-
mutt (1.5.21-6ubuntu0.1) quantal-security; urgency=low
* SECURITY UPDATE: buffer overflow in header processing after
address expansion.
- debian/patches/ubuntu/mutt-CVE-2014-0467.patch
- CVE-2014-0467
-- Steve Beattie <email address hidden> Wed, 12 Mar 2014 21:33:35 -0700
-
mutt (1.5.21-6) unstable; urgency=low
* debian/rules: enabled hardened flags; patch by <email address hidden>
(Closes: 654148).
* debian/mutt.lintian-overrides: adding an override for the statically linked
mutt_dotlock
-- Antonio Radici <email address hidden> Fri, 22 Jun 2012 22:47:28 +0100
-
mutt (1.5.21-5ubuntu3) quantal; urgency=low
* Rebuild for libtokyocabinet9.
-- Colin Watson <email address hidden> Sun, 06 May 2012 20:32:57 +0100
-
mutt (1.5.21-5ubuntu2) precise; urgency=low
* Revert to gnutls26. It looks as though we'll be sticking with that for
precise.
-- Colin Watson <email address hidden> Tue, 10 Jan 2012 10:54:27 +0000