diff options
| author | Andreas Rammhold <andreas@rammhold.de> | 2019-08-29 10:34:36 +0200 |
|---|---|---|
| committer | Andreas Rammhold <andreas@rammhold.de> | 2019-08-29 10:38:24 +0200 |
| commit | e6e3270bd44ddc7d94df6b054a1e4e543055ca05 (patch) | |
| tree | 9063f34cb6217f9bdbe8921053251defad126337 /pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch | |
| parent | be075ed348dfbddeefdb8cdd57fc5cb443a4337e (diff) | |
kea: 1.5.0 -> 1.5.0-P1 (security)
Fixes:
* CVE-2019-6472 affects the Kea DHCPv6 server, which can exit
with an assertion failure if the DHCPv6 server process receives
a request containing DUID value which is too large.
(https://kb.isc.org/docs/cve-2019-6474)
* CVE-2019-6473 affects the Kea DHCPv4 server, which can exit with
an assertion failure if it receives a packed containing a malformed
option. (https://kb.isc.org/docs/cve-2019-6473)
* CVE-2019-6474 can cause a condition where the server cannot be
restarted without manual operator intervention to correct a problem
that can be deliberately introduced into the stored leases.
CVE-2019-6474 can only affect servers which are using memfile
for lease storage. (https://kb.isc.org/docs/cve-2019-6474)
Annoucement: https://www.openwall.com/lists/oss-security/2019/08/29/1
Diffstat (limited to 'pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch')
0 files changed, 0 insertions, 0 deletions
