[ubuntu/trusty-proposed] mutt 1.5.21-6.4ubuntu2 (Accepted)

Jamie Strandboge jamie at ubuntu.com
Thu Mar 13 23:16:31 UTC 2014


mutt (1.5.21-6.4ubuntu2) trusty; urgency=low

  * SECURITY UPDATE: buffer overflow in header processing after
    address expansion.
    - debian/patches/ubuntu/mutt-CVE-2014-0467.patch
    - CVE-2014-0467

Date: 2014-03-13 06:24:38.668664+00:00
Changed-By: Steve Beattie <sbeattie at ubuntu.com>
Signed-By: Jamie Strandboge <jamie at ubuntu.com>
https://launchpad.net/ubuntu/trusty/+source/mutt/1.5.21-6.4ubuntu2
-------------- next part --------------
Sorry, changesfile not available.


More information about the Trusty-changes mailing list