alpine issueshttps://gitlab.alpinelinux.org/groups/alpine/-/issues2019-07-23T14:02:15Zhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/3378qemu: holes in the bochs dispi interface parameter checking (CVE-2014-3615)2019-07-23T14:02:15ZAlexander Belousqemu: holes in the bochs dispi interface parameter checking (CVE-2014-3615)An information leakage flaw was found in Qemu’s VGA emulator. It could
lead to leaking host memory bytes to a VNC client. It could occur when a
guest GOP driver attempts to set a high display resolution.
A privileged user/program able t...An information leakage flaw was found in Qemu’s VGA emulator. It could
lead to leaking host memory bytes to a VNC client. It could occur when a
guest GOP driver attempts to set a high display resolution.
A privileged user/program able to set such high resolution could use
this flaw to leak host memory bytes.
Fixed in qemu-2.1.1. All previous versions seems to be fully or
partially vulnerable.
Upstream fixes:
———————-
http://git.qemu.org/?p=qemu.git;a=commit;h=c1b886c45dc70f247300f549dce9833f3fa2def5
http://git.qemu.org/?p=qemu.git;a=commit;h=ab9509cceabef28071e41bdfa073083859c949a7
References:
http://seclists.org/oss-sec/2014/q3/521
*(from redmine: issue id 3378, created on 2014-09-24, closed on 2015-08-05)*
* Relations:
* child #3379
* child #3380
* child #3381
* child #3382https://gitlab.alpinelinux.org/alpine/aports/-/issues/3377permission improvements for usb smartcard readers2019-07-12T14:50:43ZTimo Teräspermission improvements for usb smartcard readerspcscd uses /dev/bus/usb/\* to access USB smartcard readers (e.g. using
the CCID module).
Those device nodes should be accessible by pcscd user. It seems we have
already ‘usb’ group, but the device nodes are not owned by that group.
Shou...pcscd uses /dev/bus/usb/\* to access USB smartcard readers (e.g. using
the CCID module).
Those device nodes should be accessible by pcscd user. It seems we have
already ‘usb’ group, but the device nodes are not owned by that group.
Should add mdev/udev rules for that. As well as add pcscd to ‘usb’ group
by default.
*(from redmine: issue id 3377, created on 2014-09-24, closed on 2015-01-28)*
* Relations:
* duplicates #3280https://gitlab.alpinelinux.org/alpine/aports/-/issues/3375New US Mirror2019-07-23T14:02:16ZalgitbotNew US MirrorHi there!
Not sure if this is the right place, the wiki didn’t have an official
way to get in touch once a mirror was created but I have a http and
rsync mirror available for use. Here are the URLs:
http://mirror.pw/alpine
rsync:...Hi there!
Not sure if this is the right place, the wiki didn’t have an official
way to get in touch once a mirror was created but I have a http and
rsync mirror available for use. Here are the URLs:
http://mirror.pw/alpine
rsync://mirror.pw/alpine
It is on a 100Mb/s connection located in Lansing, MI (US).
If the mirror is not needed just let me know :)
Thanks!
\- Travis Z.
*(from redmine: issue id 3375, created on 2014-09-23, closed on 2015-12-09)*
* Relations:
* relates #4017
* Changesets:
* Revision bd1913665a57a2157cba92c46ca5ca4686cdd6d5 by Natanael Copa on 2014-10-09T14:25:43Z:
```
main/alpine-mirrors: add mirror.pw
fixes #3375
```https://gitlab.alpinelinux.org/alpine/aports/-/issues/3374Cherry keyboards hang2019-07-23T14:02:17Z7heo .tkCherry keyboards hangCherry keyboards aren’t compatible with Alpine Linux, they hang, one
cannot change the LEDs state, or input any character. Model of the
tested keyboard is: Cherry G230. It is a standard keyboard in Germany.
*(from redmine: issue id 337...Cherry keyboards aren’t compatible with Alpine Linux, they hang, one
cannot change the LEDs state, or input any character. Model of the
tested keyboard is: Cherry G230. It is a standard keyboard in Germany.
