View Bazaar branches
Get this repository:
git clone https://git.launchpad.net/ubuntu/+source/mutt
Members of Ubuntu Server Dev import team can upload to this repository. Log in for directions.

Branches

Name Last Modified Last Commit
importer/ubuntu/dsc 2019-05-31 05:34:33 UTC 2019-05-31
DSC file for 1.10.1-2.1

Author: Ubuntu Git Importer
Author Date: 2019-05-31 05:34:33 UTC

DSC file for 1.10.1-2.1

importer/debian/dsc 2019-05-31 04:36:27 UTC 2019-05-31
DSC file for 1.10.1-2.1

Author: Ubuntu Git Importer
Author Date: 2019-05-31 04:36:27 UTC

DSC file for 1.10.1-2.1

debian/buster 2019-05-31 04:33:17 UTC 2019-05-31
Import patches-unapplied version 1.10.1-2.1 to debian/sid

Author: lamby
Author Date: 2019-05-25 08:57:12 UTC

Import patches-unapplied version 1.10.1-2.1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: e8a2d8bef98f78b67bda052158282a46d6b7ccc0

New changelog entries:
  * Non-maintainer upload.
  * Apply patch from upstream to prevent undefined behaviour when
    parsing invalid Content-Disposition mail headers. The atoi() function was
    being called on a number which can potentially overflow and thus can have
    security implications depending on the atoi() implementation.
    (Closes: #929017)

applied/ubuntu/devel 2019-05-31 04:33:17 UTC 2019-05-31
Import patches-applied version 1.10.1-2.1 to applied/debian/sid

Author: lamby
Author Date: 2019-05-25 08:57:12 UTC

Import patches-applied version 1.10.1-2.1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 4fa28312ab53a3b48fd0758b1d882b0a7674edc3
Unapplied parent: 2e8b5bfbf9111cf276d1e8d2fbc0d6b28b9aee6d

New changelog entries:
  * Non-maintainer upload.
  * Apply patch from upstream to prevent undefined behaviour when
    parsing invalid Content-Disposition mail headers. The atoi() function was
    being called on a number which can potentially overflow and thus can have
    security implications depending on the atoi() implementation.
    (Closes: #929017)

ubuntu/eoan-devel 2019-05-31 04:33:17 UTC 2019-05-31
Import patches-unapplied version 1.10.1-2.1 to debian/sid

Author: lamby
Author Date: 2019-05-25 08:57:12 UTC

Import patches-unapplied version 1.10.1-2.1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: e8a2d8bef98f78b67bda052158282a46d6b7ccc0

New changelog entries:
  * Non-maintainer upload.
  * Apply patch from upstream to prevent undefined behaviour when
    parsing invalid Content-Disposition mail headers. The atoi() function was
    being called on a number which can potentially overflow and thus can have
    security implications depending on the atoi() implementation.
    (Closes: #929017)

ubuntu/eoan-proposed 2019-05-31 04:33:17 UTC 2019-05-31
Import patches-unapplied version 1.10.1-2.1 to debian/sid

Author: lamby
Author Date: 2019-05-25 08:57:12 UTC

Import patches-unapplied version 1.10.1-2.1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: e8a2d8bef98f78b67bda052158282a46d6b7ccc0

New changelog entries:
  * Non-maintainer upload.
  * Apply patch from upstream to prevent undefined behaviour when
    parsing invalid Content-Disposition mail headers. The atoi() function was
    being called on a number which can potentially overflow and thus can have
    security implications depending on the atoi() implementation.
    (Closes: #929017)

ubuntu/devel 2019-05-31 04:33:17 UTC 2019-05-31
Import patches-unapplied version 1.10.1-2.1 to debian/sid

Author: lamby
Author Date: 2019-05-25 08:57:12 UTC

Import patches-unapplied version 1.10.1-2.1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: e8a2d8bef98f78b67bda052158282a46d6b7ccc0

New changelog entries:
  * Non-maintainer upload.
  * Apply patch from upstream to prevent undefined behaviour when
    parsing invalid Content-Disposition mail headers. The atoi() function was
    being called on a number which can potentially overflow and thus can have
    security implications depending on the atoi() implementation.
    (Closes: #929017)

applied/debian/buster 2019-05-31 04:33:17 UTC 2019-05-31
Import patches-applied version 1.10.1-2.1 to applied/debian/sid

Author: lamby
Author Date: 2019-05-25 08:57:12 UTC

Import patches-applied version 1.10.1-2.1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 4fa28312ab53a3b48fd0758b1d882b0a7674edc3
Unapplied parent: 2e8b5bfbf9111cf276d1e8d2fbc0d6b28b9aee6d

New changelog entries:
  * Non-maintainer upload.
  * Apply patch from upstream to prevent undefined behaviour when
    parsing invalid Content-Disposition mail headers. The atoi() function was
    being called on a number which can potentially overflow and thus can have
    security implications depending on the atoi() implementation.
    (Closes: #929017)

debian/sid 2019-05-31 04:33:17 UTC 2019-05-31
Import patches-unapplied version 1.10.1-2.1 to debian/sid

Author: lamby
Author Date: 2019-05-25 08:57:12 UTC

Import patches-unapplied version 1.10.1-2.1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: e8a2d8bef98f78b67bda052158282a46d6b7ccc0

New changelog entries:
  * Non-maintainer upload.
  * Apply patch from upstream to prevent undefined behaviour when
    parsing invalid Content-Disposition mail headers. The atoi() function was
    being called on a number which can potentially overflow and thus can have
    security implications depending on the atoi() implementation.
    (Closes: #929017)

applied/ubuntu/eoan-proposed 2019-05-31 04:33:17 UTC 2019-05-31
Import patches-applied version 1.10.1-2.1 to applied/debian/sid

Author: lamby
Author Date: 2019-05-25 08:57:12 UTC

Import patches-applied version 1.10.1-2.1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 4fa28312ab53a3b48fd0758b1d882b0a7674edc3
Unapplied parent: 2e8b5bfbf9111cf276d1e8d2fbc0d6b28b9aee6d

New changelog entries:
  * Non-maintainer upload.
  * Apply patch from upstream to prevent undefined behaviour when
    parsing invalid Content-Disposition mail headers. The atoi() function was
    being called on a number which can potentially overflow and thus can have
    security implications depending on the atoi() implementation.
    (Closes: #929017)

applied/ubuntu/eoan-devel 2019-05-31 04:33:17 UTC 2019-05-31
Import patches-applied version 1.10.1-2.1 to applied/debian/sid

Author: lamby
Author Date: 2019-05-25 08:57:12 UTC

Import patches-applied version 1.10.1-2.1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 4fa28312ab53a3b48fd0758b1d882b0a7674edc3
Unapplied parent: 2e8b5bfbf9111cf276d1e8d2fbc0d6b28b9aee6d

