[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

mldonkey stable update for CVE-2007-4100



Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for mldonkey some time ago.

CVE-2007-4100[0]:
| MLDonkey before 2.9.0 does not load certain code from
| $MLDONKEY/web_infos/ before the network modules become active, which
| allows remote attackers to bypass the IP blocklist.

Unfortunately the vulnerability described above is not important enough
to get it fixed via regular security update in Debian stable. It does
not warrant a DSA.

However it would be nice if this could get fixed via a regular point update[1].
Please contact the release team for this.

This is an automatically generated mail, in case you are already working on an
upgrade this is of course pointless.

You can see the status of this vulnerability on:
http://security-tracker.debian.net/tracker/CVE-2007-4100

For further information:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4100
[1] http://www.debian.org/doc/developers-reference/ch-pkgs.en.html#s-upload-stable

Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - nion@jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgpbEZPPjEnwA.pgp
Description: PGP signature


Reply to: