Package: muttprint; Maintainer for muttprint is Rene Engelhard <[email protected]>; Source for muttprint is src:muttprint (PTS, buildd, popcon).
Reported by: Vincent Lefevre <[email protected]>
Date: Tue, 10 Oct 2017 11:21:06 UTC
Severity: important
Tags: security, upstream
Found in version muttprint/0.73-8
🔗 View this message in rfc822 format
Content-Disposition: inline Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-Mailer: MIME-tools 5.508 (Entity 5.508) Content-Type: text/plain; charset=utf-8 X-Loop: [email protected] From: [email protected] (Debian Bug Tracking System) To: Moritz Muehlenhoff <[email protected]> Subject: Bug#878138: Info received (Bug#878138: muttprint: still vulnerable to symlink attack (race condition)) Message-ID: <[email protected]> References: <[email protected]> X-Debian-PR-Message: ack-info 878138 X-Debian-PR-Package: muttprint X-Debian-PR-Keywords: security upstream X-Debian-PR-Source: muttprint Reply-To: [email protected] Date: Tue, 10 Oct 2017 12:00:05 +0000
Send a report that this bug log contains spam.
Debbugs is free software and licensed under the terms of the GNU General Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.