New changelog entries:
  * Non-maintainer upload.
  * Apply patch from upstream to prevent undefined behaviour when
    parsing invalid Content-Disposition mail headers. The atoi() function was
    being called on a number which can potentially overflow and thus can have
    security implications depending on the atoi() implementation.
    (Closes: #929017)

applied/ubuntu/eoan 2019-05-31 04:33:17 UTC 2019-05-31
Import patches-applied version 1.10.1-2.1 to applied/debian/sid

Author: lamby
Author Date: 2019-05-25 08:57:12 UTC

Import patches-applied version 1.10.1-2.1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 4fa28312ab53a3b48fd0758b1d882b0a7674edc3
Unapplied parent: 2e8b5bfbf9111cf276d1e8d2fbc0d6b28b9aee6d

New changelog entries:
  * Non-maintainer upload.
  * Apply patch from upstream to prevent undefined behaviour when
    parsing invalid Content-Disposition mail headers. The atoi() function was
    being called on a number which can potentially overflow and thus can have
    security implications depending on the atoi() implementation.
    (Closes: #929017)

applied/debian/sid 2019-05-31 04:33:17 UTC 2019-05-31
Import patches-applied version 1.10.1-2.1 to applied/debian/sid

Author: lamby
Author Date: 2019-05-25 08:57:12 UTC

Import patches-applied version 1.10.1-2.1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 4fa28312ab53a3b48fd0758b1d882b0a7674edc3
Unapplied parent: 2e8b5bfbf9111cf276d1e8d2fbc0d6b28b9aee6d

New changelog entries:
  * Non-maintainer upload.
  * Apply patch from upstream to prevent undefined behaviour when
    parsing invalid Content-Disposition mail headers. The atoi() function was
    being called on a number which can potentially overflow and thus can have
    security implications depending on the atoi() implementation.
    (Closes: #929017)

ubuntu/eoan 2019-05-31 04:33:17 UTC 2019-05-31
Import patches-unapplied version 1.10.1-2.1 to debian/sid

Author: lamby
Author Date: 2019-05-25 08:57:12 UTC

Import patches-unapplied version 1.10.1-2.1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: e8a2d8bef98f78b67bda052158282a46d6b7ccc0

New changelog entries:
  * Non-maintainer upload.
  * Apply patch from upstream to prevent undefined behaviour when
    parsing invalid Content-Disposition mail headers. The atoi() function was
    being called on a number which can potentially overflow and thus can have
    security implications depending on the atoi() implementation.
    (Closes: #929017)

debian/stretch 2018-11-10 17:07:54 UTC 2018-11-10
Import patches-unapplied version 1.7.2-1+deb9u1 to debian/stretch

Author: Antonio Radici
Author Date: 2018-08-07 08:48:44 UTC

Import patches-unapplied version 1.7.2-1+deb9u1 to debian/stretch

Imported using git-ubuntu import.

Changelog parent: b4dc9ee5eb8461143d3b8da5a263f3eeaa3e6147

New changelog entries:
  * Initial changelog entries for security update (Closes: 904051)
  * Patches provided by Roberto C. Sánchez <roberto@debian.org>
    + Fix arbitrary command execution by remote IMAP servers via backquote
      characters, related to the mailboxes command associated with a manual
      subscription or unsubscription (CVE-2018-14354)
    + Fix arbitrary command execution by remote IMAP servers via backquote
      characters, related to the mailboxes command associated with an automatic
      subscription (CVE-2018-14357)
    + Fix a stack-based buffer overflow caused by imap_quote_string() not
      leaving room for quote characters (CVE-2018-14352)
    + Fix an integer underflow in imap_quote_string() (CVE-2018-14353)
    + Fix mishandling of zero-length UID in pop.c (CVE-2018-14356)
    + Fix unsafe interaction between message-cache pathnames and certain
      characters in pop.c (CVE-2018-14362)
    + Fix mishandling of ".." directory traversal in IMAP mailbox name
      (CVE-2018-14355)
    + Fix a stack-based buffer overflow for an IMAP FETCH response with a long
      INTERNALDATE field (CVE-2018-14350)
    + Fix a stack-based buffer overflow for an IMAP FETCH response with a long
      RFC822.SIZE field (CVE-2018-14358)
    + Fix mishandling of an IMAP NO response without a message (CVE-2018-14349)
    + Fix mishandling of long IMAP status mailbox literal count size
      (CVE-2018-14351)
    + Fix a buffer overflow via base64 data (CVE-2018-14359)
    + Fix a stack-based buffer overflow because of incorrect sscanf usage
      (CVE-2018-14360)
    + Fix a defect where processing continues if memory allocation fails for
      NNTP messages (CVE-2018-14361)
    * Fix unsafe interaction between message-cache pathnames and certain
      characters in newsrc.c (CVE-2018-14363)

applied/debian/stretch 2018-11-10 17:07:54 UTC 2018-11-10
Import patches-applied version 1.7.2-1+deb9u1 to applied/debian/stretch

Author: Antonio Radici
Author Date: 2018-08-07 08:48:44 UTC

Import patches-applied version 1.7.2-1+deb9u1 to applied/debian/stretch

Imported using git-ubuntu import.

Changelog parent: 2ab608bc18354f308cd38829c9d4a3f8245d08ba
Unapplied parent: 34be9cff38fa2e8dc4fba1b2b6a1c6392e54a80f

New changelog entries:
  * Initial changelog entries for security update (Closes: 904051)
  * Patches provided by Roberto C. Sánchez <roberto@debian.org>
    + Fix arbitrary command execution by remote IMAP servers via backquote
      characters, related to the mailboxes command associated with a manual
      subscription or unsubscription (CVE-2018-14354)
    + Fix arbitrary command execution by remote IMAP servers via backquote
      characters, related to the mailboxes command associated with an automatic
      subscription (CVE-2018-14357)
    + Fix a stack-based buffer overflow caused by imap_quote_string() not
      leaving room for quote characters (CVE-2018-14352)
    + Fix an integer underflow in imap_quote_string() (CVE-2018-14353)
    + Fix mishandling of zero-length UID in pop.c (CVE-2018-14356)
    + Fix unsafe interaction between message-cache pathnames and certain
      characters in pop.c (CVE-2018-14362)
    + Fix mishandling of ".." directory traversal in IMAP mailbox name
      (CVE-2018-14355)
    + Fix a stack-based buffer overflow for an IMAP FETCH response with a long
      INTERNALDATE field (CVE-2018-14350)
    + Fix a stack-based buffer overflow for an IMAP FETCH response with a long
      RFC822.SIZE field (CVE-2018-14358)
    + Fix mishandling of an IMAP NO response without a message (CVE-2018-14349)
    + Fix mishandling of long IMAP status mailbox literal count size
      (CVE-2018-14351)
    + Fix a buffer overflow via base64 data (CVE-2018-14359)
    + Fix a stack-based buffer overflow because of incorrect sscanf usage
      (CVE-2018-14360)
    + Fix a defect where processing continues if memory allocation fails for
      NNTP messages (CVE-2018-14361)
    * Fix unsafe interaction between message-cache pathnames and certain
      characters in newsrc.c (CVE-2018-14363)

applied/ubuntu/xenial-devel 2018-09-27 23:48:14 UTC 2018-09-27
Import patches-applied version 1.5.24-1ubuntu0.2 to applied/ubuntu/xenial-sec...

