Mandrake 7: dump vulnerability
Posted by LinuxSecurity.com Team   
Mandrake Dump may cause security problem due to a buffer overflow.
-------------------------------------

   Linux-Mandrake Security Update

-------------------------------------

Package: dump

Affected versions: 7.0

Problem: Dump may cause security problem due to a buffer overflow.
This package removes the set gid root on the dump exec file. 

Please upgrade to:

 7.0/RPMS/dump-0.4b16-3mdk.i586.rpm
 md5sum: 695c8249fd5f53caa8c0d85e25e03b50  

 7.0/SRPMS/dump-0.4b16-3mdk.src.rpm
 md5sum: d81a1894d511ce4f7a86d9e4a104b259  

To upgrade automatically, use « MandrakeUpdate ». If want to upgrade
manually, download the updated package from one of our FTP server
mirrors and uprade with "rpm -Uvh package_name". All mirrors are
listed on http://www.mandrake.com/en/ftp.php3 Updated packages are
available in the "updates/" directory.

For example, if you are looking for an updated RPM package for
Mandrake 7.0, look for it in: updates/7.0/RPMS/

Note: we give the md5 sum for each package. It lets you check the
integrity of the downloaded package by running the md5sum command on
the package ("md5sum package.rpm").