Your message dated Fri, 07 Jul 2006 06:17:08 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#375828: fixed in mutt 1.5.11+cvs20060403-2
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: mutt
Version: 1.5.11+cvs20060403-1
Severity: important
Tags: security patch

Hi!

Upstream recently fixed a buffer overflow triggered by overly long
IMAP namespace strings sent from the IMAP server.

Advisory:
  http://secunia.com/advisories/20810
Patch:
  
http://dev.mutt.org/cgi-bin/gitweb.cgi?p=mutt/.git;a=commitdiff;h=dc0272b749f0e2b102973b7ac43dbd3908507540

There is no CVE number yet unfortunately.

Thank you!

Martin
-- 
Martin Pitt        http://www.piware.de
Ubuntu Developer   http://www.ubuntu.com
Debian Developer   http://www.debian.org

In a world without walls and fences, who needs Windows and Gates?

Attachment: signature.asc
Description: Digital signature


--- End Message ---
--- Begin Message ---
Source: mutt
Source-Version: 1.5.11+cvs20060403-2

We believe that the bug you reported is fixed in the latest version of
mutt, which is due to be installed in the Debian FTP archive:

mutt_1.5.11+cvs20060403-2.diff.gz
  to pool/main/m/mutt/mutt_1.5.11+cvs20060403-2.diff.gz
mutt_1.5.11+cvs20060403-2.dsc
  to pool/main/m/mutt/mutt_1.5.11+cvs20060403-2.dsc
mutt_1.5.11+cvs20060403-2_i386.deb
  to pool/main/m/mutt/mutt_1.5.11+cvs20060403-2_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Adeodato Simó <[EMAIL PROTECTED]> (supplier of updated mutt package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Fri,  7 Jul 2006 15:01:28 +0200
Source: mutt
Binary: mutt
Architecture: source i386
Version: 1.5.11+cvs20060403-2
Distribution: unstable
Urgency: high
Maintainer: Adeodato Simó <[EMAIL PROTECTED]>
Changed-By: Adeodato Simó <[EMAIL PROTECTED]>
Description: 
 mutt       - text-based mailreader supporting MIME, GPG, PGP and threading
Closes: 375828
Changes: 
 mutt (1.5.11+cvs20060403-2) unstable; urgency=high
 .
   * Fix CVE-2006-3242, stack-based buffer overflow when processing an overly
     long namespace from the IMAP server.  (Closes: #375828)
Files: 
 3ccdff44a95de30beba370f0c37a2d78 830 mail standard 
mutt_1.5.11+cvs20060403-2.dsc
 e85f8da89c26d2208e8c6a5a2ea86844 50808 mail standard 
mutt_1.5.11+cvs20060403-2.diff.gz
 8bfd3426f441ea96b3546a77adff6777 1773474 mail standard 
mutt_1.5.11+cvs20060403-2_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)
Comment: Signed by Adeodato Simó <[EMAIL PROTECTED]>

iEYEARECAAYFAkSuW/wACgkQgyNlRdHEGILiSgCfQuwmXMi44vW4Je0+RHX6dH2H
/JgAnRc512Vf2DG7jlLJGyIMqbmgx6/H
=bcVh
-----END PGP SIGNATURE-----


--- End Message ---

Reply via email to