Darxus on Sun, 20 Jan 2002 04:39:15 -0500 |
On 01/19, gabriel rosenkoetter wrote: > I am also using GPG 1.0.6, but mutt 1.2.5.1i. (Tsk, tsk, Darxus; > 1.2.5i has a format string vulnerability. ;^>) mutt (1.2.5-5) stable; urgency=high * Applied patch-1.2.5.tlr.terminate.1 to fix a remotely exploitable buffer overflow. Do you think that's related ? -- "The reasonable man adopts himself to the world; the unreasonable one persists in trying to adopt the world to himself. Therefore all progress depends on the unreasonable man." - George Bernard Shaw http://www.ChaosReigns.com ______________________________________________________________________ Philadelphia Linux Users Group - http://www.phillylinux.org Announcements-http://lists.phillylinux.org/mail/listinfo/plug-announce General Discussion - http://lists.phillylinux.org/mail/listinfo/plug
|
|