Debian, OpenPKG release fixes for mutt

According to the Debian advisory, "The mutt mail reader performs insufficient validation of values returned from an IMAP server, which might overflow a buffer and potentially lead to the injection of arbitrary code."

For more information: http://www.debian.org/security/2006/dsa-1108

http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.013-mutt.html

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

More about Debian

Show Comments