*(from redmine: issue id 3374, created on 2014-09-19, closed on 2014-10-08)*
* Relations:
* relates #3469
* Changesets:
* Revision c3004a98bdc0a48f889525d7e5f186ad0dd6197f by Natanael Copa on 2014-10-02T14:38:07Z:
```
main/linux-grsec: disable USB_KBD and USB_MOUSE
they cause problems in some situations and hid-generic is to prefer
fixes #3374
```3.0.57heo .tk7heo .tkhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/3373qt5-qttools-dev broken libs2019-07-23T14:02:18ZStuart Cardallqt5-qttools-dev broken libsSystem = 32bit MUSL running EDGE
Building qt5-qttools-dev (v5.3.1 & 5.3.2) seems to be broken -
/usr/lib/\*.so all show as broken symbolic links in the package (the
.5.3.2.so libs do not get built)
Also libQt5DBus is shown in src/qdbus...System = 32bit MUSL running EDGE
Building qt5-qttools-dev (v5.3.1 & 5.3.2) seems to be broken -
/usr/lib/\*.so all show as broken symbolic links in the package (the
.5.3.2.so libs do not get built)
Also libQt5DBus is shown in src/qdbus/qdbus/Makefile but does not get
built at all (not even a symbolic link is created)
*(from redmine: issue id 3373, created on 2014-09-18, closed on 2014-10-14)*Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/3372Provisionning needed for bulk deployment2019-12-19T15:07:29Z7heo .tkProvisionning needed for bulk deploymentThe provisionning of the OS is an important missing feature.
It should encompass the following features:
1. Ability to provision a small number of clients using a bare setup (no
packages/configuration required).
2. Ability to provisi...The provisionning of the OS is an important missing feature.
It should encompass the following features:
1. Ability to provision a small number of clients using a bare setup (no
packages/configuration required).
2. Ability to provision a large number of clients using a specific
configuration (PXE advised).
3. Ability to parallel the provisionning.
So far, the following options have been considered:
\- To use \`cat provision\_script | nc -q0 -lp 4810\` on a machine, and
\`tmpfile=$(mktemp); nc $ip 4810 >$tmpfile && chmod a+x $tmpfile &&
$tmpfile; rm $tmpfile\` on the client (possibly as a script distributed
with alpine). Problem: does not support parallelisation (invalidating
point 3). Usage with PXE is possible but complicated, since the command
requires the provisionning machine’s IP address (complicating point 2).
\- To use an httpd instead of nc. It has the advantage of allowing
parallelisation (solving point 2 and 3), but does not solve the
complexity required with PXE. It also brings in a new problem: httpd
isn’t a standard utility available on the shell, and it therefore can
require a package/configuration (invalidating point 1).
- To use PXE. That solves the points 2 and 3, but also invalidates point
1, since it requires a non-trivial setup.
An ideal solution would provide all required abilities.
*(from redmine: issue id 3372, created on 2014-09-18)*3.12.0Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/3370Please provide a webkitgtk2 package2019-07-23T14:02:20Z7heo .tkPlease provide a webkitgtk2 packageFrom the IRC log:
<`ncopa> i see that arch linux builds both webkit for gtk3 and gtk2
<`ncopa>it should not be too hard to do similar
&lt;`ncopa> and provide a webkitgtk2 package
<`ncopa>it just takes ages to compile
&lt;^7heo\_>...From the IRC log:
<`ncopa> i see that arch linux builds both webkit for gtk3 and gtk2
<`ncopa>it should not be too hard to do similar
<`ncopa> and provide a webkitgtk2 package
<`ncopa>it just takes ages to compile
<^7heo\_>yeah
<^7heo\_>but if you can provide it, it’s better :)
*(from redmine: issue id 3370, created on 2014-09-17, closed on 2014-11-18)*3.1.0Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/3369OpenLDAP MQTT Overlay2019-07-23T14:02:21ZLeonardo ArenaOpenLDAP MQTT OverlayIt would be nice to have the possibility to configure the following MQTT
options:
\- QoS
\- Retain flag
\- Broker host
- Message
*(from redmine: issue id 3369, created on 2014-09-16, closed on 2019-06-11)*It would be nice to have the possibility to configure the following MQTT
options:
\- QoS
\- Retain flag
\- Broker host
- Message
*(from redmine: issue id 3369, created on 2014-09-16, closed on 2019-06-11)*Timo TeräsTimo Teräshttps://gitlab.alpinelinux.org/alpine/aports/-/issues/3368Bitlbee(including otr) segfault2019-07-23T14:02:22ZJohn DoeBitlbee(including otr) segfaultThe daemon starts fine, but when a client connects to the daemon, it
segfaults.
