Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 20 Mar 2003 15:53:09 +0200
From:      Alexandr Kovalenko <never@nevermind.kiev.ua>
To:        freebsd-security@freebsd.org, freebsd-ports@freebsd.org
Subject:   Fwd: mutt-1.4.1 fixes a buffer overflow.
Message-ID:  <20030320135309.GA84224@nevermind.kiev.ua>

next in thread | raw e-mail | index | archive | help
----- Forwarded message from Thomas Roessler <roessler@does-not-exist.org> -----

Date: Thu, 20 Mar 2003 00:15:46 +0100
From: Thomas Roessler <roessler@does-not-exist.org>
To: BUGTRAQ@securityfocus.com
Subject: mutt-1.4.1 fixes a buffer overflow.

Mutt versions 1.4.1 and 1.5.4 have just been released and will soon
be available from ftp://ftp.mutt.org/mutt/.

Both versions fix a buffer overflow in mutt's IMAP client code which
was identified by Core Security Technologies, and fixed by Edmund
Grimley Evans.  A more detailed advisory will be published by Core
Security.

Version 1.4.1 is a release on mutt's stable branch.  The only
differences against 1.4 are a number of bug fixes.  If you are
currently using mutt 1.4, it's probably a very good idea to update.

Version 1.5.4 is a snapshot of mutt's unstable branch, and may be
interesting to those brave souls who would like to play with the
latest features.  (Or want to help us to identify some bugs in that
code.)


-- 
Thomas Roessler                        <roessler@does-not-exist.org>



----- End forwarded message -----

-- 
NEVE-RIPE, will build world for food
Ukrainian FreeBSD User Group
http://uafug.org.ua/

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030320135309.GA84224>