martin f krafft
2008-Nov-26 08:50 UTC
[Secure-testing-team] Bug#506942: Buffer overflow exploit in versions until 2.1.8
Package: no-ip Version: 2.1.1-4 Severity: critical Tags: security, fixed-upstream I just received the attached message from No-IP.com. This affects stable and testing. -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, ''unstable''), (500, ''testing''), (1, ''experimental'') Architecture: amd64 (x86_64) Kernel: Linux 2.6.26-1-amd64 (SMP w/1 CPU core) Locale: LANG=en_GB, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash -- .''''`. martin f. krafft <madduck at debian.org> : :'' : proud Debian developer, author, administrator, and user `. `''` http://people.debian.org/~madduck - http://debiansystem.info `- Debian - when you have better things to do than fixing systems -------------- next part -------------- An embedded message was scrubbed... From: "No-IP Security Alert" <noreply-3189082 at no-ip.com> Subject: Important No-IP Linux Update Client Security Update Date: Mon, 24 Nov 2008 17:05:35 -0800 (PST) Size: 4650 Url: http://lists.alioth.debian.org/pipermail/secure-testing-team/attachments/20081126/26f7dd93/attachment.eml -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 197 bytes Desc: Digital signature (see http://martin-krafft.net/gpg/) Url : http://lists.alioth.debian.org/pipermail/secure-testing-team/attachments/20081126/26f7dd93/attachment.pgp