It appears to be fixed with the Bitlbee release that’s available in the
edge repository.
*(from redmine: issue id 3368, created on 2014-09-16, closed on ...The daemon starts fine, but when a client connects to the daemon, it
segfaults.
It appears to be fixed with the Bitlbee release that’s available in the
edge repository.
*(from redmine: issue id 3368, created on 2014-09-16, closed on 2014-11-18)*
* Changesets:
* Revision 6be95a06c3d3cf9d38c7bfe053c68003fd433de1 by Natanael Copa on 2014-09-16T09:31:11Z:
```
main/bitlbee: upgrade to 3.2.2
fixes #3368
(cherry picked from commit f36941fe3ace681b7d1cd0185667cfc93ba597ee)
```Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/3367fetchmail crashes because of missing folder2019-07-23T14:02:23ZPanthera Tigrisfetchmail crashes because of missing folderOn systems with a tmpfs mounted into /var/run, fetchmail will crash
right after the start-up due to the default folder /var/run/fetchmail
being absent. I suggest the following patch in order to ensure the
folder is created during start-u...On systems with a tmpfs mounted into /var/run, fetchmail will crash
right after the start-up due to the default folder /var/run/fetchmail
being absent. I suggest the following patch in order to ensure the
folder is created during start-up.
--- /etc/init.d/fetchmail
+++ /etc/init.d/fetchmail
@@ -19,0 +20 @@
+ checkpath -d ${pidfile%/*} -o fetchmail
*(from redmine: issue id 3367, created on 2014-09-16, closed on 2014-10-08)*
* Changesets:
* Revision 47ccffb4c0eb924b04584f5523224b8ffe77e91a by Natanael Copa on 2014-09-16T08:53:35Z:
```
main/fetchmail: create dir for pidfile on startup
ref #3367
```
* Revision 86f180335d08c79a7a70df0297dd3ed1fd64550b by Natanael Copa on 2014-09-16T09:35:07Z:
```
main/fetchmail: create dir for pidfile on startup
fixes #3367
```3.0.5Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/3366Request for NFC related modules/libs2019-07-23T14:02:24ZV KrishnRequest for NFC related modules/libsNetwork kernel modules that seems important:
Please have a look,
1. nfc + nfc-tool (neard)
Reference/infos:
- http://www.nxp.com/documents/brochure/75017587.pdf
- http://www.nxp.com/news/whats-cooking-in-rd/2034-mbps-nfc.html
-...Network kernel modules that seems important:
Please have a look,
1. nfc + nfc-tool (neard)
Reference/infos:
- http://www.nxp.com/documents/brochure/75017587.pdf
- http://www.nxp.com/news/whats-cooking-in-rd/2034-mbps-nfc.html
- http://www.nxp.com/news/press-releases/2014/08/nxp-releases-complete-passive-solution-for-nfc-interaction-with-electronic-devices.html
- http://www.nxp.com/news/press-releases/2014/02/nxp-expands-nfc-ecosystem-with-android-kitkat-integration.html
*(from redmine: issue id 3366, created on 2014-09-15, closed on 2014-11-18)*
* Changesets:
* Revision dfde3a5736926775e97680a527bcbae9b482c23f by Natanael Copa on 2014-09-22T11:27:31Z:
```
main/linux-grsec: enable NFC for x86 and x86_64
ref #3366
```
* Revision 31e6b0a3853f55eb7a997c57d2dd212ff9f1b980 by Natanael Copa on 2014-09-22T15:32:36Z:
```
testing/neard: new aport
Near Field Communication manager
https://01.org/linux-nfc/
fixes #3366
```
* Revision 42676be970fa8b8dc3716ca4cbaff19bb88aabdf by Natanael Copa on 2014-10-02T14:38:07Z:
```
main/linux-grsec: enable NFC for x86 and x86_64
fixes #3366
```3.1.0https://gitlab.alpinelinux.org/alpine/aports/-/issues/3365[v3.0] procmail: heap overflow in formail (CVE-2014-3618)2019-07-23T14:02:25ZAlexander Belous[v3.0] procmail: heap overflow in formail (CVE-2014-3618)Heap overflow was noticed by Tavis Ormandy in procmail. He proposes a
patch.
