[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] New versions of Mutt fixes buffer overflow



We have received a report from Paul Boehm stating that Mutt has an
overflowable buffer in parse.c.  When sending malicious mail you can
execute arbitary code on the mutt running user's system.  We recommend
you upgrade your Mutt package immediately.

dpkg -i file.deb
        will install the referenced file.

Debian GNU/Linux 2.0 alias hamm
-------------------------------

  This version of Debian were released only for the Intel and the
  Motorola 68xxx architecture.

  Intel architecture:
    ftp://ftp.debian.org/debian/dists/stable-updates/mutt_0.91.2-2_i386.deb
      MD5 checksum: cdebc73fe5be56a9c030d80c147e4e4d

  Motorola 68xxx architecture:
    ftp://ftp.debian.org/debian/dists/stable-updates/mutt_0.91.2-2_m68k.deb
      MD5 checksum: 1428f3ca62c5ae69b1dc10182ea24e65

  These files will be moved into
  ftp://ftp.debian.org/debian/dists/hamm/binary-$arch/ soon.


For other architectures please refer to the appropriate directory
ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .

--
Debian GNU/Linux    .    Security Managers    .    security@debian.org
              debian-security-announce@lists.debian.org
Christian Hudon <chrish@debian.org> . Martin Schulze <joey@debian.org>

Attachment: pgpXQ1izZmJHj.pgp
Description: PGP signature


Reply to: