From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 24899 invoked by uid 1002); 19 Aug 2003 23:18:58 -0000 Mailing-List: contact gentoo-dev-help@gentoo.org; run by ezmlm Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-dev@gentoo.org Received: (qmail 32394 invoked from network); 19 Aug 2003 23:18:58 -0000 From: Rainer Groesslinger To: gentoo-dev@gentoo.org Date: Wed, 20 Aug 2003 01:19:06 +0200 User-Agent: KMail/1.5.3 References: <1061333257.14174.2.camel@localhost> <200308200108.34719.scandium@gentoo.org> In-Reply-To: <200308200108.34719.scandium@gentoo.org> MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-15" Content-Transfer-Encoding: 7bit Content-Disposition: inline Message-Id: <200308200119.06756.scandium@gentoo.org> Subject: Re: [gentoo-dev] Security Problems: xmule, lmule X-Archives-Salt: 8e11ce00-407e-4cf6-8ac1-abb5dc028284 X-Archives-Hash: fd65e07701b5ac74cbbd3eacca14de8a On Wednesday 20 August 2003 01:08, Rainer Groesslinger wrote: > The problem - indeed - is, that even their latest unstable release > (1.5.6a) doesn't fix the problem and I observe xmule sharply and am > waiting for a fixed release or at least a patch. btw. I just figured out that their cvs has all problems fixed now. There seems to be some confusion, though, because of the fact that there are more exploits. Some xmule guy claimed all are fixed in 1.4.3 and some other said one remains in 1.4.3 etc. -- Rainer Groesslinger http://dev.gentoo.org/~scandium/ -- gentoo-dev@gentoo.org mailing list