Debian: 'mutt' buffer overflow vulnerability
Summary
Package : mutt
Problem type : buffer overflow
Debian-specific: no
Joost Pol found a buffer overflow in the address handling code of
mutt (a popular mail user agent). Even though this is a one byte
overflow this is exploitable.
This has been fixed upstream in version 1.2.5.1 and 1.3.25. The
relevant patch has been added to version 1.2.5-5 of the Debian
package.
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
Debian GNU/Linux 2.2 alias potato
---------------------------------
Potato was released for alpha, arm, i386, m68k, powerpc and sparc.
At this moment packages for sparc are not yet available.
Source archives:
MD5 checksum: 04f7c13c3bf6a1d4fcb4bf1a594522a1
MD5 checksum: 0ba73a6dd8029339329c27b56087ebce
MD5 checksum: 0ba5367059abdd55daceb82dce6be42f
Alpha architecture:
MD5 checksum: b206557565607833551219ff67737cd4
ARM architecture:
MD5 checksum: 57c0c2602c3bfde3f459f01515...