exploit the possibilities

Slackware Security Advisory - dhcp Updates

Slackware Security Advisory - dhcp Updates
Posted Mar 1, 2018
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New dhcp packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, 14.2, and -current to fix security issues.

tags | advisory
systems | linux, slackware
advisories | CVE-2018-5732, CVE-2018-5733
MD5 | 1ac718cf67f39c9e7d505db208a9a244

Slackware Security Advisory - dhcp Updates

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] dhcp (SSA:2018-060-01)

New dhcp packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1,
14.2, and -current to fix security issues.


Here are the details from the Slackware 14.2 ChangeLog:
+--------------------------+
patches/packages/dhcp-4.4.1-i586-1_slack14.2.txz: Upgraded.
This update fixes two security issues:
Corrected an issue where large sized 'X/x' format options were causing
option handling logic to overwrite memory when expanding them to human
readable form. Reported by Felix Wilhelm, Google Security Team.
Option reference count was not correctly decremented in error path
when parsing buffer for options. Reported by Felix Wilhelm, Google
Security Team.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5732
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5733
(* Security fix *)
+--------------------------+


Where to find the new packages:
+-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)

Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.

Updated package for Slackware 13.0:
ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/dhcp-4.4.1-i486-1_slack13.0.txz

Updated package for Slackware x86_64 13.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/dhcp-4.4.1-x86_64-1_slack13.0.txz

Updated package for Slackware 13.1:
ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/dhcp-4.4.1-i486-1_slack13.1.txz

Updated package for Slackware x86_64 13.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/dhcp-4.4.1-x86_64-1_slack13.1.txz

Updated package for Slackware 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/dhcp-4.4.1-i486-1_slack13.37.txz

Updated package for Slackware x86_64 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/dhcp-4.4.1-x86_64-1_slack13.37.txz

Updated package for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/dhcp-4.4.1-i486-1_slack14.0.txz

Updated package for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/dhcp-4.4.1-x86_64-1_slack14.0.txz

Updated package for Slackware 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/dhcp-4.4.1-i486-1_slack14.1.txz

Updated package for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/dhcp-4.4.1-x86_64-1_slack14.1.txz

Updated package for Slackware 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/dhcp-4.4.1-i586-1_slack14.2.txz

Updated package for Slackware x86_64 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/dhcp-4.4.1-x86_64-1_slack14.2.txz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/dhcp-4.4.1-i586-1.txz

Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/dhcp-4.4.1-x86_64-1.txz


MD5 signatures:
+-------------+

Slackware 13.0 package:
6e00b8d233b21719c1fb330995c1fd94 dhcp-4.4.1-i486-1_slack13.0.txz

Slackware x86_64 13.0 package:
f2d34f8be57b139ccf46319a65ff806b dhcp-4.4.1-x86_64-1_slack13.0.txz

Slackware 13.1 package:
5bdc4d595fb12cd584835ac1b8537dad dhcp-4.4.1-i486-1_slack13.1.txz

Slackware x86_64 13.1 package:
d0e7b0d98d30e59835092293f1e075dd dhcp-4.4.1-x86_64-1_slack13.1.txz

Slackware 13.37 package:
7f12cf77a7f26502cb4a5f704c5b1e91 dhcp-4.4.1-i486-1_slack13.37.txz

Slackware x86_64 13.37 package:
f7097b4f1e20945267a98f568315e43b dhcp-4.4.1-x86_64-1_slack13.37.txz

Slackware 14.0 package:
bff19b2bea0f79ab3589efa4404d14ea dhcp-4.4.1-i486-1_slack14.0.txz

Slackware x86_64 14.0 package:
35a493141caf99414370246cfa176c61 dhcp-4.4.1-x86_64-1_slack14.0.txz

Slackware 14.1 package:
bd0b8b57803625530ec5f9b44d5a223e dhcp-4.4.1-i486-1_slack14.1.txz

Slackware x86_64 14.1 package:
37551b04c1ce51aa9de3fd0d7e287e0b dhcp-4.4.1-x86_64-1_slack14.1.txz

Slackware 14.2 package:
39c1ede4f5d7dce9f49a708e452eb9c1 dhcp-4.4.1-i586-1_slack14.2.txz

Slackware x86_64 14.2 package:
252a04936ee7e70c9b31883ab98e8343 dhcp-4.4.1-x86_64-1_slack14.2.txz

Slackware -current package:
7372ab9666c479916f04c0fed10e764e n/dhcp-4.4.1-i586-1.txz

Slackware x86_64 -current package:
e31242d5910ac08ae1a6519bffbd81f9 n/dhcp-4.4.1-x86_64-1.txz


Installation instructions:
+------------------------+

Upgrade the package as root:
# upgradepkg dhcp-4.4.1-i586-1_slack14.2.txz


+-----+

Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com

+------------------------------------------------------------------------+
| To leave the slackware-security mailing list: |
+------------------------------------------------------------------------+
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message: |
| |
| unsubscribe slackware-security |
| |
| You will get a confirmation message back containing instructions to |
| complete the process. Please do not reply to this email address. |
+------------------------------------------------------------------------+
-----BEGIN PGP SIGNATURE-----

iEYEARECAAYFAlqYjI0ACgkQakRjwEAQIjP6iACeNi7JT5+dE7Y+oJ62vw4ELv8P
PH0AoJFGR0bNhnoMJJuDFRotTk83K6t6
=e/cA
-----END PGP SIGNATURE-----

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

February 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    1 Files
  • 2
    Feb 2nd
    2 Files
  • 3
    Feb 3rd
    17 Files
  • 4
    Feb 4th
    15 Files
  • 5
    Feb 5th
    24 Files
  • 6
    Feb 6th
    16 Files
  • 7
    Feb 7th
    19 Files
  • 8
    Feb 8th
    1 Files
  • 9
    Feb 9th
    2 Files
  • 10
    Feb 10th
    15 Files
  • 11
    Feb 11th
    20 Files
  • 12
    Feb 12th
    12 Files
  • 13
    Feb 13th
    18 Files
  • 14
    Feb 14th
    17 Files
  • 15
    Feb 15th
    4 Files
  • 16
    Feb 16th
    4 Files
  • 17
    Feb 17th
    34 Files
  • 18
    Feb 18th
    15 Files
  • 19
    Feb 19th
    19 Files
  • 20
    Feb 20th
    20 Files
  • 21
    Feb 21st
    15 Files
  • 22
    Feb 22nd
    2 Files
  • 23
    Feb 23rd
    2 Files
  • 24
    Feb 24th
    16 Files
  • 25
    Feb 25th
    37 Files
  • 26
    Feb 26th
    15 Files
  • 27
    Feb 27th
    15 Files
  • 28
    Feb 28th
    4 Files
  • 29
    Feb 29th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close