Opened 3 years ago
Closed 3 years ago
#4882 closed enhancement (fixed)
systemd-249
Reported by: | Douglas R. Reno | Owned by: | Douglas R. Reno |
---|---|---|---|
Priority: | high | Milestone: | 11.0 |
Component: | Book | Version: | git |
Severity: | normal | Keywords: | |
Cc: |
Description
New version
It looks relatively benign on the changes end.
Change History (6)
comment:1 by , 3 years ago
Owner: | changed from | to
---|---|
Status: | new → assigned |
comment:3 by , 3 years ago
Priority: | normal → high |
---|
The release notes do not mention the CVE, which is arguably the most important part of this release.
The CVE is known as CVE-2020-13529, and is in the systemd-networkd daemon. A specially crafted DHCP FORCERENEW packet can cause a server running the DHCP client to be vulnerable to a DHCP ACK spoofing attack. An attacker can forge a pair of FORCERENEW and DCHP ACK packets to reconfigure the server.
This issue seems to have been around since 245, so due to the merged-/usr changes, I will create a separate patch for 247 (LFS 10.1) and put that in the security advisory.
comment:4 by , 3 years ago
The man pages tarball has been uploaded to anduin.
This time, I did a DESTDIR install and copied /usr/share/man/* into a folder called systemd-man-pages-249, and then tarred it up.
The MD5SUM is d9f2508d6b114b1c02476cd79b8fc786
It is 584KB in size.
comment:5 by , 3 years ago
I'd rather call this "malignant", we'll need to copy/move MarkupSafe & Jinja2 from BLFS.
comment:6 by , 3 years ago
Resolution: | → fixed |
---|---|
Status: | assigned → closed |