Updated ez-ipupdate packages are available for Mandrakelinux
_______________________________________________________________________
Mandrakelinux Security Update Advisory
_______________________________________________________________________
Package name: ez-ipupdate
Advisory ID: MDKSA-2004:129
Date: November 10th, 2004
Affected versions: 10.0, 10.1, 9.2, Corporate Server 2.1,
Multi Network Firewall 8.2
______________________________________________________________________
Problem Description:
Ulf Harnhammar discovered a format string vulnerability in ez-ipupdate, a client for many dynamic DNS services. The updated packages are patched to protect against this problem.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0980
______________________________________________________________________
Updated Packages:
Mandrakelinux 10.0:
43001a1c203324016ee52e13f332bcec 10.0/RPMS/ez-ipupdate-3.0.11b8-2.1.100mdk.i586.rpm
a2fd96d510732b4c134b515f8ef13065 10.0/SRPMS/ez-ipupdate-3.0.11b8-2.1.100mdk.src.rpm
Mandrakelinux 10.0/AMD64:
d2e655466f2dbb7a08f340c01c19d283 amd64/10.0/RPMS/ez-ipupdate-3.0.11b8-2.1.100mdk.amd64.rpm
a2fd96d510732b4c134b515f8ef13065 amd64/10.0/SRPMS/ez-ipupdate-3.0.11b8-2.1.100mdk.src.rpm
Mandrakelinux 10.1:
3689b9d6ce9f69fd0d92c3f19c82839b 10.1/RPMS/ez-ipupdate-3.0.11b8-2.1.101mdk.i586.rpm
74e0aecfeb792fa0aedd92e5ea54b46e 10.1/SRPMS/ez-ipupdate-3.0.11b8-2.1.101mdk.src.rpm
Mandrakelinux 10.1/X86_64:
fb36525ea5a63c86c0ed20458c3ee6ca x86_64/10.1/RPMS/ez-ipupdate-3.0.11b8-2.1.101mdk.x86_64.rpm
74e0aecfeb792fa0aedd92e5ea54b46e x86_64/10.1/SRPMS/ez-ipupdate-3.0.11b8-2.1.101mdk.src.rpm
Corporate Server 2.1:
8bcc14b5c24ffe8705380503b6dc2ded corporate/2.1/RPMS/ez-ipupdate-3.0.11b8-2.1.C21mdk.i586.rpm
9cea70e8fca7226629207d09f03caab5 corporate/2.1/SRPMS/ez-ipupdate-3.0.11b8-2.1.C21mdk.src.rpm
Corporate Server 2.1/x86_64:
27986ecabaafeda17427e12d3e50a4e7 x86_64/corporate/2.1/RPMS/ez-ipupdate-3.0.11b8-2.1.C21mdk.x86_64.rpm
9cea70e8fca7226629207d09f03caab5 x86_64/corporate/2.1/SRPMS/ez-ipupdate-3.0.11b8-2.1.C21mdk.src.rpm
Mandrakelinux 9.2:
ebb38de499a565b98d62d62dab339851 9.2/RPMS/ez-ipupdate-3.0.11b8-2.1.92mdk.i586.rpm
e6277d246fe8548b28c37806fbcb5ef5 9.2/SRPMS/ez-ipupdate-3.0.11b8-2.1.92mdk.src.rpm
Mandrakelinux 9.2/AMD64:
ab50da51205a86e37c76416d7eb69b20 amd64/9.2/RPMS/ez-ipupdate-3.0.11b8-2.1.92mdk.amd64.rpm
e6277d246fe8548b28c37806fbcb5ef5 amd64/9.2/SRPMS/ez-ipupdate-3.0.11b8-2.1.92mdk.src.rpm
Multi Network Firewall 8.2:
336e399432b254638fac691918e7e6f9 mnf8.2/RPMS/ez-ipupdate-3.0.11b8-2.1.M82mdk.i586.rpm
08de2bcdf128aa141b98b59faa412df9 mnf8.2/SRPMS/ez-ipupdate-3.0.11b8-2.1.M82mdk.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandrakesoft for security. You can obtain the GPG public key of the Mandrakelinux Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandrakelinux at:
http://www.mandrakesoft.com/security/advisories
If you want to report vulnerabilities, please contact
