public inbox for gentoo-dev@lists.gentoo.org
 help / color / mirror / Atom feed
Search results ordered by [date|relevance]  view[summary|nested|Atom feed]
thread overview below | download: 
* Re: [gentoo-dev] Security Problems: xmule, lmule
  @ 2003-08-27 13:43 99% ` Rainer Groesslinger
  0 siblings, 0 replies; 1+ results
From: Rainer Groesslinger @ 2003-08-27 13:43 UTC (permalink / raw
  To: gentoo-dev

[-- Attachment #1: signed data --]
[-- Type: text/plain, Size: 700 bytes --]

On Wednesday 20 August 2003 00:47, Patrick Lauer wrote:
[snip]
> short summary:
> all emule, lmule and xmule versions are vulnerable to buffer
> overflows including execution of malicious code.
>
> xmule 1.4.3 (portage current) is very vulnerable.
> xmule 1.5.6 (latest from xmule website) does not fix all known
> vulnerabilities.
>
> Please discourage the use of lmule and xmule until fixed versions are
> available.
[snap]

I added xmule-1.6.0 to the tree minutes ago, so just re-sync.
It fixes all known security issues (at least according to un-thesis) and 
I removed all older versions which had security exploits.

-- 
Rainer Groesslinger
http://dev.gentoo.org/~scandium/

[-- Attachment #2: signature --]
[-- Type: application/pgp-signature, Size: 189 bytes --]

^ permalink raw reply	[relevance 99%]

Results 1-1 of 1 | reverse | options above
-- pct% links below jump to the message on this page, permalinks otherwise --
2003-08-19 22:47     [gentoo-dev] Security Problems: xmule, lmule Patrick Lauer
2003-08-27 13:43 99% ` Rainer Groesslinger

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox