Linux Security
    Linux Security
    Linux Security

    Debian: New dhcp packages fix denial of service

    Date 04 Aug 2006
    Posted By LinuxSecurity Advisories
    Updated package.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 1143-1                    This email address is being protected from spambots. You need JavaScript enabled to view it.                             Martin Schulze
    August 4th, 2006              
    - --------------------------------------------------------------------------
    Package        : dhcp
    Vulnerability  : programming error
    Problem type   : remote
    Debian-specific: no
    CVE ID         : CVE-2006-3122
    Debian Bug     : 380273
    Justin Winschief and Andrew Steets discovered a bug in dhcp, the DHCP
    server for automatic IP address assignment, which causes the server to
    unexpectedly exit.
    For the stable distribution (sarge) this problem has been fixed in
    version 2.0pl5-19.1sarge2.
    For the unstable distribution (sid) this problem will be fixed soon.
    We recommend that you upgrade your dhcp package.
    Upgrade Instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given at the end of this advisory:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 3.1 alias sarge
    - --------------------------------
      Source archives:
          Size/MD5 checksum:      687 f73fef2e9996c07f813e8b44cf058fed
          Size/MD5 checksum:    86660 931619c25909dde0f8278502d089a509
          Size/MD5 checksum:   294909 ab22f363a7aff924e2cc9d1019a21498
      Alpha architecture:
          Size/MD5 checksum:   123178 1d36fdc0bdee24e63ddd68290de55d42
          Size/MD5 checksum:   115486 bf17b3f6d1d23a4f24f63dc8dee47c4f
          Size/MD5 checksum:    80526 c23b5a983212426881e79e42abb08103
      AMD64 architecture:
          Size/MD5 checksum:   116010 53d3be3b942892ff1a0cc641152a7c0b
          Size/MD5 checksum:   108676 99eaef8f0c56b81b28e09bf2040dbfe5
          Size/MD5 checksum:    75952 170a4701d80b295679e605cfc56fb955
      ARM architecture:
          Size/MD5 checksum:   114428 e220cadbd5250f55e7a88a8df95ea487
          Size/MD5 checksum:   107212 3a73115a056708b9a6190cbda179ce18
          Size/MD5 checksum:    74422 fdfdb05b69c11736c16a6aea1d8c0aa4
      Intel IA-32 architecture:
          Size/MD5 checksum:   109440 ca711b93042d11f8b5c853c3f648242a
          Size/MD5 checksum:   102220 558d78e22d1f4f909b718c46baa09cc4
          Size/MD5 checksum:    71330 6d5c42ff7f481df025b687b3969a6c25
      Intel IA-64 architecture:
          Size/MD5 checksum:   144842 fe2d7f0eb45fba721e616f25dcdf29bb
          Size/MD5 checksum:   136910 2ab43f384602792ae905ed00ee0b3465
          Size/MD5 checksum:    92922 c87307ed1d553b3309c9d8f5b9a71783
      HP Precision architecture:
          Size/MD5 checksum:   116134 49852e02e411112adb6ad7acdee24c31
          Size/MD5 checksum:   109042 6c117a4f8bb1cb0cf74f3e92baaf20e1
          Size/MD5 checksum:    76740 6cc2f2822a7aa36b18eaaaae453d96a9
      Motorola 680x0 architecture:
          Size/MD5 checksum:   108782 fb3680aa3ea521fb4e77642cc47ac102
          Size/MD5 checksum:   101672 9d6d600f9eecb2cda48c5f632e06bdf1
          Size/MD5 checksum:    71418 79acf1203e75efb88a6216a8ed8d7a5b
      Big endian MIPS architecture:
          Size/MD5 checksum:   118566 c1b9855f7bb152ef9e8086a9631a4759
          Size/MD5 checksum:   111614 b22335a1a584a6e03622f92672d564af
          Size/MD5 checksum:    78014 cd698721ca4b076f4021c38e555301c1
      Little endian MIPS architecture:
          Size/MD5 checksum:   118140 0b08da85c43ad35c296a1554bbea0040
          Size/MD5 checksum:   111074 bf434314d3726fc72f1ba520019ad3e5
          Size/MD5 checksum:    77664 65e41b021840dd87d5cc776076ca5f92
      PowerPC architecture:
          Size/MD5 checksum:   112540 0b83ec51591c3d2fc892cef08c25658d
          Size/MD5 checksum:   105446 e80540790b43f62d39d8e8ecccf06196
          Size/MD5 checksum:    73954 ae82323f9af86e64f809cb07165df9c4
      IBM S/390 architecture:
          Size/MD5 checksum:   116578 45547a0804c240a48f90087d19e79b7a
          Size/MD5 checksum:   109366 8915a41a56e4d96080f937ec4e253381
          Size/MD5 checksum:    76834 55b285d1b7fa0cf81f3869441d576f16
      Sun Sparc architecture:
          Size/MD5 checksum:   113842 3800bc8307455eff6a3b38e820c5409f
          Size/MD5 checksum:   106432 921b89e0c14344507cdf3272bc1e0c96
          Size/MD5 checksum:    74860 312464adc38738ae26352b79c270109d
      These files will probably be moved into the stable distribution on
      its next update.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.

    LinuxSecurity Poll

    'Tis the season of giving! How have you given back to the open-source community?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"171","title":"I've contributed to the development of an open-source project.","votes":"11","type":"x","order":"1","pct":34.38,"resources":[]},{"id":"172","title":"I've reviewed open-source code for security bugs.","votes":"6","type":"x","order":"2","pct":18.75,"resources":[]},{"id":"173","title":"I've made a donation to an open-source project.","votes":"15","type":"x","order":"3","pct":46.88,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.