470: Fixed DHCPv6 server crashes (bsc#1134078).

Bug fixes:

- Add compile option --enable-secs-byteorder to avoid duplicate lease warnings (bsc#1089524).
- Use IPv6 when called as dhclient6, dhcpd6, and dhcrelay6 (bsc#1136572).

This update was imported from the SUSE:SLE-15:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2019-2341</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J2L7BAA63TTF4QK6OBDKINRL6LAEUZIE/#J2L7BAA63TTF4QK6OBDKINRL6LAEUZIE</URL>
      <Description>E-Mail link for openSUSE-SU-2019:2341-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1089524</URL>
      <Description>SUSE Bug 1089524</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1134078</URL>
      <Description>SUSE Bug 1134078</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1136572</URL>
      <Description>SUSE Bug 1136572</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-6470/</URL>
      <Description>SUSE CVE CVE-2019-6470 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.1">
      <Branch Type="Product Name" Name="openSUSE Leap 15.1">
        <FullProductName ProductID="openSUSE Leap 15.1" CPE="cpe:/o:opensuse:leap:15.1">openSUSE Leap 15.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="dhcp-4.3.5-lp151.6.3.1">
      <FullProductName ProductID="dhcp-4.3.5-lp151.6.3.1">dhcp-4.3.5-lp151.6.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dhcp-client-4.3.5-lp151.6.3.1">
      <FullProductName ProductID="dhcp-client-4.3.5-lp151.6.3.1">dhcp-client-4.3.5-lp151.6.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dhcp-devel-4.3.5-lp151.6.3.1">
      <FullProductName ProductID="dhcp-devel-4.3.5-lp151.6.3.1">dhcp-devel-4.3.5-lp151.6.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dhcp-doc-4.3.5-lp151.6.3.1">
      <FullProductName ProductID="dhcp-doc-4.3.5-lp151.6.3.1">dhcp-doc-4.3.5-lp151.6.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dhcp-relay-4.3.5-lp151.6.3.1">
      <FullProductName ProductID="dhcp-relay-4.3.5-lp151.6.3.1">dhcp-relay-4.3.5-lp151.6.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dhcp-server-4.3.5-lp151.6.3.1">
      <FullProductName ProductID="dhcp-server-4.3.5-lp151.6.3.1">dhcp-server-4.3.5-lp151.6.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="dhcp-4.3.5-lp151.6.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:dhcp-4.3.5-lp151.6.3.1">dhcp-4.3.5-lp151.6.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="dhcp-client-4.3.5-lp151.6.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:dhcp-client-4.3.5-lp151.6.3.1">dhcp-client-4.3.5-lp151.6.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="dhcp-devel-4.3.5-lp151.6.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:dhcp-devel-4.3.5-lp151.6.3.1">dhcp-devel-4.3.5-lp151.6.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="dhcp-doc-4.3.5-lp151.6.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:dhcp-doc-4.3.5-lp151.6.3.1">dhcp-doc-4.3.5-lp151.6.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="dhcp-relay-4.3.5-lp151.6.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:dhcp-relay-4.3.5-lp151.6.3.1">dhcp-relay-4.3.5-lp151.6.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="dhcp-server-4.3.5-lp151.6.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:dhcp-server-4.3.5-lp151.6.3.1">dhcp-server-4.3.5-lp151.6.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">There had existed in one of the ISC BIND libraries a bug in a function that was used by dhcpd when operating in DHCPv6 mode. There was also a bug in dhcpd relating to the use of this function per its documentation, but the bug in the library function prevented this from causing any harm. All releases of dhcpd from ISC contain copies of this, and other, BIND libraries in combinations that have been tested prior to release and are known to not present issues like this. Some third-party packagers of ISC software have modified the dhcpd source, BIND source, or version matchup in ways that create the crash potential. Based on reports available to ISC, the crash probability is large and no analysis has been done on how, or even if, the probability can be manipulated by an attacker. Affects: Builds of dhcpd versions prior to version 4.4.1 when using BIND versions 9.11.2 or later, or BIND versions with specific bug fixes backported to them. ISC does not have access to comprehensive version lists for all repackagings of dhcpd that are vulnerable. In particular, builds from other vendors may also be affected. Operators are advised to consult their vendor documentation.</Note>
    </Notes>
    <CVE>CVE-2019-6470</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:dhcp-4.3.5-lp151.6.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:dhcp-client-4.3.5-lp151.6.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:dhcp-devel-4.3.5-lp151.6.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:dhcp-doc-4.3.5-lp151.6.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:dhcp-relay-4.3.5-lp151.6.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:dhcp-server-4.3.5-lp151.6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J2L7BAA63TTF4QK6OBDKINRL6LAEUZIE/#J2L7BAA63TTF4QK6OBDKINRL6LAEUZIE</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-6470.html</URL>
        <Description>CVE-2019-6470</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1134078</URL>
        <Description>SUSE Bug 1134078</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
