Advisories
Mandriva Advisories
|
![]() |
Problem Description |
Joost Pol reported a remotely exploitable buffer overflow in the mutt
email client. It is recommended that all mutt users upgrade their
packages immediately.
Updated Packages |
Mandrakelinux 7.1
dc0844339910b9ec881bcbda9386bc11 7.1/RPMS/mutt-1.2.5i-6.1mdk.i586.rpm 08e163b11b3ed5db88cc835d98240a87 7.1/SRPMS/mutt-1.2.5i-6.1mdk.src.rpm
Mandrakelinux 7.2
edb37e0a3eff7cb05b5552e793cd9584 7.2/RPMS/mutt-1.2.5i-6.2mdk.i586.rpm da26b763cbd25cb70b7dc7ea0eb67f80 7.2/SRPMS/mutt-1.2.5i-6.2mdk.src.rpm
Mandrakelinux 8.0
155bec67a9f85c0d83f47a9521a177eb 8.0/RPMS/mutt-1.3.25i-1.1mdk.i586.rpm 39c63a5b76b6956f0d750970c58ab952 8.0/SRPMS/mutt-1.3.25i-1.1mdk.src.rpm
Mandrakelinux 8.0/PPC
0adec05415db85e16cd462380e695e34 ppc/8.0/RPMS/mutt-1.3.25i-1.1mdk.ppc.rpm 39c63a5b76b6956f0d750970c58ab952 ppc/8.0/SRPMS/mutt-1.3.25i-1.1mdk.src.rpm
Mandrakelinux 8.1
ed4d390b9b84dbff3a049b1f4b56aece 8.1/RPMS/mutt-1.3.25i-1.1mdk.i586.rpm 39c63a5b76b6956f0d750970c58ab952 8.1/SRPMS/mutt-1.3.25i-1.1mdk.src.rpm
Mandrakelinux 8.1/IA64
bf0fb036e1fd4a263ff2f05fe3a0b29b ia64/8.1/RPMS/mutt-1.3.25i-1.1mdk.ia64.rpm 39c63a5b76b6956f0d750970c58ab952 ia64/8.1/SRPMS/mutt-1.3.25i-1.1mdk.src.rpm
Corporate Server 1.0.1
dc0844339910b9ec881bcbda9386bc11 1.0.1/RPMS/mutt-1.2.5i-6.1mdk.i586.rpm 08e163b11b3ed5db88cc835d98240a87 1.0.1/SRPMS/mutt-1.2.5i-6.1mdk.src.rpm
References |
http://online.securityfocus.com/bid/3774
Upgrade |
To upgrade automatically, use MandrivaUpdate.
Verification |
Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :
rpm --checksig package.rpm
You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.
If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.