Quinn Comendant <qu...@strangecode.com> ha escrit: > I recently learned of a vulnerability where an arbitrary command can > be executed by root if the body of an email passed to `mail` contains > unsanitized ~! or ~| escapes.
This has been fixed on July 19 (commit 4befcfd015). The fix is included in version 3.13. Please, upgrade. Regards, Sergey