Author: Steve Beattie
Author Date: 2018-09-26 19:43:56 UTC

Import patches-applied version 1.5.24-1ubuntu0.2 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 86602b95e7c0f34fd33526f08a427ddeb7919f02
Unapplied parent: 600bd6fef8953bff60674884eb71e5a132fd8037

New changelog entries:
  * SECURITY UPDATE: apply all fixes to both mutt and mutt-patched
    - debian/patches/series: re-order patch application (LP: #1794278)

applied/ubuntu/xenial-updates 2018-09-27 23:48:14 UTC 2018-09-27
Import patches-applied version 1.5.24-1ubuntu0.2 to applied/ubuntu/xenial-sec...

Author: Steve Beattie
Author Date: 2018-09-26 19:43:56 UTC

Import patches-applied version 1.5.24-1ubuntu0.2 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 86602b95e7c0f34fd33526f08a427ddeb7919f02
Unapplied parent: 600bd6fef8953bff60674884eb71e5a132fd8037

New changelog entries:
  * SECURITY UPDATE: apply all fixes to both mutt and mutt-patched
    - debian/patches/series: re-order patch application (LP: #1794278)

ubuntu/xenial-devel 2018-09-27 23:48:14 UTC 2018-09-27
Import patches-unapplied version 1.5.24-1ubuntu0.2 to ubuntu/xenial-security

Author: Steve Beattie
Author Date: 2018-09-26 19:43:56 UTC

Import patches-unapplied version 1.5.24-1ubuntu0.2 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 3fd811484519361601ad24d8ed92b3884e4a1b4b

New changelog entries:
  * SECURITY UPDATE: apply all fixes to both mutt and mutt-patched
    - debian/patches/series: re-order patch application (LP: #1794278)

ubuntu/xenial-updates 2018-09-27 23:48:14 UTC 2018-09-27
Import patches-unapplied version 1.5.24-1ubuntu0.2 to ubuntu/xenial-security

Author: Steve Beattie
Author Date: 2018-09-26 19:43:56 UTC

Import patches-unapplied version 1.5.24-1ubuntu0.2 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 3fd811484519361601ad24d8ed92b3884e4a1b4b

New changelog entries:
  * SECURITY UPDATE: apply all fixes to both mutt and mutt-patched
    - debian/patches/series: re-order patch application (LP: #1794278)

ubuntu/xenial-security 2018-09-27 23:48:14 UTC 2018-09-27
Import patches-unapplied version 1.5.24-1ubuntu0.2 to ubuntu/xenial-security

Author: Steve Beattie
Author Date: 2018-09-26 19:43:56 UTC

Import patches-unapplied version 1.5.24-1ubuntu0.2 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 3fd811484519361601ad24d8ed92b3884e4a1b4b

New changelog entries:
  * SECURITY UPDATE: apply all fixes to both mutt and mutt-patched
    - debian/patches/series: re-order patch application (LP: #1794278)

applied/ubuntu/xenial-security 2018-09-27 23:48:14 UTC 2018-09-27
Import patches-applied version 1.5.24-1ubuntu0.2 to applied/ubuntu/xenial-sec...

Author: Steve Beattie
Author Date: 2018-09-26 19:43:56 UTC

Import patches-applied version 1.5.24-1ubuntu0.2 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 86602b95e7c0f34fd33526f08a427ddeb7919f02
Unapplied parent: 600bd6fef8953bff60674884eb71e5a132fd8037

New changelog entries:
  * SECURITY UPDATE: apply all fixes to both mutt and mutt-patched
    - debian/patches/series: re-order patch application (LP: #1794278)

ubuntu/disco-devel 2018-08-07 16:38:10 UTC 2018-08-07
Import patches-unapplied version 1.10.1-2 to debian/sid

Author: Antonio Radici
Author Date: 2018-08-07 08:31:52 UTC

Import patches-unapplied version 1.10.1-2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 8541761971d9561f45ab28a105c062ce50cf0e01

New changelog entries:
  [ Jonathan Nieder ]
  * debian/patches:
    + added upstream patches for OAUTHBEARER support by Brandon Long
      (Closes: #905551).
      + upstream/905551-oauthbearer-imap.patch
      + upstream/905551-oauthbearer-smtp.patch
      + upstream/905551-oauthbearer-refresh.patch
  [ Antonio Radici ]
  * New release to include the patch above.

applied/ubuntu/disco-devel 2018-08-07 16:38:10 UTC 2018-08-07
Import patches-applied version 1.10.1-2 to applied/debian/sid

Author: Antonio Radici
Author Date: 2018-08-07 08:31:52 UTC

Import patches-applied version 1.10.1-2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: efa239c2ee939c1456698d0db419ec2bc3a3f805
Unapplied parent: 1f1e020c77b058218886999951156357d76c7095

New changelog entries:
  [ Jonathan Nieder ]
  * debian/patches:
    + added upstream patches for OAUTHBEARER support by Brandon Long
      (Closes: #905551).
      + upstream/905551-oauthbearer-imap.patch
      + upstream/905551-oauthbearer-smtp.patch
      + upstream/905551-oauthbearer-refresh.patch
  [ Antonio Radici ]
  * New release to include the patch above.

ubuntu/cosmic-devel 2018-08-07 16:38:10 UTC 2018-08-07
Import patches-unapplied version 1.10.1-2 to debian/sid

Author: Antonio Radici
Author Date: 2018-08-07 08:31:52 UTC

Import patches-unapplied version 1.10.1-2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 8541761971d9561f45ab28a105c062ce50cf0e01

New changelog entries:
  [ Jonathan Nieder ]
  * debian/patches:
    + added upstream patches for OAUTHBEARER support by Brandon Long
      (Closes: #905551).
      + upstream/905551-oauthbearer-imap.patch
      + upstream/905551-oauthbearer-smtp.patch
      + upstream/905551-oauthbearer-refresh.patch
  [ Antonio Radici ]
  * New release to include the patch above.

