Package "dhcpcd5"
WARNING: the "dhcpcd5" package was deleted from this repository
Name: |
dhcpcd5
|
Description: |
DHCPv4, IPv6RA and DHCPv6 client with IPv4LL support
|
Latest version: |
*DELETED* |
Release: |
xenial (16.04) |
Level: |
proposed |
Repository: |
universe |
Homepage: |
http://roy.marples.name/projects/dhcpcd |
Links
Download "dhcpcd5"
Other versions of "dhcpcd5" in Xenial
Changelog
No changelog for deleted or moved packages.
|
dhcpcd5 (6.10.1-1) unstable; urgency=medium
* New upstream release (Closes: #813595)
* Fix CVE-2016-1504 invalid read/crash
via malformed dhcp responses by upstream (Closes: #810620)
* Fix CVE-2016-1503 heap overflow via malformed
dhcp responses in print_option (via dhcp_envoption1)
due to incorrect option length values by upstream (Closes: #810621)
* d/control:
- Bump Standards-Version to 3.9.7
* Fix dhcpcd5 FTBFS on kfreebsd-amd64
and kfreebsd-i386 by upstream (Closes: #815338)
* Fix Multiplication of IPv6 addresses by upstream (Closes: #791582)
* d/rules:
- Add hardening
* d/patches:
- fix-spelling-error for all older files
- fix-spelling-error-in-manpage for manpage`s
* d/dhcpcd5.lintian-overrides:
- Add overrides for spelling error binary false positive
* recommended revision in your dhcp by upstream (Closes: #799795)
-- Jose dos Santos Junior <email address hidden> Mon, 04 Apr 2016 09:58:32 -0300
|
813595 |
Upstream version 6.10.1 available - Debian Bug report logs |
810620 |
dhcpcd5: CVE-2016-1504: invalid read/crash via malformed dhcp responses - Debian Bug report logs |
810621 |
dhcpcd5: CVE-2016-1503: heap overflow via malformed dhcp responses in print_option (via dhcp_envoption1) due to incorrect option length values - Debi |
815338 |
dhcpcd5: FTBFS on kfreebsd: if-bsd.c:314:11: error: 'struct ipv4_state' has no member named 'buffer_size' - Debian Bug report logs |
791582 |
Multiplication of IPv6 addresses - Debian Bug report logs |
799795 |
Debian 8.2 does not get Default Gateway if DHCP client uses 121 option - Debian Bug report logs |
CVE-2016-1504 |
invalid read/crash via malformed dhcp responses |
CVE-2016-1503 |
heap overflow via malformed dhcp responses in print_option (via dhcp_envoption1) due to incorrect option length values |
|
About
-
Send Feedback to @ubuntu_updates