| Summary: | dhcpcd new security issue CVE-2014-7913 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | davidwhodgins, marja11, sysadmin-bugs |
| Version: | 5 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/688209/ | ||
| Whiteboard: | MGA5-32-OK advisory | ||
| Source RPM: | dhcpcd-6.10.0-1.mga5.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2016-05-09 23:37:44 CEST
Assigning to dhpcd maintainer CC:
(none) =>
marja11 Updated package uploaded for Mageia 5. Advisory: ======================== Updated dhcpcd package fixes security vulnerability: The print_option function in dhcp-common.c in dhcpcd through 6.10.2 misinterprets the return value of the snprintf function, which allows remote DHCP servers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted message (CVE-2014-7913). The dhcpcd package has been updated to version 6.11.0 which fixes this issue and has several other bug fixes and enhancements. References: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7913 http://roy.marples.name/archives/dhcpcd-discuss/2016/1146.html http://roy.marples.name/archives/dhcpcd-discuss/2016/1244.html http://roy.marples.name/archives/dhcpcd-discuss/2016/1251.html http://roy.marples.name/archives/dhcpcd-discuss/2016/1292.html ======================== Updated packages in core/updates_testing: ======================== dhcpcd-6.11.0-1.mga5 from dhcpcd-6.11.0-1.mga5.src.rpm Assignee:
shlomif =>
qa-bugs Works fine on Mageia 5 i586. Whiteboard:
(none) =>
MGA5-32-OK
Dave Hodgins
2016-05-20 11:39:00 CEST
Keywords:
(none) =>
validated_update An update for this issue has been pushed to the Mageia Updates repository. http://advisories.mageia.org/MGASA-2016-0190.html Status:
NEW =>
RESOLVED
David Walser
2016-05-20 18:06:41 CEST
URL:
(none) =>
http://lwn.net/Vulnerabilities/688209/ |