On Wednesday 20 August 2003 00:47, Patrick Lauer wrote: [snip] > short summary: > all emule, lmule and xmule versions are vulnerable to buffer > overflows including execution of malicious code. > > xmule 1.4.3 (portage current) is very vulnerable. > xmule 1.5.6 (latest from xmule website) does not fix all known > vulnerabilities. > > Please discourage the use of lmule and xmule until fixed versions are > available. [snap] I added xmule-1.6.0 to the tree minutes ago, so just re-sync. It fixes all known security issues (at least according to un-thesis) and I removed all older versions which had security exploits. -- Rainer Groesslinger http://dev.gentoo.org/~scandium/