applied/ubuntu/cosmic-devel 2018-08-07 16:38:10 UTC 2018-08-07
Import patches-applied version 1.10.1-2 to applied/debian/sid

Author: Antonio Radici
Author Date: 2018-08-07 08:31:52 UTC

Import patches-applied version 1.10.1-2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: efa239c2ee939c1456698d0db419ec2bc3a3f805
Unapplied parent: 1f1e020c77b058218886999951156357d76c7095

New changelog entries:
  [ Jonathan Nieder ]
  * debian/patches:
    + added upstream patches for OAUTHBEARER support by Brandon Long
      (Closes: #905551).
      + upstream/905551-oauthbearer-imap.patch
      + upstream/905551-oauthbearer-smtp.patch
      + upstream/905551-oauthbearer-refresh.patch
  [ Antonio Radici ]
  * New release to include the patch above.

applied/ubuntu/cosmic 2018-08-07 16:38:10 UTC 2018-08-07
Import patches-applied version 1.10.1-2 to applied/debian/sid

Author: Antonio Radici
Author Date: 2018-08-07 08:31:52 UTC

Import patches-applied version 1.10.1-2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: efa239c2ee939c1456698d0db419ec2bc3a3f805
Unapplied parent: 1f1e020c77b058218886999951156357d76c7095

New changelog entries:
  [ Jonathan Nieder ]
  * debian/patches:
    + added upstream patches for OAUTHBEARER support by Brandon Long
      (Closes: #905551).
      + upstream/905551-oauthbearer-imap.patch
      + upstream/905551-oauthbearer-smtp.patch
      + upstream/905551-oauthbearer-refresh.patch
  [ Antonio Radici ]
  * New release to include the patch above.

applied/ubuntu/disco 2018-08-07 16:38:10 UTC 2018-08-07
Import patches-applied version 1.10.1-2 to applied/debian/sid

Author: Antonio Radici
Author Date: 2018-08-07 08:31:52 UTC

Import patches-applied version 1.10.1-2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: efa239c2ee939c1456698d0db419ec2bc3a3f805
Unapplied parent: 1f1e020c77b058218886999951156357d76c7095

New changelog entries:
  [ Jonathan Nieder ]
  * debian/patches:
    + added upstream patches for OAUTHBEARER support by Brandon Long
      (Closes: #905551).
      + upstream/905551-oauthbearer-imap.patch
      + upstream/905551-oauthbearer-smtp.patch
      + upstream/905551-oauthbearer-refresh.patch
  [ Antonio Radici ]
  * New release to include the patch above.

applied/ubuntu/cosmic-proposed 2018-08-07 16:38:10 UTC 2018-08-07
Import patches-applied version 1.10.1-2 to applied/debian/sid

Author: Antonio Radici
Author Date: 2018-08-07 08:31:52 UTC

Import patches-applied version 1.10.1-2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: efa239c2ee939c1456698d0db419ec2bc3a3f805
Unapplied parent: 1f1e020c77b058218886999951156357d76c7095

New changelog entries:
  [ Jonathan Nieder ]
  * debian/patches:
    + added upstream patches for OAUTHBEARER support by Brandon Long
      (Closes: #905551).
      + upstream/905551-oauthbearer-imap.patch
      + upstream/905551-oauthbearer-smtp.patch
      + upstream/905551-oauthbearer-refresh.patch
  [ Antonio Radici ]
  * New release to include the patch above.

ubuntu/disco 2018-08-07 16:38:10 UTC 2018-08-07
Import patches-unapplied version 1.10.1-2 to debian/sid

Author: Antonio Radici
Author Date: 2018-08-07 08:31:52 UTC

Import patches-unapplied version 1.10.1-2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 8541761971d9561f45ab28a105c062ce50cf0e01

New changelog entries:
  [ Jonathan Nieder ]
  * debian/patches:
    + added upstream patches for OAUTHBEARER support by Brandon Long
      (Closes: #905551).
      + upstream/905551-oauthbearer-imap.patch
      + upstream/905551-oauthbearer-smtp.patch
      + upstream/905551-oauthbearer-refresh.patch
  [ Antonio Radici ]
  * New release to include the patch above.

ubuntu/cosmic 2018-08-07 16:38:10 UTC 2018-08-07
Import patches-unapplied version 1.10.1-2 to debian/sid

Author: Antonio Radici
Author Date: 2018-08-07 08:31:52 UTC

Import patches-unapplied version 1.10.1-2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 8541761971d9561f45ab28a105c062ce50cf0e01

New changelog entries:
  [ Jonathan Nieder ]
  * debian/patches:
    + added upstream patches for OAUTHBEARER support by Brandon Long
      (Closes: #905551).
      + upstream/905551-oauthbearer-imap.patch
      + upstream/905551-oauthbearer-smtp.patch
      + upstream/905551-oauthbearer-refresh.patch
  [ Antonio Radici ]
  * New release to include the patch above.

ubuntu/cosmic-proposed 2018-08-07 16:38:10 UTC 2018-08-07
Import patches-unapplied version 1.10.1-2 to debian/sid

Author: Antonio Radici
Author Date: 2018-08-07 08:31:52 UTC

Import patches-unapplied version 1.10.1-2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 8541761971d9561f45ab28a105c062ce50cf0e01

New changelog entries:
  [ Jonathan Nieder ]
  * debian/patches:
    + added upstream patches for OAUTHBEARER support by Brandon Long
      (Closes: #905551).
      + upstream/905551-oauthbearer-imap.patch
      + upstream/905551-oauthbearer-smtp.patch
      + upstream/905551-oauthbearer-refresh.patch
  [ Antonio Radici ]
  * New release to include the patch above.

ubuntu/bionic-updates 2018-07-23 13:33:16 UTC 2018-07-23
Import patches-unapplied version 1.9.4-3ubuntu0.1 to ubuntu/bionic-security

Author: Leonidas S. Barbosa
Author Date: 2018-07-19 16:32:26 UTC

Import patches-unapplied version 1.9.4-3ubuntu0.1 to ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: ae5d9ca1495c9b3f2420f51e13f8f41c8bf8c0b5

