From owner-freebsd-ports Wed Jan 2 17: 0:41 2002 Delivered-To: freebsd-ports@hub.freebsd.org Received: from freefall.freebsd.org (freefall.FreeBSD.org [216.136.204.21]) by hub.freebsd.org (Postfix) with ESMTP id 120E237B42F; Wed, 2 Jan 2002 17:00:29 -0800 (PST) Received: (from jim@localhost) by freefall.freebsd.org (8.11.6/8.11.6) id g030xaF98117; Wed, 2 Jan 2002 16:59:36 -0800 (PST) (envelope-from jim) Date: Wed, 2 Jan 2002 16:59:36 -0800 (PST) From: Message-Id: <200201030059.g030xaF98117@freefall.freebsd.org> To: doc@lublin.t1.pl, jim@FreeBSD.org, freebsd-ports@FreeBSD.org Subject: Re: ports/33493: Exploitable bug in mutt-devel (including mutt) Sender: owner-freebsd-ports@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org Synopsis: Exploitable bug in mutt-devel (including mutt) State-Changed-From-To: open->closed State-Changed-By: jim State-Changed-When: Wed Jan 2 16:58:46 PST 2002 State-Changed-Why: Update your ports tree. The security fix was committed to the 1.3.24 port yesterday, and the maintainer is working on the 1.3.25 update. http://www.FreeBSD.org/cgi/query-pr.cgi?pr=33493 To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-ports" in the body of the message