Upstream has released version 6.10.2 on April 8, fixing a security issue originally found in Android: http://roy.marples.name/archives/dhcpcd-discuss/2016/1244.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7913 The latest version is 6.11.0. Here are the other release announcements since 6.10.0: http://roy.marples.name/archives/dhcpcd-discuss/2016/1146.html http://roy.marples.name/archives/dhcpcd-discuss/2016/1244.html http://roy.marples.name/archives/dhcpcd-discuss/2016/1251.html http://roy.marples.name/archives/dhcpcd-discuss/2016/1292.html
Assigning to dhpcd maintainer
CC: (none) => marja11Assignee: bugsquad => shlomif
Updated package uploaded for Mageia 5. Advisory: ======================== Updated dhcpcd package fixes security vulnerability: The print_option function in dhcp-common.c in dhcpcd through 6.10.2 misinterprets the return value of the snprintf function, which allows remote DHCP servers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted message (CVE-2014-7913). The dhcpcd package has been updated to version 6.11.0 which fixes this issue and has several other bug fixes and enhancements. References: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7913 http://roy.marples.name/archives/dhcpcd-discuss/2016/1146.html http://roy.marples.name/archives/dhcpcd-discuss/2016/1244.html http://roy.marples.name/archives/dhcpcd-discuss/2016/1251.html http://roy.marples.name/archives/dhcpcd-discuss/2016/1292.html ======================== Updated packages in core/updates_testing: ======================== dhcpcd-6.11.0-1.mga5 from dhcpcd-6.11.0-1.mga5.src.rpm
Assignee: shlomif => qa-bugs
Works fine on Mageia 5 i586.
Whiteboard: (none) => MGA5-32-OK
Keywords: (none) => validated_updateWhiteboard: MGA5-32-OK => MGA5-32-OK advisoryCC: (none) => davidwhodgins, sysadmin-bugs
An update for this issue has been pushed to the Mageia Updates repository. http://advisories.mageia.org/MGASA-2016-0190.html
Status: NEW => RESOLVEDResolution: (none) => FIXED
URL: (none) => http://lwn.net/Vulnerabilities/688209/