diff options
author | Andreas Rammhold <andreas@rammhold.de> | 2019-08-29 10:34:36 +0200 |
---|---|---|
committer | Andreas Rammhold <andreas@rammhold.de> | 2019-08-29 10:38:24 +0200 |
commit | e6e3270bd44ddc7d94df6b054a1e4e543055ca05 (patch) | |
tree | 9063f34cb6217f9bdbe8921053251defad126337 /pkgs/tools/networking/kea | |
parent | be075ed348dfbddeefdb8cdd57fc5cb443a4337e (diff) |
kea: 1.5.0 -> 1.5.0-P1 (security)
Fixes: * CVE-2019-6472 affects the Kea DHCPv6 server, which can exit with an assertion failure if the DHCPv6 server process receives a request containing DUID value which is too large. (https://kb.isc.org/docs/cve-2019-6474) * CVE-2019-6473 affects the Kea DHCPv4 server, which can exit with an assertion failure if it receives a packed containing a malformed option. (https://kb.isc.org/docs/cve-2019-6473) * CVE-2019-6474 can cause a condition where the server cannot be restarted without manual operator intervention to correct a problem that can be deliberately introduced into the stored leases. CVE-2019-6474 can only affect servers which are using memfile for lease storage. (https://kb.isc.org/docs/cve-2019-6474) Annoucement: https://www.openwall.com/lists/oss-security/2019/08/29/1
Diffstat (limited to 'pkgs/tools/networking/kea')
-rw-r--r-- | pkgs/tools/networking/kea/default.nix | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/pkgs/tools/networking/kea/default.nix b/pkgs/tools/networking/kea/default.nix index a1c156475fb42..0d1bd462d3b48 100644 --- a/pkgs/tools/networking/kea/default.nix +++ b/pkgs/tools/networking/kea/default.nix @@ -4,11 +4,11 @@ stdenv.mkDerivation rec { name = "${pname}-${version}"; pname = "kea"; - version = "1.5.0"; + version = "1.5.0-P1"; src = fetchurl { url = "https://ftp.isc.org/isc/${pname}/${version}/${name}.tar.gz"; - sha256 = "1v5a3prgrplw6dp9124f9gpy0kz0jrjwhnvzrw3zcynad2mlzkpd"; + sha256 = "0bqxzp3f7cmraa5davj2az1hx1gbbchqzlz3ai26c802agzafyhz"; }; patches = [ ./dont-create-var.patch ]; |