IBM Support

SI67240 - OSP-DHCP/Fix CVE-2018-5732 and CVE-2018-5733 for ISC DHCP

PTF Cover Letter


PTF ( Program Temporary Fixes ) Cover letter


Order this fix

Abstract

OSP-DHCP/Fix CVE-2018-5732 and CVE-2018-5733 for ISC DHCP


Pre/Co-Requisite PTF / Fix List

REQ  LICENSED           PTF/FIX  LEVEL

TYPE PROGRAM  RELEASE   NUMBER   MIN/MAX  OPTION
---- -------- --------- -------  -------  ------
NONE



NOTICE:
-------
Application of this PTF may disable or render ineffective programs that
use system memory addresses not generated by the IBM translator,
including programs that circumvent control technology designed to limit
interactive capacity to purchased levels.  This PTF may be a prerequisite
for future PTFs.  By applying this PTF you authorize and agree to the
foregoing.

This PTF is subject to the terms of the license agreement which
accompanied, or was contained in, the Program for which you are obtaining
the PTF.  You are not authorized to install or use the PTF except as part
of a Program for which you have a valid Proof of Entitlement.

SUBJECT TO ANY WARRANTIES WHICH CAN NOT BE EXCLUDED OR EXCEPT AS EXPLICITLY
AGREED TO IN THE APPLICABLE LICENSE AGREEMENT OR AN APPLICABLE SUPPORT
AGREEMENT, IBM MAKES NO WARRANTIES OR CONDITIONS EITHER EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OR CONDITIONS OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON INFRINGEMENT,
REGARDING THE PTF.

The applicable license agreement may have been provided to you in printed
form and/or may be viewed using the Work with Software Agreements (WRKSFWAGR)
CL command.


APAR Error Description / Circumvention

-------------------------------------------------
ISC released CVE-2018-5732 and CVE-2018-5733.
CVE-2018-5732: Failure to properly bounds check a buffer used
for processing DHCP options allows a malicious server (or an
entity masquerading as a server) to cause a buffer overflow (and
resulting crash) in dhclient by sending a response containing a
specially constructed options section.
CVE-2018-5733: A malicious client which is allowed to send very
large amounts of traffic (billions of packets) to a DHCP server
can eventually overflow a 32-bit reference counter, potentially
causing dhcpd to crash.

CORRECTION FOR APAR 'SE69050' :
-------------------------------
Fixed the problems with the ISC-provided fixes.

Note: Please ignore the fix if ISC DHCP server is not used.

CIRCUMVENTION FOR APAR 'SE69050' :
----------------------------------
None.


Activation Instructions

None.




Special Instructions

End ISC DHCP server on the system
Example: ENDTCPSVR SERVER(*DHCP)
Then apply the PTF
Start ISC DHCP server on the system
Example: STRTCPSVR SERVER(*DHCP)

Note: Make sure OpenSSL on the system is compatible with OpenSSL
1.0.2n.


Default Instructions

THIS PTF CAN BE APPLIED IMMEDIATE OR DELAYED.



Supersedes

PTF/FIX NO(S).  APAR TITLE LINE
--------------  ------------------------------------------------------------
   SI60110      OSP-DHCP/ CVE fix for CVE-2015-8605 and CVE-2016-2774

Summary Information

System..............................  i
Models..............................  
Release.............................  V7R2M0
Licensed Program....................  5770SS1
APAR Fixed..........................  View details for APAR SE69050
Superseded by:......................  View fix details for PTF SI81441
Recompile...........................  N
Library.............................  QDNS
MRI Feature ........................  NONE
Cum Level...........................  C8249720


IBM i Support

IBM disclaims all warranties, whether express or implied, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. By furnishing this document, IBM grants no licenses to any related patents or copyrights. Copyright © 1996,1997,1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012, 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021, 2022 IBM Corporation. Any trademarks and product or brand names referenced in this document are the property of their respective owners. Consult the Terms of use link for trademark information.

[{"Business Unit":{"code":"BU058","label":"IBM Infrastructure w\/TPS"},"Platform":[{"code":"PF012","label":"IBM i"}],"Version":"7.2.0","Product":{"code":"SWG60","label":"IBM i"},"Component":"5770SS1","Edition":"","Line of Business":{"code":"LOB57","label":"Power"}}]

Document Information

Modified date:
01 December 2022