Users login

Create an account »

JOIN XATRIX

Users login

Home » Security Advisories» Fedora » dhcp 4.3.2 updates

dhcp 4.3.2 updates

Security fix for CVE-2016-2774

  • Vendor: Fedora
  • Vendor ID: FEDORA-2016-3e64b32a91
  • Date: May 17, 2016


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2016-3e64b32a91
2016-05-17 15:08:28.714713
--------------------------------------------------------------------------------

Name : dhcp
Product : Fedora 22
Version : 4.3.2
Release : 8.fc22
URL : http://isc.org/products/DHCP/
Summary : Dynamic host configuration protocol software
Description :
DHCP (Dynamic Host Configuration Protocol)

--------------------------------------------------------------------------------
Update Information:

Security fix for CVE-2016-2774
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #1315259 - CVE-2016-2774 dhcp: unclosed TCP connections to OMAPI or failover ports can
cause DoS
https://bugzilla.redhat.com/show_bug.cgi?id=1315259
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program. Use
su -c 'yum update dhcp' at the command line.
For more information, refer to "Managing Software with yum",
available at https://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
[email protected]
http://lists.fedoraproject.org/admin/lists/package-announ...

Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.

Contact

Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »