From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 10619 invoked by uid 1002); 17 Jan 2003 10:51:11 -0000 Mailing-List: contact gentoo-announce-help@gentoo.org; run by ezmlm Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-announce@gentoo.org Received: (qmail 11951 invoked from network); 17 Jan 2003 10:50:12 -0000 From: Daniel Ahlberg Date: Fri, 17 Jan 2003 11:45:55 +0100 To: gentoo-announce@gentoo.org Subject: GLSA: dhcp Message-Id: <20030117104554.B525333B4D@mail1.tamperd.net> X-Archives-Salt: cdec2199-9910-426d-a0ee-ac824a59ea19 X-Archives-Hash: f927ba7e9f567664f70688efcddecf59 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - -------------------------------------------------------------------- GENTOO LINUX SECURITY ANNOUNCEMENT 200301-10 - - -------------------------------------------------------------------- PACKAGE : dhcp SUMMARY : buffer overflow DATE    : 2003-01-17 10:01 UTC EXPLOIT : remote - - -------------------------------------------------------------------- - From advisory : "The Internet Software Consortium (ISC) has discovered several buffer overflow vulnerabilities in their implementation of DHCP (ISC DHCPD). These vulnerabilities may allow remote attackers to execute arbitrary code on affected systems.  At this time, we are not aware of any exploits." Read the full advisory at http://www.cert.org/advisories/CA-2003-01.html SOLUTION It is recommended that all Gentoo Linux users who are running net-misc/dhcp upgrade to dhcp-3.0_p2 as follows: emerge sync emerge -u dhcp emerge clean - - -------------------------------------------------------------------- aliz@gentoo.org - GnuPG key is available at www.gentoo.org/~aliz lostlogic@gentoo.org - - -------------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQE+J97gfT7nyhUpoZMRAvWAAKCmwJ9SZ9BHqLlVSnpU6uuJdIGR+ACfXpTw ZFnl0fBTQKE3c0ymwNUdQT8= =Ukux -----END PGP SIGNATURE-----