CVE-2018-20679

Priority
Description
An issue was discovered in BusyBox before 1.30.0. An out of bounds read in
udhcp components (consumed by the DHCP server, client, and relay) allows a
remote attacker to leak sensitive information from the stack by sending a
crafted DHCP message. This is related to verification in udhcp_get_option()
in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.
Notes
mdeslaurthis fix is incomplete, see CVE-2019-5747
Package
Upstream:released (1:1.30.1-2)
Ubuntu 12.04 ESM (Precise Pangolin):needed
Ubuntu 14.04 ESM (Trusty Tahr):released (1:1.21.0-1ubuntu1.4)
Ubuntu 16.04 LTS (Xenial Xerus):released (1:1.22.0-15ubuntu1.4)
Ubuntu 18.04 LTS (Bionic Beaver):released (1:1.27.2-2ubuntu3.2)
Ubuntu 19.04 (Disco Dingo):released (1:1.27.2-2ubuntu5)
Ubuntu 19.10 (Eoan Ermine):released (1:1.27.2-2ubuntu5)
Ubuntu 20.04 (Focal Fossa):released (1:1.27.2-2ubuntu5)
Patches:
Upstream:https://git.busybox.net/busybox/commit/?id=6d3b4bb24da9a07c263f3c1acf8df85382ff562c
More Information

Updated: 2019-12-05 19:55:55 UTC (commit 0aa5e7c87c8b55d2ec5c7f4ca1179cf75de91961)