Linux Security
Linux Security
Linux Security

Debian: New dhcp packages fix denial of service

Date 04 Aug 2006
Posted By LinuxSecurity Advisories
Updated package.
- --------------------------------------------------------------------------
Debian Security Advisory DSA 1143-1                    This email address is being protected from spambots. You need JavaScript enabled to view it.                             Martin Schulze
August 4th, 2006              
- --------------------------------------------------------------------------

Package        : dhcp
Vulnerability  : programming error
Problem type   : remote
Debian-specific: no
CVE ID         : CVE-2006-3122
Debian Bug     : 380273

Justin Winschief and Andrew Steets discovered a bug in dhcp, the DHCP
server for automatic IP address assignment, which causes the server to
unexpectedly exit.

For the stable distribution (sarge) this problem has been fixed in
version 2.0pl5-19.1sarge2.

For the unstable distribution (sid) this problem will be fixed soon.

We recommend that you upgrade your dhcp package.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given at the end of this advisory:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:
      Size/MD5 checksum:      687 f73fef2e9996c07f813e8b44cf058fed
      Size/MD5 checksum:    86660 931619c25909dde0f8278502d089a509
      Size/MD5 checksum:   294909 ab22f363a7aff924e2cc9d1019a21498

  Alpha architecture:
      Size/MD5 checksum:   123178 1d36fdc0bdee24e63ddd68290de55d42
      Size/MD5 checksum:   115486 bf17b3f6d1d23a4f24f63dc8dee47c4f
      Size/MD5 checksum:    80526 c23b5a983212426881e79e42abb08103

  AMD64 architecture:
      Size/MD5 checksum:   116010 53d3be3b942892ff1a0cc641152a7c0b
      Size/MD5 checksum:   108676 99eaef8f0c56b81b28e09bf2040dbfe5
      Size/MD5 checksum:    75952 170a4701d80b295679e605cfc56fb955

  ARM architecture:
      Size/MD5 checksum:   114428 e220cadbd5250f55e7a88a8df95ea487
      Size/MD5 checksum:   107212 3a73115a056708b9a6190cbda179ce18
      Size/MD5 checksum:    74422 fdfdb05b69c11736c16a6aea1d8c0aa4

  Intel IA-32 architecture:
      Size/MD5 checksum:   109440 ca711b93042d11f8b5c853c3f648242a
      Size/MD5 checksum:   102220 558d78e22d1f4f909b718c46baa09cc4
      Size/MD5 checksum:    71330 6d5c42ff7f481df025b687b3969a6c25

  Intel IA-64 architecture:
      Size/MD5 checksum:   144842 fe2d7f0eb45fba721e616f25dcdf29bb
      Size/MD5 checksum:   136910 2ab43f384602792ae905ed00ee0b3465
      Size/MD5 checksum:    92922 c87307ed1d553b3309c9d8f5b9a71783

  HP Precision architecture:
      Size/MD5 checksum:   116134 49852e02e411112adb6ad7acdee24c31
      Size/MD5 checksum:   109042 6c117a4f8bb1cb0cf74f3e92baaf20e1
      Size/MD5 checksum:    76740 6cc2f2822a7aa36b18eaaaae453d96a9

  Motorola 680x0 architecture:
      Size/MD5 checksum:   108782 fb3680aa3ea521fb4e77642cc47ac102
      Size/MD5 checksum:   101672 9d6d600f9eecb2cda48c5f632e06bdf1
      Size/MD5 checksum:    71418 79acf1203e75efb88a6216a8ed8d7a5b

  Big endian MIPS architecture:
      Size/MD5 checksum:   118566 c1b9855f7bb152ef9e8086a9631a4759
      Size/MD5 checksum:   111614 b22335a1a584a6e03622f92672d564af
      Size/MD5 checksum:    78014 cd698721ca4b076f4021c38e555301c1

  Little endian MIPS architecture:
      Size/MD5 checksum:   118140 0b08da85c43ad35c296a1554bbea0040
      Size/MD5 checksum:   111074 bf434314d3726fc72f1ba520019ad3e5
      Size/MD5 checksum:    77664 65e41b021840dd87d5cc776076ca5f92

  PowerPC architecture:
      Size/MD5 checksum:   112540 0b83ec51591c3d2fc892cef08c25658d
      Size/MD5 checksum:   105446 e80540790b43f62d39d8e8ecccf06196
      Size/MD5 checksum:    73954 ae82323f9af86e64f809cb07165df9c4

  IBM S/390 architecture:
      Size/MD5 checksum:   116578 45547a0804c240a48f90087d19e79b7a
      Size/MD5 checksum:   109366 8915a41a56e4d96080f937ec4e253381
      Size/MD5 checksum:    76834 55b285d1b7fa0cf81f3869441d576f16

  Sun Sparc architecture:
      Size/MD5 checksum:   113842 3800bc8307455eff6a3b38e820c5409f
      Size/MD5 checksum:   106432 921b89e0c14344507cdf3272bc1e0c96
      Size/MD5 checksum:    74860 312464adc38738ae26352b79c270109d

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.


LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"50","type":"x","order":"1","pct":80.65,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"7","type":"x","order":"2","pct":11.29,"resources":[]},{"id":"181","title":"Hardly ever","votes":"5","type":"x","order":"3","pct":8.06,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.



bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.