New changelog entries:
  * SECURITY UPDATE: Mishandles a NO response without a msg
    - debian/patches/ubuntu/mutt-CVE-2018-14349.patch: fix in
      imap/command.c.
    - CVE-2018-14349
  * SECURITY UPDATE: Stack-based buffer overflow
    - debian/patches/ubuntu/mutt-CVE-2018-14350-CVE-2018-14358.patch:
      fix in imap/message.c.
    - CVE-2018-14350
    - CVE-2018-14358
  * SECURITY UPDATE: Mishandles a long IMAP status
    - debian/patches/ubuntu/mutt-CVE-2018-14351.patch: fix in
      imap/command.c.
    - CVE-2018-14351
  * SECURITY UPDATE: Integer underflow and stack-based buffer overflow
    - debian/patches/ubuntu/mutt-CVE-2018-14352-CVE-2018-14353.patch:
      fix in imap/util.c.
    - CVE-2018-14352
    - CVE-2018-14353
  * SECURITY UPDATE: Remote arbitrary code execution
    - debian/patches/ubuntu/mutt-CVE-2018-14354-CVE-2018-14357.patch:
      fix in imap/command.c, imap/imap.c, imap/imap_private.h, imap/util.c.
    - CVE-2018-14354
    - CVE-2018-14357
  * SECURITY UPDATE: Directory traversal
    - debian/patches/ubuntu/mutt-CVE-2018-14355.patch: fix in
      imap/util.c.
    - CVE-2018-14355
  * SECURITY UPDATE: Mishandles a zero-lenght UID
    - debian/patches/ubuntu/mutt-CVE-2018-14356.patch: fix in
      pop.c.
    - CVE-2018-14356
  * SECURITY UPDATE: Buffer overflow
    - debian/patches/ubuntu/mutt-CVE-2018-14359.patch: fix in
      base64.c, imap/auth_cram.c, imap/auth_gss.c, protos.h.
    - CVE-2018-14359
  * SECURITY UPDATE: Unsafe character interactions
    - debian/patches/ubuntu/mutt-CVE-2018-14362.patch: fix in
      pop.c.
    - CVE-2018-14362

applied/ubuntu/bionic-security 2018-07-23 13:33:16 UTC 2018-07-23
Import patches-applied version 1.9.4-3ubuntu0.1 to applied/ubuntu/bionic-secu...

Author: Leonidas S. Barbosa
Author Date: 2018-07-19 16:32:26 UTC

Import patches-applied version 1.9.4-3ubuntu0.1 to applied/ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 4b60acd384b9c466e8e88ea3cc8ee07a32807d99
Unapplied parent: 214a1233ddafb501cd8281d24e67402031846ef0

New changelog entries:
  * SECURITY UPDATE: Mishandles a NO response without a msg
    - debian/patches/ubuntu/mutt-CVE-2018-14349.patch: fix in
      imap/command.c.
    - CVE-2018-14349
  * SECURITY UPDATE: Stack-based buffer overflow
    - debian/patches/ubuntu/mutt-CVE-2018-14350-CVE-2018-14358.patch:
      fix in imap/message.c.
    - CVE-2018-14350
    - CVE-2018-14358
  * SECURITY UPDATE: Mishandles a long IMAP status
    - debian/patches/ubuntu/mutt-CVE-2018-14351.patch: fix in
      imap/command.c.
    - CVE-2018-14351
  * SECURITY UPDATE: Integer underflow and stack-based buffer overflow
    - debian/patches/ubuntu/mutt-CVE-2018-14352-CVE-2018-14353.patch:
      fix in imap/util.c.
    - CVE-2018-14352
    - CVE-2018-14353
  * SECURITY UPDATE: Remote arbitrary code execution
    - debian/patches/ubuntu/mutt-CVE-2018-14354-CVE-2018-14357.patch:
      fix in imap/command.c, imap/imap.c, imap/imap_private.h, imap/util.c.
    - CVE-2018-14354
    - CVE-2018-14357
  * SECURITY UPDATE: Directory traversal
    - debian/patches/ubuntu/mutt-CVE-2018-14355.patch: fix in
      imap/util.c.
    - CVE-2018-14355
  * SECURITY UPDATE: Mishandles a zero-lenght UID
    - debian/patches/ubuntu/mutt-CVE-2018-14356.patch: fix in
      pop.c.
    - CVE-2018-14356
  * SECURITY UPDATE: Buffer overflow
    - debian/patches/ubuntu/mutt-CVE-2018-14359.patch: fix in
      base64.c, imap/auth_cram.c, imap/auth_gss.c, protos.h.
    - CVE-2018-14359
  * SECURITY UPDATE: Unsafe character interactions
    - debian/patches/ubuntu/mutt-CVE-2018-14362.patch: fix in
      pop.c.
    - CVE-2018-14362

ubuntu/bionic-security 2018-07-23 13:33:16 UTC 2018-07-23
Import patches-unapplied version 1.9.4-3ubuntu0.1 to ubuntu/bionic-security

Author: Leonidas S. Barbosa
Author Date: 2018-07-19 16:32:26 UTC

Import patches-unapplied version 1.9.4-3ubuntu0.1 to ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: ae5d9ca1495c9b3f2420f51e13f8f41c8bf8c0b5

New changelog entries:
  * SECURITY UPDATE: Mishandles a NO response without a msg
    - debian/patches/ubuntu/mutt-CVE-2018-14349.patch: fix in
      imap/command.c.
    - CVE-2018-14349
  * SECURITY UPDATE: Stack-based buffer overflow
    - debian/patches/ubuntu/mutt-CVE-2018-14350-CVE-2018-14358.patch:
      fix in imap/message.c.
    - CVE-2018-14350
    - CVE-2018-14358
  * SECURITY UPDATE: Mishandles a long IMAP status
    - debian/patches/ubuntu/mutt-CVE-2018-14351.patch: fix in
      imap/command.c.
    - CVE-2018-14351
  * SECURITY UPDATE: Integer underflow and stack-based buffer overflow
    - debian/patches/ubuntu/mutt-CVE-2018-14352-CVE-2018-14353.patch:
      fix in imap/util.c.
    - CVE-2018-14352
    - CVE-2018-14353
  * SECURITY UPDATE: Remote arbitrary code execution
    - debian/patches/ubuntu/mutt-CVE-2018-14354-CVE-2018-14357.patch:
      fix in imap/command.c, imap/imap.c, imap/imap_private.h, imap/util.c.
    - CVE-2018-14354
    - CVE-2018-14357
  * SECURITY UPDATE: Directory traversal
    - debian/patches/ubuntu/mutt-CVE-2018-14355.patch: fix in
      imap/util.c.
    - CVE-2018-14355
  * SECURITY UPDATE: Mishandles a zero-lenght UID
    - debian/patches/ubuntu/mutt-CVE-2018-14356.patch: fix in
      pop.c.
    - CVE-2018-14356
  * SECURITY UPDATE: Buffer overflow
    - debian/patches/ubuntu/mutt-CVE-2018-14359.patch: fix in
      base64.c, imap/auth_cram.c, imap/auth_gss.c, protos.h.
    - CVE-2018-14359
  * SECURITY UPDATE: Unsafe character interactions
    - debian/patches/ubuntu/mutt-CVE-2018-14362.patch: fix in
      pop.c.
    - CVE-2018-14362

ubuntu/trusty-devel 2018-07-23 13:33:16 UTC 2018-07-23
Import patches-unapplied version 1.5.21-6.4ubuntu2.2 to ubuntu/trusty-security

