lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <20060804084655.5121CFDDD@finlandia.home.infodrom.org>
Date: Fri,  4 Aug 2006 10:46:55 +0200 (CEST)
From: joey@...odrom.org (Martin Schulze)
To: debian-security-announce@...ts.debian.org (Debian Security Announcements)
Cc: 
Subject: [SECURITY] [DSA 1143-1] New dhcp packages fix
	denial of service

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 1143-1                    security@...ian.org
http://www.debian.org/security/                             Martin Schulze
August 4th, 2006                        http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : dhcp
Vulnerability  : programming error
Problem type   : remote
Debian-specific: no
CVE ID         : CVE-2006-3122
Debian Bug     : 380273

Justin Winschief and Andrew Steets discovered a bug in dhcp, the DHCP
server for automatic IP address assignment, which causes the server to
unexpectedly exit.

For the stable distribution (sarge) this problem has been fixed in
version 2.0pl5-19.1sarge2.

For the unstable distribution (sid) this problem will be fixed soon.

We recommend that you upgrade your dhcp package.


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given at the end of this advisory:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/d/dhcp/dhcp_2.0pl5-19.1sarge2.dsc
      Size/MD5 checksum:      687 f73fef2e9996c07f813e8b44cf058fed
    http://security.debian.org/pool/updates/main/d/dhcp/dhcp_2.0pl5-19.1sarge2.diff.gz
      Size/MD5 checksum:    86660 931619c25909dde0f8278502d089a509
    http://security.debian.org/pool/updates/main/d/dhcp/dhcp_2.0pl5.orig.tar.gz
      Size/MD5 checksum:   294909 ab22f363a7aff924e2cc9d1019a21498

  Alpha architecture:

    http://security.debian.org/pool/updates/main/d/dhcp/dhcp_2.0pl5-19.1sarge2_alpha.deb
      Size/MD5 checksum:   123178 1d36fdc0bdee24e63ddd68290de55d42
    http://security.debian.org/pool/updates/main/d/dhcp/dhcp-client_2.0pl5-19.1sarge2_alpha.deb
      Size/MD5 checksum:   115486 bf17b3f6d1d23a4f24f63dc8dee47c4f
    http://security.debian.org/pool/updates/main/d/dhcp/dhcp-relay_2.0pl5-19.1sarge2_alpha.deb
      Size/MD5 checksum:    80526 c23b5a983212426881e79e42abb08103

  AMD64 architecture:

    http://security.debian.org/pool/updates/main/d/dhcp/dhcp_2.0pl5-19.1sarge2_amd64.deb
      Size/MD5 checksum:   116010 53d3be3b942892ff1a0cc641152a7c0b
    http://security.debian.org/pool/updates/main/d/dhcp/dhcp-client_2.0pl5-19.1sarge2_amd64.deb
      Size/MD5 checksum:   108676 99eaef8f0c56b81b28e09bf2040dbfe5
    http://security.debian.org/pool/updates/main/d/dhcp/dhcp-relay_2.0pl5-19.1sarge2_amd64.deb
      Size/MD5 checksum:    75952 170a4701d80b295679e605cfc56fb955

  ARM architecture:

    http://security.debian.org/pool/updates/main/d/dhcp/dhcp_2.0pl5-19.1sarge2_arm.deb
      Size/MD5 checksum:   114428 e220cadbd5250f55e7a88a8df95ea487
    http://security.debian.org/pool/updates/main/d/dhcp/dhcp-client_2.0pl5-19.1sarge2_arm.deb
      Size/MD5 checksum:   107212 3a73115a056708b9a6190cbda179ce18
    http://security.debian.org/pool/updates/main/d/dhcp/dhcp-relay_2.0pl5-19.1sarge2_arm.deb
      Size/MD5 checksum:    74422 fdfdb05b69c11736c16a6aea1d8c0aa4

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/d/dhcp/dhcp_2.0pl5-19.1sarge2_i386.deb
      Size/MD5 checksum:   109440 ca711b93042d11f8b5c853c3f648242a
    http://security.debian.org/pool/updates/main/d/dhcp/dhcp-client_2.0pl5-19.1sarge2_i386.deb
      Size/MD5 checksum:   102220 558d78e22d1f4f909b718c46baa09cc4
    http://security.debian.org/pool/updates/main/d/dhcp/dhcp-relay_2.0pl5-19.1sarge2_i386.deb
      Size/MD5 checksum:    71330 6d5c42ff7f481df025b687b3969a6c25

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/d/dhcp/dhcp_2.0pl5-19.1sarge2_ia64.deb
      Size/MD5 checksum:   144842 fe2d7f0eb45fba721e616f25dcdf29bb
    http://security.debian.org/pool/updates/main/d/dhcp/dhcp-client_2.0pl5-19.1sarge2_ia64.deb
      Size/MD5 checksum:   136910 2ab43f384602792ae905ed00ee0b3465
    http://security.debian.org/pool/updates/main/d/dhcp/dhcp-relay_2.0pl5-19.1sarge2_ia64.deb
      Size/MD5 checksum:    92922 c87307ed1d553b3309c9d8f5b9a71783

