drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Denial of Service in mutt
Name: |
Denial of Service in mutt |
|
ID: |
DSA-4838-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian buster |
|
Datum: |
Mo, 25. Januar 2021, 22:24 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3181 |
|
Applikationen: |
mutt |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-4838-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso January 25, 2021 https://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : mutt CVE ID : CVE-2021-3181 Debian Bug : 980326
Tavis Ormandy discovered a memory leak flaw in the rfc822 group recipient parsing in Mutt, a text-based mailreader supporting MIME, GPG, PGP and threading, which could result in denial of service.
For the stable distribution (buster), this problem has been fixed in version 1.10.1-2.1+deb10u5.
We recommend that you upgrade your mutt packages.
For the detailed security status of mutt please refer to its security tracker page at: https://security-tracker.debian.org/tracker/mutt
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmAPLitfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0RiCg/+Lios0rfY/jmT8tpygOcRqMTrw8/WK7x8aV595U1zcnDDNt7LgeIuLKaH U/hY8FvIRsJEhTSbwi63Y03U8ywZFseT8TPywvpEM6Ne260YB/hUA2sPp0gKZrcx 9FUfVhwxQNpykTBJHGIY+t+tb8tFOg2hFqd53vEFQwuhmIGotlvFcNCjSBl5fUjZ CyNOO21gZWjgohZQZyhymDTTqlZK4rtYQ97PX5Z5IptvokO9CdeKMwfjAEpVe6j6 +MqltzSw8FuYsD+EMboS+FjshZSNQS+k/YGLX5WiZ6pf5a5u74VSPvBK/UqJWzsQ QL0H/+7pC7i7YoeHy9VM7mnVYxpnfDeTQrUpE50UxhIV8W4ttiG15Xb1AkA+JGwj wjZb0/VrBZgEbOAweIz7v4JxCsj8QCgKEGsmkFY6yG8P7Jj4t+zmdRSngbeaqTjp q2j2KQFdYZqyM/cRVUnKR7cOeMitQFDvlt3tKnUM3MzXsc/H/k7X85JtvMIhlBgo dysC3zAn8NO5xeCwQh3+HmBpJMVXs7q9VNP+7ElXQ++j//p5e5Fio3ZIb7bYsiKy Fq6ex3yE+6wZ7atZmqybRrDNeAfQAdEkWA4TK8sx8tI7A9XeAUsWSnCOlab70n85 rF6S0KZX0Yw63cADAYAuQobEY5qE0i0L58sV4Jk6+zkoUohq0y8= =WcYy -----END PGP SIGNATURE-----
|
|
|
|