Author: Leonidas S. Barbosa
Author Date: 2018-07-19 12:35:37 UTC

Import patches-unapplied version 1.5.21-6.4ubuntu2.2 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 827210946dea5b48d261ff9439523c952135e164

New changelog entries:
  * SECURITY UPDATE: Mishandles a NO response without a msg
    - debian/patches/ubuntu/mutt-CVE-2018-14349.patch: fix in
      imap/command.c.
    - CVE-2018-14349
  * SECURITY UPDATE: Stack-based buffer overflow
    - debian/patches/ubuntu/mutt-CVE-2018-14350-CVE-2018-14358.patch:
      fix in imap/message.c.
    - CVE-2018-14350
    - CVE-2018-14358
  * SECURITY UPDATE: Mishandles a long IMAP status
    - debian/patches/ubuntu/mutt-CVE-2018-14351.patch: fix in
      imap/command.c.
    - CVE-2018-14351
  * SECURITY UPDATE: Integer underflow and stack-based buffer overflow
    - debian/patches/ubuntu/mutt-CVE-2018-14352-CVE-2018-14353.patch:
      fix in imap/util.c.
    - CVE-2018-14352
    - CVE-2018-14353
  * SECURITY UPDATE: Remote arbitrary code execution
    - debian/patches/ubuntu/mutt-CVE-2018-14354-CVE-2018-14357.patch:
      fix in imap/command.c, imap/imap.c, imap/imap_private.h, imap/util.c.
    - CVE-2018-14354
    - CVE-2018-14357
  * SECURITY UPDATE: Directory traversal
    - debian/patches/ubuntu/mutt-CVE-2018-14355.patch: fix in
      imap/util.c.
    - CVE-2018-14355
  * SECURITY UPDATE: Mishandles a zero-lenght UID
    - debian/patches/ubuntu/mutt-CVE-2018-14356.patch: fix in
      pop.c.
    - CVE-2018-14356
  * SECURITY UPDATE: Buffer overflow
    - debian/patches/ubuntu/mutt-CVE-2018-14359.patch: fix in
      base64.c, imap/auth_cram.c, imap/auth_gss.c, protos.h.
    - CVE-2018-14359
  * SECURITY UPDATE: Unsafe character interactions
    - debian/patches/ubuntu/mutt-CVE-2018-14362.patch: fix in
      pop.c.
    - CVE-2018-14362

applied/ubuntu/bionic-devel 2018-07-23 13:33:16 UTC 2018-07-23
Import patches-applied version 1.9.4-3ubuntu0.1 to applied/ubuntu/bionic-secu...

Author: Leonidas S. Barbosa
Author Date: 2018-07-19 16:32:26 UTC

Import patches-applied version 1.9.4-3ubuntu0.1 to applied/ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 4b60acd384b9c466e8e88ea3cc8ee07a32807d99
Unapplied parent: 214a1233ddafb501cd8281d24e67402031846ef0

New changelog entries:
  * SECURITY UPDATE: Mishandles a NO response without a msg
    - debian/patches/ubuntu/mutt-CVE-2018-14349.patch: fix in
      imap/command.c.
    - CVE-2018-14349
  * SECURITY UPDATE: Stack-based buffer overflow
    - debian/patches/ubuntu/mutt-CVE-2018-14350-CVE-2018-14358.patch:
      fix in imap/message.c.
    - CVE-2018-14350
    - CVE-2018-14358
  * SECURITY UPDATE: Mishandles a long IMAP status
    - debian/patches/ubuntu/mutt-CVE-2018-14351.patch: fix in
      imap/command.c.
    - CVE-2018-14351
  * SECURITY UPDATE: Integer underflow and stack-based buffer overflow
    - debian/patches/ubuntu/mutt-CVE-2018-14352-CVE-2018-14353.patch:
      fix in imap/util.c.
    - CVE-2018-14352
    - CVE-2018-14353
  * SECURITY UPDATE: Remote arbitrary code execution
    - debian/patches/ubuntu/mutt-CVE-2018-14354-CVE-2018-14357.patch:
      fix in imap/command.c, imap/imap.c, imap/imap_private.h, imap/util.c.
    - CVE-2018-14354
    - CVE-2018-14357
  * SECURITY UPDATE: Directory traversal
    - debian/patches/ubuntu/mutt-CVE-2018-14355.patch: fix in
      imap/util.c.
    - CVE-2018-14355
  * SECURITY UPDATE: Mishandles a zero-lenght UID
    - debian/patches/ubuntu/mutt-CVE-2018-14356.patch: fix in
      pop.c.
    - CVE-2018-14356
  * SECURITY UPDATE: Buffer overflow
    - debian/patches/ubuntu/mutt-CVE-2018-14359.patch: fix in
      base64.c, imap/auth_cram.c, imap/auth_gss.c, protos.h.
    - CVE-2018-14359
  * SECURITY UPDATE: Unsafe character interactions
    - debian/patches/ubuntu/mutt-CVE-2018-14362.patch: fix in
      pop.c.
    - CVE-2018-14362

applied/ubuntu/trusty-updates 2018-07-23 13:33:16 UTC 2018-07-23
Import patches-applied version 1.5.21-6.4ubuntu2.2 to applied/ubuntu/trusty-s...

Author: Leonidas S. Barbosa
Author Date: 2018-07-19 12:35:37 UTC

Import patches-applied version 1.5.21-6.4ubuntu2.2 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 7183f0863955b54e12b4c39c406fd7bc955d72e5
Unapplied parent: 28b5796736e27441ccfff2006c3247ea7be9fa9b

New changelog entries:
  * SECURITY UPDATE: Mishandles a NO response without a msg
    - debian/patches/ubuntu/mutt-CVE-2018-14349.patch: fix in
      imap/command.c.
    - CVE-2018-14349
  * SECURITY UPDATE: Stack-based buffer overflow
    - debian/patches/ubuntu/mutt-CVE-2018-14350-CVE-2018-14358.patch:
      fix in imap/message.c.
    - CVE-2018-14350
    - CVE-2018-14358
  * SECURITY UPDATE: Mishandles a long IMAP status
    - debian/patches/ubuntu/mutt-CVE-2018-14351.patch: fix in
      imap/command.c.
    - CVE-2018-14351
  * SECURITY UPDATE: Integer underflow and stack-based buffer overflow
    - debian/patches/ubuntu/mutt-CVE-2018-14352-CVE-2018-14353.patch:
      fix in imap/util.c.
    - CVE-2018-14352
    - CVE-2018-14353
  * SECURITY UPDATE: Remote arbitrary code execution
    - debian/patches/ubuntu/mutt-CVE-2018-14354-CVE-2018-14357.patch:
      fix in imap/command.c, imap/imap.c, imap/imap_private.h, imap/util.c.
    - CVE-2018-14354
    - CVE-2018-14357
  * SECURITY UPDATE: Directory traversal
    - debian/patches/ubuntu/mutt-CVE-2018-14355.patch: fix in
      imap/util.c.
    - CVE-2018-14355
  * SECURITY UPDATE: Mishandles a zero-lenght UID
    - debian/patches/ubuntu/mutt-CVE-2018-14356.patch: fix in
      pop.c.
    - CVE-2018-14356
  * SECURITY UPDATE: Buffer overflow
    - debian/patches/ubuntu/mutt-CVE-2018-14359.patch: fix in
      base64.c, imap/auth_cram.c, imap/auth_gss.c, protos.h.
    - CVE-2018-14359
  * SECURITY UPDATE: Unsafe character interactions
    - debian/patches/ubuntu/mutt-CVE-2018-14362.patch: fix in
      pop.c.
    - CVE-2018-14362