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/d/dhcp/dhcp_2.0pl5-19.1sarge2_hppa.deb
      Size/MD5 checksum:   116134 49852e02e411112adb6ad7acdee24c31
    http://security.debian.org/pool/updates/main/d/dhcp/dhcp-client_2.0pl5-19.1sarge2_hppa.deb
      Size/MD5 checksum:   109042 6c117a4f8bb1cb0cf74f3e92baaf20e1
    http://security.debian.org/pool/updates/main/d/dhcp/dhcp-relay_2.0pl5-19.1sarge2_hppa.deb
      Size/MD5 checksum:    76740 6cc2f2822a7aa36b18eaaaae453d96a9

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/d/dhcp/dhcp_2.0pl5-19.1sarge2_m68k.deb
      Size/MD5 checksum:   108782 fb3680aa3ea521fb4e77642cc47ac102
    http://security.debian.org/pool/updates/main/d/dhcp/dhcp-client_2.0pl5-19.1sarge2_m68k.deb
      Size/MD5 checksum:   101672 9d6d600f9eecb2cda48c5f632e06bdf1
    http://security.debian.org/pool/updates/main/d/dhcp/dhcp-relay_2.0pl5-19.1sarge2_m68k.deb
      Size/MD5 checksum:    71418 79acf1203e75efb88a6216a8ed8d7a5b

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/d/dhcp/dhcp_2.0pl5-19.1sarge2_mips.deb
      Size/MD5 checksum:   118566 c1b9855f7bb152ef9e8086a9631a4759
    http://security.debian.org/pool/updates/main/d/dhcp/dhcp-client_2.0pl5-19.1sarge2_mips.deb
      Size/MD5 checksum:   111614 b22335a1a584a6e03622f92672d564af
    http://security.debian.org/pool/updates/main/d/dhcp/dhcp-relay_2.0pl5-19.1sarge2_mips.deb
      Size/MD5 checksum:    78014 cd698721ca4b076f4021c38e555301c1

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/d/dhcp/dhcp_2.0pl5-19.1sarge2_mipsel.deb
      Size/MD5 checksum:   118140 0b08da85c43ad35c296a1554bbea0040
    http://security.debian.org/pool/updates/main/d/dhcp/dhcp-client_2.0pl5-19.1sarge2_mipsel.deb
      Size/MD5 checksum:   111074 bf434314d3726fc72f1ba520019ad3e5
    http://security.debian.org/pool/updates/main/d/dhcp/dhcp-relay_2.0pl5-19.1sarge2_mipsel.deb
      Size/MD5 checksum:    77664 65e41b021840dd87d5cc776076ca5f92

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/d/dhcp/dhcp_2.0pl5-19.1sarge2_powerpc.deb
      Size/MD5 checksum:   112540 0b83ec51591c3d2fc892cef08c25658d
    http://security.debian.org/pool/updates/main/d/dhcp/dhcp-client_2.0pl5-19.1sarge2_powerpc.deb
      Size/MD5 checksum:   105446 e80540790b43f62d39d8e8ecccf06196
    http://security.debian.org/pool/updates/main/d/dhcp/dhcp-relay_2.0pl5-19.1sarge2_powerpc.deb
      Size/MD5 checksum:    73954 ae82323f9af86e64f809cb07165df9c4

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/d/dhcp/dhcp_2.0pl5-19.1sarge2_s390.deb
      Size/MD5 checksum:   116578 45547a0804c240a48f90087d19e79b7a
    http://security.debian.org/pool/updates/main/d/dhcp/dhcp-client_2.0pl5-19.1sarge2_s390.deb
      Size/MD5 checksum:   109366 8915a41a56e4d96080f937ec4e253381
    http://security.debian.org/pool/updates/main/d/dhcp/dhcp-relay_2.0pl5-19.1sarge2_s390.deb
      Size/MD5 checksum:    76834 55b285d1b7fa0cf81f3869441d576f16

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/d/dhcp/dhcp_2.0pl5-19.1sarge2_sparc.deb
      Size/MD5 checksum:   113842 3800bc8307455eff6a3b38e820c5409f
    http://security.debian.org/pool/updates/main/d/dhcp/dhcp-client_2.0pl5-19.1sarge2_sparc.deb
      Size/MD5 checksum:   106432 921b89e0c14344507cdf3272bc1e0c96
    http://security.debian.org/pool/updates/main/d/dhcp/dhcp-relay_2.0pl5-19.1sarge2_sparc.deb
      Size/MD5 checksum:    74860 312464adc38738ae26352b79c270109d


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@...ts.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)

iD8DBQFE0wl+W5ql+IAeqTIRAtXSAJ91vL/xP+UtdKitWJt/gxI4zGYaIACfZVnJ
qI1L5r6yMaRJTiqtaQieh4Y=
=Aw+Q
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