CVE-2014-7912

Priority
Description
The get_option function in dhcp.c in dhcpcd before 6.2.0, as used in dhcpcd
5.x in Android before 5.1 and other products, does not validate the
relationship between length fields and the amount of data, which allows
remote DHCP servers to execute arbitrary code or cause a denial of service
(memory corruption) via a large length value of an option in a DHCPACK
message.
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needs-triage)
Ubuntu 14.04 LTS (Trusty Tahr):not-affected (code not present)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Ubuntu 18.10 (Cosmic Cuttlefish):DNE
Ubuntu 19.04 (Disco Dingo):DNE
Package
Upstream:released (6.9.0-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needed)
Ubuntu 14.04 LTS (Trusty Tahr):needed
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (6.9.1-1)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (6.9.1-1)
Ubuntu 18.10 (Cosmic Cuttlefish):not-affected (6.9.1-1)
Ubuntu 19.04 (Disco Dingo):not-affected (6.9.1-1)
Patches:
Other:https://android.googlesource.com/platform/external/dhcpcd/+/73c09dd8067250734511d955d8f792b41c7213f0
More Information

Updated: 2019-01-14 21:16:07 UTC (commit 51f9b73af244ba86b9321e46e526586c25a8e060)