Gentoo Archives: gentoo-commits

From: "Mikle Kolyada (zlogene)" <zlogene@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] gentoo commit in xml/htdocs/security/en/glsa: glsa-201409-03.xml
Date: Wed, 03 Sep 2014 15:32:22
Message-Id: 20140903153218.24FAF49BD@oystercatcher.gentoo.org
1 zlogene 14/09/03 15:32:18
2
3 Added: glsa-201409-03.xml
4 Log:
5 GLSA 201409-03
6
7 Revision Changes Path
8 1.1 xml/htdocs/security/en/glsa/glsa-201409-03.xml
9
10 file : http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/security/en/glsa/glsa-201409-03.xml?rev=1.1&view=markup
11 plain: http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/security/en/glsa/glsa-201409-03.xml?rev=1.1&content-type=text/plain
12
13 Index: glsa-201409-03.xml
14 ===================================================================
15 <?xml version="1.0" encoding="UTF-8"?>
16 <?xml-stylesheet href="/xsl/glsa.xsl" type="text/xsl"?>
17 <?xml-stylesheet href="/xsl/guide.xsl" type="text/xsl"?>
18 <!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
19 <glsa id="201409-03">
20 <title>dhcpcd: Denial of service</title>
21 <synopsis>A vulnerability in dhcpcd can lead to a Denial of Service
22 condition.
23 </synopsis>
24 <product type="ebuild">dhcpcd</product>
25 <announced>September 03, 2014</announced>
26 <revised>September 03, 2014: 1</revised>
27 <bug>518596</bug>
28 <access>remote</access>
29 <affected>
30 <package name="net-misc/dhcpcd" auto="yes" arch="*">
31 <unaffected range="ge">6.4.3</unaffected>
32 <vulnerable range="lt">6.4.3</vulnerable>
33 </package>
34 </affected>
35 <background>
36 <p>dhcpcd is a fully featured, yet light weight RFC2131 compliant DHCP
37 client.
38 </p>
39 </background>
40 <description>
41 <p>A vulnerability has been discovered in dhcpcd. A malicious dhcp server
42 can set flags as part of the dhcp reply that can cause a Denial of
43 Service condition.
44 </p>
45 </description>
46 <impact type="normal">
47 <p>A remote attacker can cause a Denial of Service condition.</p>
48 </impact>
49 <workaround>
50 <p>There is no known workaround at this time.</p>
51 </workaround>
52 <resolution>
53 <p>All dhcpcd users should upgrade to the latest version:</p>
54
55 <code>
56 # emerge --sync
57 # emerge --ask --oneshot --verbose "&gt;=net-misc/dhcpcd-6.4.3"
58 </code>
59
60 </resolution>
61 <references>
62 <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6060">CVE-2014-6060</uri>
63 </references>
64 <metadata tag="requester" timestamp="Fri, 01 Aug 2014 20:16:47 +0000">Zlogene</metadata>
65 <metadata tag="submitter" timestamp="Wed, 03 Sep 2014 15:31:47 +0000">Zlogene</metadata>
66 </glsa>