Package name
mutt
Date
2002-01-17
Advisory ID
MDKSA-2002:002-1
Affected versions
8.1 i586 , CS1.0 i586 , 8.1 i586 , 8.0 i586 , 8.0 i586 , 7.1 i586 , 7.2 i586

Problem description

Joost Pol reported a remotely exploitable buffer overflow in the mutt email client. It is recommended that all mutt users upgrade their packages immediately. Update: The previous packages released for 8.x were unable to recall postponed messages due to an incorrect patch. These new packages also provide the compressed folders patch that was unavailable when MDKSA-2002:002 was announced.

Updated packages

8.1 i586

 e92bb7c4e0cc3ff3758671908fc5c59b  ia64/8.1/RPMS/mutt-1.3.25i-1.2mdk.ia64.rpm
09345e308a1e7ab87be085f58287e430  ia64/8.1/SRPMS/mutt-1.3.25i-1.2mdk.src.rpm

CS1.0 i586

 dc0844339910b9ec881bcbda9386bc11  1.0.1/RPMS/mutt-1.2.5i-6.1mdk.i586.rpm
08e163b11b3ed5db88cc835d98240a87  1.0.1/SRPMS/mutt-1.2.5i-6.1mdk.src.rpm

8.1 i586

 86ba9f85f30adafa7132ca3a4b3af151  8.1/RPMS/mutt-1.3.25i-1.2mdk.i586.rpm
09345e308a1e7ab87be085f58287e430  8.1/SRPMS/mutt-1.3.25i-1.2mdk.src.rpm

8.0 i586

 55ab5eee102e0f4654bbc889cde06fab  8.0/RPMS/mutt-1.3.25i-1.2mdk.i586.rpm
09345e308a1e7ab87be085f58287e430  8.0/SRPMS/mutt-1.3.25i-1.2mdk.src.rpm

8.0 i586

 288ee63878e6b442f6eb5e8ac8b5eb2d  ppc/8.0/RPMS/mutt-1.3.25i-1.2mdk.ppc.rpm
09345e308a1e7ab87be085f58287e430  ppc/8.0/SRPMS/mutt-1.3.25i-1.2mdk.src.rpm

7.1 i586

 dc0844339910b9ec881bcbda9386bc11  7.1/RPMS/mutt-1.2.5i-6.1mdk.i586.rpm
08e163b11b3ed5db88cc835d98240a87  7.1/SRPMS/mutt-1.2.5i-6.1mdk.src.rpm

7.2 i586

 edb37e0a3eff7cb05b5552e793cd9584  7.2/RPMS/mutt-1.2.5i-6.2mdk.i586.rpm
da26b763cbd25cb70b7dc7ea0eb67f80  7.2/SRPMS/mutt-1.2.5i-6.2mdk.src.rpm

References