On 06 Oct 2021 21:45:08, Sergey Poznyakoff wrote:
>> I recently learned of a vulnerability where an arbitrary command can
>> be executed by root if the body of an email passed to `mail` contains
>> unsanitized ~! or ~| escapes.
> 
> This has been fixed on July 19 (commit 4befcfd015).  The fix is included
> in version 3.13.  Please, upgrade.

Thanks Sergey!

For the convenience of those who find this conversation later, here's the link 
to the commit:
https://git.savannah.gnu.org/cgit/mailutils.git/commit/?id=4befcfd015256c568121653038accbd84820198f

And the relevant bug report:
https://savannah.gnu.org/bugs/?60937

Regards,
Quinn

Reply via email to