Summary: | japanese/mutt-devel: Fix IMAP buffer overflow vulnerability | ||||||
---|---|---|---|---|---|---|---|
Product: | Ports & Packages | Reporter: | Shaun Amott <shaun> | ||||
Component: | Individual Port(s) | Assignee: | Shaun Amott <shaun> | ||||
Status: | Closed FIXED | ||||||
Severity: | Affects Only Me | ||||||
Priority: | Normal | ||||||
Version: | Latest | ||||||
Hardware: | Any | ||||||
OS: | Any | ||||||
Attachments: |
|
Description
Shaun Amott
![]() ![]() Responsible Changed From-To: freebsd-ports-bugs->shaun Submitter has GNATS access State Changed From-To: open->feedback Awaiting maintainers feedback Dear Edwin Groothuis et al Thank you for your advice. I approve the patch and would appreciate it if you'd commit it. Regards [On Jul 1, Edwin Groothuis <edwin@FreeBSD.org> wrote:] >Maintainer of japanese/mutt-devel, > >Please note that PR ports/99698 has just been submitted. > >If it contains a patch for an upgrade, an enhancement or a bug fix >you agree on, reply to this email stating that you approve the patch >and a committer will take care of it. > >The full text of the PR can be found at: > http://www.freebsd.org/cgi/query-pr.cgi?pr=ports/99698 > >-- >Edwin Groothuis >edwin@FreeBSD.org -- SHIOZAKI Takehiko State Changed From-To: feedback->closed Committed, thanks! |