ubuntu/bionic-devel 2018-07-23 13:33:16 UTC 2018-07-23
Import patches-unapplied version 1.9.4-3ubuntu0.1 to ubuntu/bionic-security

Author: Leonidas S. Barbosa
Author Date: 2018-07-19 16:32:26 UTC

Import patches-unapplied version 1.9.4-3ubuntu0.1 to ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: ae5d9ca1495c9b3f2420f51e13f8f41c8bf8c0b5

New changelog entries:
  * SECURITY UPDATE: Mishandles a NO response without a msg
    - debian/patches/ubuntu/mutt-CVE-2018-14349.patch: fix in
      imap/command.c.
    - CVE-2018-14349
  * SECURITY UPDATE: Stack-based buffer overflow
    - debian/patches/ubuntu/mutt-CVE-2018-14350-CVE-2018-14358.patch:
      fix in imap/message.c.
    - CVE-2018-14350
    - CVE-2018-14358
  * SECURITY UPDATE: Mishandles a long IMAP status
    - debian/patches/ubuntu/mutt-CVE-2018-14351.patch: fix in
      imap/command.c.
    - CVE-2018-14351
  * SECURITY UPDATE: Integer underflow and stack-based buffer overflow
    - debian/patches/ubuntu/mutt-CVE-2018-14352-CVE-2018-14353.patch:
      fix in imap/util.c.
    - CVE-2018-14352
    - CVE-2018-14353
  * SECURITY UPDATE: Remote arbitrary code execution
    - debian/patches/ubuntu/mutt-CVE-2018-14354-CVE-2018-14357.patch:
      fix in imap/command.c, imap/imap.c, imap/imap_private.h, imap/util.c.
    - CVE-2018-14354
    - CVE-2018-14357
  * SECURITY UPDATE: Directory traversal
    - debian/patches/ubuntu/mutt-CVE-2018-14355.patch: fix in
      imap/util.c.
    - CVE-2018-14355
  * SECURITY UPDATE: Mishandles a zero-lenght UID
    - debian/patches/ubuntu/mutt-CVE-2018-14356.patch: fix in
      pop.c.
    - CVE-2018-14356
  * SECURITY UPDATE: Buffer overflow
    - debian/patches/ubuntu/mutt-CVE-2018-14359.patch: fix in
      base64.c, imap/auth_cram.c, imap/auth_gss.c, protos.h.
    - CVE-2018-14359
  * SECURITY UPDATE: Unsafe character interactions
    - debian/patches/ubuntu/mutt-CVE-2018-14362.patch: fix in
      pop.c.
    - CVE-2018-14362

applied/ubuntu/trusty-security 2018-07-23 13:33:16 UTC 2018-07-23
Import patches-applied version 1.5.21-6.4ubuntu2.2 to applied/ubuntu/trusty-s...

Author: Leonidas S. Barbosa
Author Date: 2018-07-19 12:35:37 UTC

Import patches-applied version 1.5.21-6.4ubuntu2.2 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 7183f0863955b54e12b4c39c406fd7bc955d72e5
Unapplied parent: 28b5796736e27441ccfff2006c3247ea7be9fa9b

New changelog entries:
  * SECURITY UPDATE: Mishandles a NO response without a msg
    - debian/patches/ubuntu/mutt-CVE-2018-14349.patch: fix in
      imap/command.c.
    - CVE-2018-14349
  * SECURITY UPDATE: Stack-based buffer overflow
    - debian/patches/ubuntu/mutt-CVE-2018-14350-CVE-2018-14358.patch:
      fix in imap/message.c.
    - CVE-2018-14350
    - CVE-2018-14358
  * SECURITY UPDATE: Mishandles a long IMAP status
    - debian/patches/ubuntu/mutt-CVE-2018-14351.patch: fix in
      imap/command.c.
    - CVE-2018-14351
  * SECURITY UPDATE: Integer underflow and stack-based buffer overflow
    - debian/patches/ubuntu/mutt-CVE-2018-14352-CVE-2018-14353.patch:
      fix in imap/util.c.
    - CVE-2018-14352
    - CVE-2018-14353
  * SECURITY UPDATE: Remote arbitrary code execution
    - debian/patches/ubuntu/mutt-CVE-2018-14354-CVE-2018-14357.patch:
      fix in imap/command.c, imap/imap.c, imap/imap_private.h, imap/util.c.
    - CVE-2018-14354
    - CVE-2018-14357
  * SECURITY UPDATE: Directory traversal
    - debian/patches/ubuntu/mutt-CVE-2018-14355.patch: fix in
      imap/util.c.
    - CVE-2018-14355
  * SECURITY UPDATE: Mishandles a zero-lenght UID
    - debian/patches/ubuntu/mutt-CVE-2018-14356.patch: fix in
      pop.c.
    - CVE-2018-14356
  * SECURITY UPDATE: Buffer overflow
    - debian/patches/ubuntu/mutt-CVE-2018-14359.patch: fix in
      base64.c, imap/auth_cram.c, imap/auth_gss.c, protos.h.
    - CVE-2018-14359
  * SECURITY UPDATE: Unsafe character interactions
    - debian/patches/ubuntu/mutt-CVE-2018-14362.patch: fix in
      pop.c.
    - CVE-2018-14362

ubuntu/trusty-updates 2018-07-23 13:33:16 UTC 2018-07-23
Import patches-unapplied version 1.5.21-6.4ubuntu2.2 to ubuntu/trusty-security

Author: Leonidas S. Barbosa
Author Date: 2018-07-19 12:35:37 UTC

Import patches-unapplied version 1.5.21-6.4ubuntu2.2 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 827210946dea5b48d261ff9439523c952135e164

