SCIENTIFIC-LINUX-ERRATA Archives

July 2011

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
"Tyler L. Parsons" <[log in to unmask]>
Reply To:
Tyler L. Parsons
Date:
Wed, 20 Jul 2011 10:44:49 -0500
Content-Type:
text/plain
Parts/Attachments:
text/plain (28 lines)
Synopsis:    Moderate: mutt security update
Issue Date:  2011-07-19
CVE Numbers: CVE-2011-1429


Mutt is a text-mode mail user agent.

A flaw was found in the way Mutt verified SSL certificates. When a server
presented an SSL certificate chain, Mutt could ignore a server hostname
check failure. A remote attacker able to get a certificate from a trusted
Certificate Authority could use this flaw to trick Mutt into accepting a
certificate issued for a different hostname, and perform man-in-the-middle
attacks against Mutt's SSL connections. (CVE-2011-1429)

All Mutt users should upgrade to this updated package, which contains a
backported patch to correct this issue. All running instances of Mutt must
be restarted for this update to take effect.

SL6:
  i386
     mutt-1.5.20-2.20091214hg736b6a.el6_1.1.i686.rpm
     mutt-debuginfo-1.5.20-2.20091214hg736b6a.el6_1.1.i686.rpm
  x86_64
     mutt-1.5.20-2.20091214hg736b6a.el6_1.1.x86_64.rpm
     mutt-debuginfo-1.5.20-2.20091214hg736b6a.el6_1.1.x86_64.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2