Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for mldonkey some time ago. CVE-2007-4100[0]: | MLDonkey before 2.9.0 does not load certain code from | $MLDONKEY/web_infos/ before the network modules become active, which | allows remote attackers to bypass the IP blocklist. Unfortunately the vulnerability described above is not important enough to get it fixed via regular security update in Debian stable. It does not warrant a DSA. However it would be nice if this could get fixed via a regular point update[1]. Please contact the release team for this. This is an automatically generated mail, in case you are already working on an upgrade this is of course pointless. You can see the status of this vulnerability on: http://security-tracker.debian.net/tracker/CVE-2007-4100 For further information: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4100 [1] http://www.debian.org/doc/developers-reference/ch-pkgs.en.html#s-upload-stable Kind regards Nico -- Nico Golde - http://www.ngolde.de - nion@jabber.ccc.de - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted.
Attachment:
pgpbEZPPjEnwA.pgp
Description: PGP signature