TITLE:
Debian update for bluez-hcidump

SECUNIA ADVISORY ID:
SA19122

VERIFY ADVISORY:
http://secunia.com/advisories/19122/

CRITICAL:
Not critical

IMPACT:
DoS

WHERE:
>From remote

OPERATING SYSTEM:
Debian GNU/Linux 3.1
http://secunia.com/product/5307/
Debian GNU/Linux unstable alias sid
http://secunia.com/product/530/

DESCRIPTION:
Debian has issued an update for bluez-hcidump. This fixes a
vulnerability, which can be exploited by malicious people to cause a
DoS (Denial of Service).

For more information:
SA18741

SOLUTION:
Apply updated packages.

-- Debian GNU/Linux 3.1 alias sarge --

Source archives:

http://security.debian.org/pool/updates/main/b/bluez-hcidump/bluez-hcidump_1.17-1sarge1.dsc
Size/MD5 checksum: 658 a9dc728db66dd5cd9673061f92a6950d
http://security.debian.org/pool/updates/main/b/bluez-hcidump/bluez-hcidump_1.17-1sarge1.diff.gz
Size/MD5 checksum: 2264 4664fa6a395fc50dd23a4708f6e54395
http://security.debian.org/pool/updates/main/b/bluez-hcidump/bluez-hcidump_1.17.orig.tar.gz
Size/MD5 checksum: 112038 4a3f4606dd42d50ef878b4d5a8cce277

Alpha architecture:

http://security.debian.org/pool/updates/main/b/bluez-hcidump/bluez-hcidump_1.17-1sarge1_alpha.deb
Size/MD5 checksum: 53258 774870d51092d1400868ae99e251c42d

AMD64 architecture:

http://security.debian.org/pool/updates/main/b/bluez-hcidump/bluez-hcidump_1.17-1sarge1_amd64.deb
Size/MD5 checksum: 49748 797b61bc83145c52f9ca2989ec3bdd78

ARM architecture:

http://security.debian.org/pool/updates/main/b/bluez-hcidump/bluez-hcidump_1.17-1sarge1_arm.deb
Size/MD5 checksum: 47784 c22b739eb26aa8b8b3f1b342db12333c

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/b/bluez-hcidump/bluez-hcidump_1.17-1sarge1_i386.deb
Size/MD5 checksum: 45098 a8ee94a33fdbc19b456dc8f739b95e82

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/b/bluez-hcidump/bluez-hcidump_1.17-1sarge1_ia64.deb
Size/MD5 checksum: 66346 48ffaa40eddc7d02fffad20c3c7573c6

HP Precision architecture:

http://security.debian.org/pool/updates/main/b/bluez-hcidump/bluez-hcidump_1.17-1sarge1_hppa.deb
Size/MD5 checksum: 52416 3c812ebeb012f698fafc629374afdebc

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/b/bluez-hcidump/bluez-hcidump_1.17-1sarge1_m68k.deb
Size/MD5 checksum: 40034 a334bbd3fe3046625f9a074e7d87c853

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/b/bluez-hcidump/bluez-hcidump_1.17-1sarge1_mips.deb
Size/MD5 checksum: 47536 fc8fea7eae6823a9e1dd6dcc28d1e310

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/b/bluez-hcidump/bluez-hcidump_1.17-1sarge1_mipsel.deb
Size/MD5 checksum: 48020 ee6370aea43bf90324eb61bd01301719

PowerPC architecture:

http://security.debian.org/pool/updates/main/b/bluez-hcidump/bluez-hcidump_1.17-1sarge1_powerpc.deb
Size/MD5 checksum: 49080 2f47e6fd33df2d810d2c87b937e29b7c

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/b/bluez-hcidump/bluez-hcidump_1.17-1sarge1_s390.deb
Size/MD5 checksum: 47820 fed2b0bb3fd2c9b7e94c633e20a64608

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/b/bluez-hcidump/bluez-hcidump_1.17-1sarge1_sparc.deb
Size/MD5 checksum: 48072 60d1888889f8792144d224a7251c9290

-- Debian GNU/Linux unstable alias sid --

Fixed in version 1.30-1.

ORIGINAL ADVISORY:
http://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00068.html

OTHER REFERENCES:
SA18741:
http://secunia.com/advisories/18741/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

----------------------------------------------------------------------