[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] New versions of netstd fixes buffer overflows

We have received reports that the netstd suffered from two buffer
overflows. The first problem is an exploitable buffer overflow in the
bootp server. The second problem is an overflow in the FTP client. Both
problems are fixed in a new netstd package, version 3.07-2hamm.4 .

We recommend you upgrade your netstd package immediately.

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

Debian GNU/Linux 2.0 alias hamm

  This version of Debian was released only for the Intel and the
  Motorola 680x0 architecture.

  Source archives:
	  MD5 checksum: 6f594f125f6eaa168e00c3b2234c34cc
      MD5 checksum: 157a50142e263a6add4f128e8c40cb74
      MD5 checksum: eb6548e15741214ab1d16f55a0b2b53b

  Intel architecture:
      MD5 checksum: 09e42bdecf569362df94be850605645b

  Motorola 680x0 architecture:
      MD5 checksum: a66b5da8f54d382eaaa53586b498c302

  These files will be moved into
  ftp://ftp.debian.org/debian/dists/hamm/*/binary-$arch/ soon.

For not yet released architectures please refer to the appropriate
directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .

Debian GNU/Linux      .   Security Managers      .   security@debian.org
  Christian Hudon     .     Wichert Akkerman     .     Martin Schulze
<chrish@debian.org>   .   <wakkerma@debian.org>  .   <joey@debian.org>

Attachment: pgpZIyvr8FUWI.pgp
Description: PGP signature

Reply to: