Quinn Comendant <qu...@strangecode.com> ha escrit:

> I recently learned of a vulnerability where an arbitrary command can
> be executed by root if the body of an email passed to `mail` contains
> unsanitized ~! or ~| escapes.

This has been fixed on July 19 (commit 4befcfd015).  The fix is included
in version 3.13.  Please, upgrade.

Regards,
Sergey
 

Reply via email to