CVE-2014-7912 (retired)

Priority
Description
The get_option function in dhcp.c in dhcpcd before 6.2.0, as used in dhcpcd
5.x in Android before 5.1 and other products, does not validate the
relationship between length fields and the amount of data, which allows
remote DHCP servers to execute arbitrary code or cause a denial of service
(memory corruption) via a large length value of an option in a DHCPACK
message.
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needs-triage)
Trusty/esm:DNE (trusty was not-affected [code not present])
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Ubuntu 18.10 (Cosmic Cuttlefish):DNE
Ubuntu 19.04 (Disco Dingo):DNE
Ubuntu 19.10 (Eoan):DNE
Package
Upstream:released (6.9.0-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needed)
Trusty/esm:DNE (trusty was needed)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (6.9.1-1)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (6.9.1-1)
Ubuntu 18.10 (Cosmic Cuttlefish):not-affected (6.9.1-1)
Ubuntu 19.04 (Disco Dingo):not-affected (6.9.1-1)
Ubuntu 19.10 (Eoan):not-affected (6.9.1-1)
Patches:
Other:https://android.googlesource.com/platform/external/dhcpcd/+/73c09dd8067250734511d955d8f792b41c7213f0
More Information

Updated: 2019-04-26 14:33:54 UTC (commit 30899e40836d26e1bb5f0b072d31fd87b6cf3bd4)