References:
CONFIRM and PATCH: http://seclists.org/oss-sec/2014/q3/496
*(from redmine: issue id 3365, created on 2014-09-05, closed on 2014-09-24)*
* Rela...Heap overflow was noticed by Tavis Ormandy in procmail. He proposes a
patch.
References:
CONFIRM and PATCH: http://seclists.org/oss-sec/2014/q3/496
*(from redmine: issue id 3365, created on 2014-09-05, closed on 2014-09-24)*
* Relations:
* parent #3361
* Changesets:
* Revision 06ffd1eea7d213c2c4bdeb89568a70f34b7add9b by Natanael Copa on 2014-09-10T09:18:01Z:
```
main/procmail: security fix (CVE-2014-3618)
ref #3361
fixes #3365
```3.0.5Carlo LandmeterCarlo Landmeterhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/3364[v2.7] procmail: heap overflow in formail (CVE-2014-3618)2019-07-23T14:02:26ZAlexander Belous[v2.7] procmail: heap overflow in formail (CVE-2014-3618)Heap overflow was noticed by Tavis Ormandy in procmail. He proposes a
patch.
References:
CONFIRM and PATCH: http://seclists.org/oss-sec/2014/q3/496
*(from redmine: issue id 3364, created on 2014-09-05, closed on 2014-09-24)*
* Rela...Heap overflow was noticed by Tavis Ormandy in procmail. He proposes a
patch.
References:
CONFIRM and PATCH: http://seclists.org/oss-sec/2014/q3/496
*(from redmine: issue id 3364, created on 2014-09-05, closed on 2014-09-24)*
* Relations:
* parent #3361
* Changesets:
* Revision 9781af786ef3c68a0a78e8cc2fc19355ebb532a8 by Natanael Copa on 2014-09-10T09:19:08Z:
```
main/procmail: security fix (CVE-2014-3618)
ref #3361
fixes #3364
```Alpine 2.7.10Carlo LandmeterCarlo Landmeterhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/3363[v2.6] procmail: heap overflow in formail (CVE-2014-3618)2019-07-23T14:02:27ZAlexander Belous[v2.6] procmail: heap overflow in formail (CVE-2014-3618)Heap overflow was noticed by Tavis Ormandy in procmail. He proposes a
patch.
References:
CONFIRM and PATCH: http://seclists.org/oss-sec/2014/q3/496
*(from redmine: issue id 3363, created on 2014-09-05, closed on 2014-09-24)*
* Rela...Heap overflow was noticed by Tavis Ormandy in procmail. He proposes a
patch.
References:
CONFIRM and PATCH: http://seclists.org/oss-sec/2014/q3/496
*(from redmine: issue id 3363, created on 2014-09-05, closed on 2014-09-24)*
* Relations:
* parent #3361
* Changesets:
* Revision 73df620437c098406c31255e573110def938db86 by Natanael Copa on 2014-09-10T09:21:00Z:
```
main/procmail: security fix (CVE-2014-3618)
ref #3361
fixes #3363
```Alpine 2.6.7Carlo LandmeterCarlo Landmeterhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/3362[v2.5] procmail: heap overflow in formail (CVE-2014-3618)2019-07-23T14:02:28ZAlexander Belous[v2.5] procmail: heap overflow in formail (CVE-2014-3618)Heap overflow was noticed by Tavis Ormandy in procmail. He propose a
patch.
References:
CONFIRM and PATCH: http://seclists.org/oss-sec/2014/q3/496
*(from redmine: issue id 3362, created on 2014-09-05, closed on 2014-09-24)*
* Relat...Heap overflow was noticed by Tavis Ormandy in procmail. He propose a
patch.
References:
CONFIRM and PATCH: http://seclists.org/oss-sec/2014/q3/496
*(from redmine: issue id 3362, created on 2014-09-05, closed on 2014-09-24)*
* Relations:
* parent #3361
* Changesets:
* Revision a697949d338c950eaabe908b07a86bca96983d87 by Natanael Copa on 2014-09-10T09:26:10Z:
```
main/procmail: security fix (CVE-2014-3618)
ref #3361
fixes #3362
```Alpine 2.5.5Carlo LandmeterCarlo Landmeterhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/3361procmail: heap overflow in formail (CVE-2014-3618)2019-07-23T14:02:29ZAlexander Belousprocmail: heap overflow in formail (CVE-2014-3618)Heap overflow was noticed by Tavis Ormandy in procmail. He propose a
patch.
References:
CONFIRM and PATCH: http://seclists.org/oss-sec/2014/q3/496
*(from redmine: issue id 3361, created on 2014-09-05, closed on 2014-09-24)*
* Relat...Heap overflow was noticed by Tavis Ormandy in procmail. He propose a
patch.
References:
CONFIRM and PATCH: http://seclists.org/oss-sec/2014/q3/496
*(from redmine: issue id 3361, created on 2014-09-05, closed on 2014-09-24)*
* Relations:
* child #3362
* child #3363
* child #3364
* child #3365
* Changesets:
* Revision 727f38810c48dea818e1ceb081ae2b2b8ca122f5 by Natanael Copa on 2014-09-10T08:49:39Z:
```
main/procmail: security fix (CVE-2014-3618)
ref #3361
```
* Revision 06ffd1eea7d213c2c4bdeb89568a70f34b7add9b by Natanael Copa on 2014-09-10T09:18:01Z:
```
main/procmail: security fix (CVE-2014-3618)
ref #3361
fixes #3365
```
* Revision 9781af786ef3c68a0a78e8cc2fc19355ebb532a8 by Natanael Copa on 2014-09-10T09:19:08Z:
```
main/procmail: security fix (CVE-2014-3618)
ref #3361
fixes #3364
```
* Revision 73df620437c098406c31255e573110def938db86 by Natanael Copa on 2014-09-10T09:21:00Z:
```
main/procmail: security fix (CVE-2014-3618)
ref #3361
fixes #3363
```
* Revision a697949d338c950eaabe908b07a86bca96983d87 by Natanael Copa on 2014-09-10T09:26:10Z:
```
main/procmail: security fix (CVE-2014-3618)
ref #3361
fixes #3362
```https://gitlab.alpinelinux.org/alpine/aports/-/issues/3360[v3.0] dhcpcd: DHO_OPTIONSOVERLOADED option related issue (CVE-2014-6060)2019-07-23T14:02:30ZAlexander Belous[v3.0] dhcpcd: DHO_OPTIONSOVERLOADED option related issue (CVE-2014-6060)As reported by Tobias Stoeckmann:
In function get\_option, the DHO\_OPTIONSOVERLOADED option checks if
there are overloaded options, like bootfile or servername. It tries to
make sure that it’s called only once, BUT overwrites that inf...As reported by Tobias Stoeckmann:
In function get\_option, the DHO\_OPTIONSOVERLOADED option checks if
there are overloaded options, like bootfile or servername. It tries to
make sure that it’s called only once, BUT overwrites that information
after receiving a DHO\_END. A malicious server could set the option
DHO\_OPTIONSOVERLOADED yet another time in the bootfile or servername
section, which will result in another jump — maybe into the same area.
dhcpcd-4.0.0 through 6.4.2 are vulnerable. dhcpcd-6.4.3 has been
released with the above fix.
References:
CONFIRM: http://seclists.org/oss-sec/2014/q3/483
COMMIT:
http://roy.marples.name/projects/dhcpcd/ci/1d2b93aa5ce25a8a710082fe2d36a6bf7f5794d5?sbs=0
*(from redmine: issue id 3360, created on 2014-09-05, closed on 2014-09-24)*
* Relations:
* parent #3356
* Changesets:
* Revision 037757b269e17c62b4cacca5618a86a4d89787e7 by Natanael Copa on 2014-09-12T11:25:51Z:
```
main/dhcpcd: security upgrade to 6.4.3 (CVE-2014-6060)
fixes #3360
```3.0.5Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/3359[v2.7] dhcpcd: DHO_OPTIONSOVERLOADED option related issue (CVE-2014-6060)2019-07-23T14:02:32ZAlexander Belous[v2.7] dhcpcd: DHO_OPTIONSOVERLOADED option related issue (CVE-2014-6060)As reported by Tobias Stoeckmann:
In function get\_option, the DHO\_OPTIONSOVERLOADED option checks if
there are overloaded options, like bootfile or servername. It tries to
make sure that it’s called only once, BUT overwrites that inf...As reported by Tobias Stoeckmann:
In function get\_option, the DHO\_OPTIONSOVERLOADED option checks if
there are overloaded options, like bootfile or servername. It tries to
make sure that it’s called only once, BUT overwrites that information
after receiving a DHO\_END. A malicious server could set the option
DHO\_OPTIONSOVERLOADED yet another time in the bootfile or servername
section, which will result in another jump — maybe into the same area.
dhcpcd-4.0.0 through 6.4.2 are vulnerable. dhcpcd-6.4.3 has been
released with the above fix.
