| Summary: | mail-client/mutt: buffer overflow vulnerability | ||
|---|---|---|---|
| Product: | Gentoo Security | Reporter: | Sebastian <sebastian_ml> |
| Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
| Status: | RESOLVED INVALID | ||
| Severity: | critical | CC: | devnull, net-mail+disabled |
| Priority: | High | ||
| Version: | unspecified | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | http://www.derkeiler.com/Mailing-Lists/Full-Disclosure/2005-08/0594.html | ||
| Whiteboard: | B1 [ebuild] DerCorny | ||
| Package list: | Runtime testing required: | --- | |
|
Description
Sebastian
2005-08-19 04:48:04 UTC
Ah, the initial advisory is here: http://www.derkeiler.com/Mailing-Lists/Full-Disclosure/2005-08/0594.html net-mail please provide updated ebuilds, thanks. I believe this was later discovered to only affect openbsd Sorry, I was a bit trigger happy. This bug seems to affect only some openbsd systems so we are safe. *** Bug 103089 has been marked as a duplicate of this bug. *** |