security_linux-mandrake.com
_______________________________________________________________________
Mandrakelinux Security Update Advisory
_______________________________________________________________________
Package name: ez-ipupdate
Advisory ID: MDKSA-2004:129
Date: November 10th, 2004
Affected versions: 10.0, 10.1, 9.2, Corporate Server 2.1,
Multi Network Firewall 8.2
______________________________________________________________________
Problem Description:
Ulf Harnhammar discovered a format string vulnerability in ez-ipupdate, a client for many dynamic DNS services. The updated packages are patched to protect against this problem.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0980
______________________________________________________________________
Updated Packages:
Mandrakelinux 10.0:
43001a1c203324016ee52e13f332bcec 10.0/RPMS/ez-ipupdate-3.0.11b8-2.1.100mdk.i586.rpm
a2fd96d510732b4c134b515f8ef13065 10.0/SRPMS/ez-ipupdate-3.0.11b8-2.1.100mdk.src.rpm
Mandrakelinux 10.0/AMD64:
d2e655466f2dbb7a08f340c01c19d283 amd64/10.0/RPMS/ez-ipupdate-3.0.11b8-2.1.100mdk.amd64.rpm
a2fd96d510732b4c134b515f8ef13065 amd64/10.0/SRPMS/ez-ipupdate-3.0.11b8-2.1.100mdk.src.rpm
Mandrakelinux 10.1:
3689b9d6ce9f69fd0d92c3f19c82839b 10.1/RPMS/ez-ipupdate-3.0.11b8-2.1.101mdk.i586.rpm
74e0aecfeb792fa0aedd92e5ea54b46e 10.1/SRPMS/ez-ipupdate-3.0.11b8-2.1.101mdk.src.rpm
Mandrakelinux 10.1/X86_64:
fb36525ea5a63c86c0ed20458c3ee6ca x86_64/10.1/RPMS/ez-ipupdate-3.0.11b8-2.1.101mdk.x86_64.rpm
74e0aecfeb792fa0aedd92e5ea54b46e x86_64/10.1/SRPMS/ez-ipupdate-3.0.11b8-2.1.101mdk.src.rpm
Corporate Server 2.1:
8bcc14b5c24ffe8705380503b6dc2ded corporate/2.1/RPMS/ez-ipupdate-3.0.11b8-2.1.C21mdk.i586.rpm
9cea70e8fca7226629207d09f03caab5 corporate/2.1/SRPMS/ez-ipupdate-3.0.11b8-2.1.C21mdk.src.rpm
Corporate Server 2.1/x86_64:
27986ecabaafeda17427e12d3e50a4e7 x86_64/corporate/2.1/RPMS/ez-ipupdate-3.0.11b8-2.1.C21mdk.x86_64.rpm
9cea70e8fca7226629207d09f03caab5 x86_64/corporate/2.1/SRPMS/ez-ipupdate-3.0.11b8-2.1.C21mdk.src.rpm
Mandrakelinux 9.2:
ebb38de499a565b98d62d62dab339851 9.2/RPMS/ez-ipupdate-3.0.11b8-2.1.92mdk.i586.rpm
e6277d246fe8548b28c37806fbcb5ef5 9.2/SRPMS/ez-ipupdate-3.0.11b8-2.1.92mdk.src.rpm
Mandrakelinux 9.2/AMD64:
ab50da51205a86e37c76416d7eb69b20 amd64/9.2/RPMS/ez-ipupdate-3.0.11b8-2.1.92mdk.amd64.rpm
e6277d246fe8548b28c37806fbcb5ef5 amd64/9.2/SRPMS/ez-ipupdate-3.0.11b8-2.1.92mdk.src.rpm
Multi Network Firewall 8.2:
336e399432b254638fac691918e7e6f9 mnf8.2/RPMS/ez-ipupdate-3.0.11b8-2.1.M82mdk.i586.rpm
08de2bcdf128aa141b98b59faa412df9 mnf8.2/SRPMS/ez-ipupdate-3.0.11b8-2.1.M82mdk.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandrakesoft for security. You can obtain the GPG public key of the Mandrakelinux Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandrakelinux at:
http://www.mandrakesoft.com/security/advisories
If you want to report vulnerabilities, please contact
security_linux-mandrake.com