Debian: New openldap2.3 packags fix denial of service
Summary
- ------------------------------------------------------------------------Debian Security Advisory DSA-1650-1 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff October 12, 2008 http://www.debian.org/security/faq - ------------------------------------------------------------------------Package : openldap2.3 Vulnerability : denial of service Problem type : remote Debian-specific: no CVE Id(s) : CVE-2008-2952 Debian Bug : 488710 Cameron Hotchkies discovered that the OpenLDAP server slapd, a free implementation of the Lightweight Directory Access Protocol, could be crashed by sending malformed ASN1 requests. For the stable distribution (etch), this problem has been fixed in version 2.3.30-5+etch2. For the unstable distribution (sid), this problem has been fixed in version 2.4.10-3 of the openldap package. We recommend that you upgrade your openldap2.3 packages. Upgrade instructions - --------------------wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 4.0 alias etch - -------------------------------Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. Source archives: Size/MD5 checksum: 2971126 c40bcc23fa65908b8d7a86a4a6061251 Size/MD5 checksum: 311809 22b5eafd6a8e6375ffe3fec5533a1d5d Size/MD5 checksum: 1205 d266aa1b763c9f0d91f7b062bfb65c86 alpha architecture (DEC Alpha) Size/MD5 checksum: 1280050 180958ccc394210e2b04ac1c532118cd Size/MD5 checksum: 292722 cb1433274dce06173ea7e97051863c2b Size/MD5 checksum: 193424 61f779bea372ee467a4691e219547c21 amd64 architecture (AMD x86_64 (AMD64)) Size/MD5 checksum: 1244538 37c9d1aba2a53ff6562678a25b6147ef Size/MD5 checksum: 285314 a81dd9a9a2d661d95897ca71d5a68527 Size/MD5 checksum: 184558 e22fd11d64bad96ad7a5c6a76f69c872 arm architecture (ARM) Size/MD5 checksum: 254636 1537a42a4c76d3c40feb4e35adf10abc Size/MD5 checksum: 141986 fbda3408d6b35a34cd43875ee39c038a Size/MD5 checksum: 1188920 b556015d8462a5eff9e5c00cf65658ff hppa architecture (HP PA RISC) Size/MD5 checksum: 292550 a99048fa9bbf6e524a9854c7874481b3 Size/MD5 checksum: 1304974 8a352883c7359d68ac65bef523c8c37d Size/MD5 checksum: 176956 dc8668a17000f0b6c6993dca2aed517a i386 architecture (Intel ia32) Size/MD5 checksum: 266054 84bb5bde130cbc49cce8654fbbf145ed Size/MD5 checksum: 154168 a73aa2fe4c60f7c74dfb7586ad7e9274 Size/MD5 checksum: 1174324 e23a1aa2d33eccb2af662fbe4e5b9f6d ia64 architecture (Intel ia64) Size/MD5 checksum: 1660820 2cd17aac1591b7f6dbc8ad9806ad7821 Size/MD5 checksum: 379572 112ff502ca043d71907f05ad316aaa0b Size/MD5 checksum: 239140 db04191db37a5bf2dec66f115803ed70 mips architecture (MIPS (Big Endian)) Size/MD5 checksum: 1205670 2eae08b5aa3717fa050f24831870a835 Size/MD5 checksum: 185522 9cb2d778a25d6c904bd84abbbc89fddd Size/MD5 checksum: 258028 4cd6d9a297dc6447e4f8ffb91d1ddddc mipsel architecture (MIPS (Little Endian)) Size/MD5 checksum: 1188250 7fa6e8454be9cc2b5619fd05c088e666 Size/MD5 checksum: 258632 369f2d0a5adc823edf8c8dcc7de8a34a Size/MD5 checksum: 186796 9c611e11a90f62302cab63f0561d0d1d powerpc architecture (PowerPC) Size/MD5 checksum: 1243660 2a68e3d27c0238061fdf2aa841befa23 Size/MD5 checksum: 188790 d274c287d39d1a75bb4b6474ac1c6f34 Size/MD5 checksum: 272242 896e4fe8de21568e3251f8060c58b145 s390 architecture (IBM S/390) Size/MD5 checksum: 168388 66e6090f492708f524b83e990857cf83 Size/MD5 checksum: 1240878 8b841b579a2ed5f7c990e5ffbcf76847 Size/MD5 checksum: 291518 c49e29b487788b2d5a2025cedacf5ee6 sparc architecture (Sun SPARC/UltraSPARC) Size/MD5 checksum: 155004 ec1fc16d622ec4b1ecf2e2ca8b12d398 Size/MD5 checksum: 256832 0fd6fcf2e1a0a54917c21009df1172f7 Size/MD5 checksum: 1167556 0e95399858cd08f38c143e57c25c3db0 These files will probably be moved into the stable distribution on its next update. - ---------------------------------------------------------------------------------For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org