UbuntuUpdates.org

Package "dhcpcd5"




Name: dhcpcd5

Description:

DHCPv4, IPv6RA and DHCPv6 client with IPv4LL support

Latest version: *DELETED*
Release: xenial (16.04)
Level: proposed
Repository: universe
Homepage: http://roy.marples.name/projects/dhcpcd

Links


Download "dhcpcd5"


Other versions of "dhcpcd5" in Xenial

Repository Area Version
base universe 6.10.1-1

Changelog

Version: *DELETED* 2016-04-06 09:06:44 UTC
No changelog for deleted or moved packages.

Version: 6.10.1-1 2016-04-06 08:07:24 UTC

  dhcpcd5 (6.10.1-1) unstable; urgency=medium

  * New upstream release (Closes: #813595)
  * Fix CVE-2016-1504 invalid read/crash
     via malformed dhcp responses by upstream (Closes: #810620)
  * Fix CVE-2016-1503 heap overflow via malformed
     dhcp responses in print_option (via dhcp_envoption1)
     due to incorrect option length values by upstream (Closes: #810621)
  * d/control:
     - Bump Standards-Version to 3.9.7
  * Fix dhcpcd5 FTBFS on kfreebsd-amd64
     and kfreebsd-i386 by upstream (Closes: #815338)
  * Fix Multiplication of IPv6 addresses by upstream (Closes: #791582)
  * d/rules:
     - Add hardening
  * d/patches:
     - fix-spelling-error for all older files
     - fix-spelling-error-in-manpage for manpage`s
  * d/dhcpcd5.lintian-overrides:
     - Add overrides for spelling error binary false positive
  * recommended revision in your dhcp by upstream (Closes: #799795)

 -- Jose dos Santos Junior <email address hidden> Mon, 04 Apr 2016 09:58:32 -0300

813595 Upstream version 6.10.1 available - Debian Bug report logs
810620 dhcpcd5: CVE-2016-1504: invalid read/crash via malformed dhcp responses - Debian Bug report logs
810621 dhcpcd5: CVE-2016-1503: heap overflow via malformed dhcp responses in print_option (via dhcp_envoption1) due to incorrect option length values - Debi
815338 dhcpcd5: FTBFS on kfreebsd: if-bsd.c:314:11: error: 'struct ipv4_state' has no member named 'buffer_size' - Debian Bug report logs
791582 Multiplication of IPv6 addresses - Debian Bug report logs
799795 Debian 8.2 does not get Default Gateway if DHCP client uses 121 option - Debian Bug report logs
CVE-2016-1504 invalid read/crash via malformed dhcp responses
CVE-2016-1503 heap overflow via malformed dhcp responses in print_option (via dhcp_envoption1) due to incorrect option length values



About   -   Send Feedback to @ubuntu_updates