References:
CONFIRM: http://seclists.org/oss-sec/2014/q3/483
COMMIT:
http://roy.marples.name/projects/dhcpcd/ci/1d2b93aa5ce25a8a710082fe2d36a6bf7f5794d5?sbs=0
*(from redmine: issue id 3359, created on 2014-09-05, closed on 2014-09-24)*
* Relations:
* parent #3356
* Changesets:
* Revision f0a333624995d62f687b2c7a5c026d0a5ba648bf by Natanael Copa on 2014-09-12T11:30:30Z:
```
main/dhcpcd: fix CVE-2014-6060
fixes #3359
```Alpine 2.7.10Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/3358[v2.6] dhcpcd: DHO_OPTIONSOVERLOADED option related issue (CVE-2014-6060)2019-07-23T14:02:33ZAlexander Belous[v2.6] dhcpcd: DHO_OPTIONSOVERLOADED option related issue (CVE-2014-6060)As reported by Tobias Stoeckmann:
In function get\_option, the DHO\_OPTIONSOVERLOADED option checks if
there are overloaded options, like bootfile or servername. It tries to
make sure that it’s called only once, BUT overwrites that inf...As reported by Tobias Stoeckmann:
In function get\_option, the DHO\_OPTIONSOVERLOADED option checks if
there are overloaded options, like bootfile or servername. It tries to
make sure that it’s called only once, BUT overwrites that information
after receiving a DHO\_END. A malicious server could set the option
DHO\_OPTIONSOVERLOADED yet another time in the bootfile or servername
section, which will result in another jump — maybe into the same area.
dhcpcd-4.0.0 through 6.4.2 are vulnerable. dhcpcd-6.4.3 has been
released with the above fix.
References:
CONFIRM: http://seclists.org/oss-sec/2014/q3/483
COMMIT:
http://roy.marples.name/projects/dhcpcd/ci/1d2b93aa5ce25a8a710082fe2d36a6bf7f5794d5?sbs=0
*(from redmine: issue id 3358, created on 2014-09-05, closed on 2014-09-24)*
* Relations:
* parent #3356
* Changesets:
* Revision 492e80f1123d853bf5ed5f1db8a3590bdf0e479b by Natanael Copa on 2014-09-12T11:35:42Z:
```
main/dhcpcd: fix CVE-2014-6060
fixes #3358
```Alpine 2.6.7Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/3357[v2.5] dhcpcd: DHO_OPTIONSOVERLOADED option related issue (CVE-2014-6060)2019-07-23T14:02:34ZAlexander Belous[v2.5] dhcpcd: DHO_OPTIONSOVERLOADED option related issue (CVE-2014-6060)As reported by Tobias Stoeckmann:
In function get\_option, the DHO\_OPTIONSOVERLOADED option checks if
there are overloaded options, like bootfile or servername. It tries to
make sure that it’s called only once, BUT overwrites that inf...As reported by Tobias Stoeckmann:
In function get\_option, the DHO\_OPTIONSOVERLOADED option checks if
there are overloaded options, like bootfile or servername. It tries to
make sure that it’s called only once, BUT overwrites that information
after receiving a DHO\_END. A malicious server could set the option
DHO\_OPTIONSOVERLOADED yet another time in the bootfile or servername
section, which will result in another jump — maybe into the same area.
dhcpcd-4.0.0 through 6.4.2 are vulnerable. dhcpcd-6.4.3 has been
released with the above fix.
References:
CONFIRM: http://seclists.org/oss-sec/2014/q3/483
COMMIT:
http://roy.marples.name/projects/dhcpcd/ci/1d2b93aa5ce25a8a710082fe2d36a6bf7f5794d5?sbs=0
*(from redmine: issue id 3357, created on 2014-09-05, closed on 2014-09-24)*
* Relations:
* parent #3356
* Changesets:
* Revision 6bdb184bee8ac9364997e653cb3a30759d5096a0 by Natanael Copa on 2014-09-12T11:47:28Z:
```
main/dhcpcd: fix CVE-2014-6060
fixes #3357
```Alpine 2.5.5Natanael CopaNatanael Copa