[ubuntu/trusty-proposed] mutt 1.5.21-6.4ubuntu2 (Accepted)
Jamie Strandboge
jamie at ubuntu.com
Thu Mar 13 23:16:31 UTC 2014
mutt (1.5.21-6.4ubuntu2) trusty; urgency=low
* SECURITY UPDATE: buffer overflow in header processing after
address expansion.
- debian/patches/ubuntu/mutt-CVE-2014-0467.patch
- CVE-2014-0467
Date: 2014-03-13 06:24:38.668664+00:00
Changed-By: Steve Beattie <sbeattie at ubuntu.com>
Signed-By: Jamie Strandboge <jamie at ubuntu.com>
https://launchpad.net/ubuntu/trusty/+source/mutt/1.5.21-6.4ubuntu2
-------------- next part --------------
Sorry, changesfile not available.
More information about the Trusty-changes
mailing list