<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="ad22e43341380c18433746bd25b02346"!-->
<update status="stable" from="maint-coord@suse.de" type="security" version="1067">
  <id>dbg111-dhcp</id>
  <title>dhcp-client: Fixed a stack overflow</title>
  <release>openSUSE 11.1</release>
  <issued date="1246031852"/>
  <references>
    <reference href="https://bugzilla.novell.com/show_bug.cgi?id=515599" id="515599" title="bug number 515599" type="bugzilla"/>
  </references>
  <description>The DHCP client (dhclient) could be crashed by a malicious
DHCP server sending a overlong subnet field. (CVE-2009-0692)

In some circumstances code execution might be possible, but
might is likely caught by the buffer overflow checking of
the FORTIFY_SOURCE extension.
</description>
  <pkglist>
    <collection>
        <package name="dhcp-debuginfo" arch="i586" version="3.1.1" release="6.5.1">
          <filename>dhcp-debuginfo-3.1.1-6.5.1.i586.rpm</filename>
        </package>
        <package name="dhcp-debuginfo" arch="ppc" version="3.1.1" release="6.5.1">
          <filename>dhcp-debuginfo-3.1.1-6.5.1.ppc.rpm</filename>
        </package>
        <package name="dhcp-debuginfo" arch="x86_64" version="3.1.1" release="6.5.1">
          <filename>dhcp-debuginfo-3.1.1-6.5.1.x86_64.rpm</filename>
        </package>
        <package name="dhcp-debugsource" arch="i586" version="3.1.1" release="6.5.1">
          <filename>dhcp-debugsource-3.1.1-6.5.1.i586.rpm</filename>
        </package>
        <package name="dhcp-debugsource" arch="ppc" version="3.1.1" release="6.5.1">
          <filename>dhcp-debugsource-3.1.1-6.5.1.ppc.rpm</filename>
        </package>
        <package name="dhcp-debugsource" arch="x86_64" version="3.1.1" release="6.5.1">
          <filename>dhcp-debugsource-3.1.1-6.5.1.x86_64.rpm</filename>
        </package>
    </collection>
  </pkglist>
</update>
