Date: Wed, 30 Jul 2014 18:12:38 +0000 From: bugzilla-noreply@freebsd.org To: freebsd-ports-bugs@FreeBSD.org Subject: [Bug 192276] New: Update port net/dhcpcd to 6.4.3 Message-ID: <bug-192276-13@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=192276 Bug ID: 192276 Summary: Update port net/dhcpcd to 6.4.3 Product: Ports Tree Version: Latest Hardware: Any OS: Any Status: Needs Triage Severity: Affects Many People Priority: --- Component: Individual Port(s) Assignee: freebsd-ports-bugs@FreeBSD.org Reporter: roy@marples.name Created attachment 145162 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=145162&action=edit Patch to net/dhcpcd to update to 6.4.3 dhcpcd-6.4.3 has been released with the following changes: * Correct DHCPv6 Prefix Delegation option decoding * Ensure that a given buffer is at least BUFSIZ (for getline compat) * Poll interfaces on BSD for IFF_RUNNING if link state cannot be obtained * Check for an IA to use in DHCPv6 lease validation * Fix compile on NetBSD-6 (and possibly earlier NetBSDs) * Warn about exceeding IDGEN_RETRIES when a stable private address cannot be obtained * Fix DHCP option overload handling, thanks to Tobias Stoeckmann The last point is particularly important because a carefully crafted DHCP message could put dhcpcd into an infinite loop, causing a Denial Of Service attack. This error is in all dhcpcd versions from dhcpcd-4.0.0 upwards, earlier versions are not affected. -- You are receiving this mail because: You are the assignee for the bug.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-192276-13>