Advisories
Mandriva Advisories
|
![]() |
Problem Description |
Joost Pol reported a remotely exploitable buffer overflow in the mutt
email client. It is recommended that all mutt users upgrade their
packages immediately.
Update:
The previous packages released for 8.x were unable to recall postponed
messages due to an incorrect patch. These new packages also provide
the compressed folders patch that was unavailable when MDKSA-2002:002
was announced.
Updated Packages |
Mandrakelinux 7.1
dc0844339910b9ec881bcbda9386bc11 7.1/RPMS/mutt-1.2.5i-6.1mdk.i586.rpm 08e163b11b3ed5db88cc835d98240a87 7.1/SRPMS/mutt-1.2.5i-6.1mdk.src.rpm
Mandrakelinux 7.2
edb37e0a3eff7cb05b5552e793cd9584 7.2/RPMS/mutt-1.2.5i-6.2mdk.i586.rpm da26b763cbd25cb70b7dc7ea0eb67f80 7.2/SRPMS/mutt-1.2.5i-6.2mdk.src.rpm
Mandrakelinux 8.0
55ab5eee102e0f4654bbc889cde06fab 8.0/RPMS/mutt-1.3.25i-1.2mdk.i586.rpm 09345e308a1e7ab87be085f58287e430 8.0/SRPMS/mutt-1.3.25i-1.2mdk.src.rpm
Mandrakelinux 8.0/PPC
288ee63878e6b442f6eb5e8ac8b5eb2d ppc/8.0/RPMS/mutt-1.3.25i-1.2mdk.ppc.rpm 09345e308a1e7ab87be085f58287e430 ppc/8.0/SRPMS/mutt-1.3.25i-1.2mdk.src.rpm
Mandrakelinux 8.1
86ba9f85f30adafa7132ca3a4b3af151 8.1/RPMS/mutt-1.3.25i-1.2mdk.i586.rpm 09345e308a1e7ab87be085f58287e430 8.1/SRPMS/mutt-1.3.25i-1.2mdk.src.rpm
Mandrakelinux 8.1/IA64
e92bb7c4e0cc3ff3758671908fc5c59b ia64/8.1/RPMS/mutt-1.3.25i-1.2mdk.ia64.rpm 09345e308a1e7ab87be085f58287e430 ia64/8.1/SRPMS/mutt-1.3.25i-1.2mdk.src.rpm
Corporate Server 1.0.1
dc0844339910b9ec881bcbda9386bc11 1.0.1/RPMS/mutt-1.2.5i-6.1mdk.i586.rpm 08e163b11b3ed5db88cc835d98240a87 1.0.1/SRPMS/mutt-1.2.5i-6.1mdk.src.rpm
References |
http://online.securityfocus.com/bid/3774
Upgrade |
To upgrade automatically, use MandrivaUpdate.
Verification |
Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :
rpm --checksig package.rpm
You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.
If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.