ez-ipupdate: Format string vulnerability — GLSA 200411-20 ez-ipupdate contains a format string vulnerability that could lead to execution of arbitrary code. Affected packages Package net-dns/ez-ipupdate on all architectures Affected versions <= 3.0.11_beta8 Unaffected versions >= 3.0.11_beta8-r1 Background ez-ipupdate is a utility for updating host name information for a large number of dynamic DNS services. Description Ulf Harnhammar from the Debian Security Audit Project discovered a format string vulnerability in ez-ipupdate. Impact An attacker could exploit this to execute arbitrary code with the permissions of the user running ez-ipupdate, which could be the root user. Workaround There is no known workaround at this time. Resolution All ez-ipupdate users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-dns/ez-ipupdate-3.0.11_beta8-r1" References CAN-2004-0980 Full Disclosure Announcement