Package name
mutt
Date
2002-01-08
Advisory ID
MDKSA-2002:002
Affected versions
8.1 i586 , CS1.0 i586 , 8.1 i586 , 8.0 i586 , 8.0 i586 , 7.1 i586 , 7.2 i586

Problem description

Joost Pol reported a remotely exploitable buffer overflow in the mutt email client. It is recommended that all mutt users upgrade their packages immediately.

Updated packages

8.1 i586

 bf0fb036e1fd4a263ff2f05fe3a0b29b  ia64/8.1/RPMS/mutt-1.3.25i-1.1mdk.ia64.rpm
39c63a5b76b6956f0d750970c58ab952  ia64/8.1/SRPMS/mutt-1.3.25i-1.1mdk.src.rpm

CS1.0 i586

 dc0844339910b9ec881bcbda9386bc11  1.0.1/RPMS/mutt-1.2.5i-6.1mdk.i586.rpm
08e163b11b3ed5db88cc835d98240a87  1.0.1/SRPMS/mutt-1.2.5i-6.1mdk.src.rpm

8.1 i586

 ed4d390b9b84dbff3a049b1f4b56aece  8.1/RPMS/mutt-1.3.25i-1.1mdk.i586.rpm
39c63a5b76b6956f0d750970c58ab952  8.1/SRPMS/mutt-1.3.25i-1.1mdk.src.rpm

8.0 i586

 155bec67a9f85c0d83f47a9521a177eb  8.0/RPMS/mutt-1.3.25i-1.1mdk.i586.rpm
39c63a5b76b6956f0d750970c58ab952  8.0/SRPMS/mutt-1.3.25i-1.1mdk.src.rpm

8.0 i586

 0adec05415db85e16cd462380e695e34  ppc/8.0/RPMS/mutt-1.3.25i-1.1mdk.ppc.rpm
39c63a5b76b6956f0d750970c58ab952  ppc/8.0/SRPMS/mutt-1.3.25i-1.1mdk.src.rpm

7.1 i586

 dc0844339910b9ec881bcbda9386bc11  7.1/RPMS/mutt-1.2.5i-6.1mdk.i586.rpm
08e163b11b3ed5db88cc835d98240a87  7.1/SRPMS/mutt-1.2.5i-6.1mdk.src.rpm

7.2 i586

 edb37e0a3eff7cb05b5552e793cd9584  7.2/RPMS/mutt-1.2.5i-6.2mdk.i586.rpm
da26b763cbd25cb70b7dc7ea0eb67f80  7.2/SRPMS/mutt-1.2.5i-6.2mdk.src.rpm

References