New changelog entries:
  * SECURITY UPDATE: Mishandles a NO response without a msg
    - debian/patches/ubuntu/mutt-CVE-2018-14349.patch: fix in
      imap/command.c.
    - CVE-2018-14349
  * SECURITY UPDATE: Stack-based buffer overflow
    - debian/patches/ubuntu/mutt-CVE-2018-14350-CVE-2018-14358.patch:
      fix in imap/message.c.
    - CVE-2018-14350
    - CVE-2018-14358
  * SECURITY UPDATE: Mishandles a long IMAP status
    - debian/patches/ubuntu/mutt-CVE-2018-14351.patch: fix in
      imap/command.c.
    - CVE-2018-14351
  * SECURITY UPDATE: Integer underflow and stack-based buffer overflow
    - debian/patches/ubuntu/mutt-CVE-2018-14352-CVE-2018-14353.patch:
      fix in imap/util.c.
    - CVE-2018-14352
    - CVE-2018-14353
  * SECURITY UPDATE: Remote arbitrary code execution
    - debian/patches/ubuntu/mutt-CVE-2018-14354-CVE-2018-14357.patch:
      fix in imap/command.c, imap/imap.c, imap/imap_private.h, imap/util.c.
    - CVE-2018-14354
    - CVE-2018-14357
  * SECURITY UPDATE: Directory traversal
    - debian/patches/ubuntu/mutt-CVE-2018-14355.patch: fix in
      imap/util.c.
    - CVE-2018-14355
  * SECURITY UPDATE: Mishandles a zero-lenght UID
    - debian/patches/ubuntu/mutt-CVE-2018-14356.patch: fix in
      pop.c.
    - CVE-2018-14356
  * SECURITY UPDATE: Buffer overflow
    - debian/patches/ubuntu/mutt-CVE-2018-14359.patch: fix in
      base64.c, imap/auth_cram.c, imap/auth_gss.c, protos.h.
    - CVE-2018-14359
  * SECURITY UPDATE: Unsafe character interactions
    - debian/patches/ubuntu/mutt-CVE-2018-14362.patch: fix in
      pop.c.
    - CVE-2018-14362

applied/ubuntu/trusty-devel 2018-07-23 13:33:16 UTC 2018-07-23
Import patches-applied version 1.5.21-6.4ubuntu2.2 to applied/ubuntu/trusty-s...

Author: Leonidas S. Barbosa
Author Date: 2018-07-19 12:35:37 UTC

Import patches-applied version 1.5.21-6.4ubuntu2.2 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 7183f0863955b54e12b4c39c406fd7bc955d72e5
Unapplied parent: 28b5796736e27441ccfff2006c3247ea7be9fa9b

New changelog entries:
  * SECURITY UPDATE: Mishandles a NO response without a msg
    - debian/patches/ubuntu/mutt-CVE-2018-14349.patch: fix in
      imap/command.c.
    - CVE-2018-14349
  * SECURITY UPDATE: Stack-based buffer overflow
    - debian/patches/ubuntu/mutt-CVE-2018-14350-CVE-2018-14358.patch:
      fix in imap/message.c.
    - CVE-2018-14350
    - CVE-2018-14358
  * SECURITY UPDATE: Mishandles a long IMAP status
    - debian/patches/ubuntu/mutt-CVE-2018-14351.patch: fix in
      imap/command.c.
    - CVE-2018-14351
  * SECURITY UPDATE: Integer underflow and stack-based buffer overflow
    - debian/patches/ubuntu/mutt-CVE-2018-14352-CVE-2018-14353.patch:
      fix in imap/util.c.
    - CVE-2018-14352
    - CVE-2018-14353
  * SECURITY UPDATE: Remote arbitrary code execution
    - debian/patches/ubuntu/mutt-CVE-2018-14354-CVE-2018-14357.patch:
      fix in imap/command.c, imap/imap.c, imap/imap_private.h, imap/util.c.
    - CVE-2018-14354
    - CVE-2018-14357
  * SECURITY UPDATE: Directory traversal
    - debian/patches/ubuntu/mutt-CVE-2018-14355.patch: fix in
      imap/util.c.
    - CVE-2018-14355
  * SECURITY UPDATE: Mishandles a zero-lenght UID
    - debian/patches/ubuntu/mutt-CVE-2018-14356.patch: fix in
      pop.c.
    - CVE-2018-14356
  * SECURITY UPDATE: Buffer overflow
    - debian/patches/ubuntu/mutt-CVE-2018-14359.patch: fix in
      base64.c, imap/auth_cram.c, imap/auth_gss.c, protos.h.
    - CVE-2018-14359
  * SECURITY UPDATE: Unsafe character interactions
    - debian/patches/ubuntu/mutt-CVE-2018-14362.patch: fix in
      pop.c.
    - CVE-2018-14362

applied/ubuntu/bionic-updates 2018-07-23 13:33:16 UTC 2018-07-23
Import patches-applied version 1.9.4-3ubuntu0.1 to applied/ubuntu/bionic-secu...

Author: Leonidas S. Barbosa
Author Date: 2018-07-19 16:32:26 UTC

Import patches-applied version 1.9.4-3ubuntu0.1 to applied/ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 4b60acd384b9c466e8e88ea3cc8ee07a32807d99
Unapplied parent: 214a1233ddafb501cd8281d24e67402031846ef0

New changelog entries:
  * SECURITY UPDATE: Mishandles a NO response without a msg
    - debian/patches/ubuntu/mutt-CVE-2018-14349.patch: fix in
      imap/command.c.
    - CVE-2018-14349
  * SECURITY UPDATE: Stack-based buffer overflow
    - debian/patches/ubuntu/mutt-CVE-2018-14350-CVE-2018-14358.patch:
      fix in imap/message.c.
    - CVE-2018-14350
    - CVE-2018-14358
  * SECURITY UPDATE: Mishandles a long IMAP status
    - debian/patches/ubuntu/mutt-CVE-2018-14351.patch: fix in
      imap/command.c.
    - CVE-2018-14351
  * SECURITY UPDATE: Integer underflow and stack-based buffer overflow
    - debian/patches/ubuntu/mutt-CVE-2018-14352-CVE-2018-14353.patch:
      fix in imap/util.c.
    - CVE-2018-14352
    - CVE-2018-14353
  * SECURITY UPDATE: Remote arbitrary code execution
    - debian/patches/ubuntu/mutt-CVE-2018-14354-CVE-2018-14357.patch:
      fix in imap/command.c, imap/imap.c, imap/imap_private.h, imap/util.c.
    - CVE-2018-14354
    - CVE-2018-14357
  * SECURITY UPDATE: Directory traversal
    - debian/patches/ubuntu/mutt-CVE-2018-14355.patch: fix in
      imap/util.c.
    - CVE-2018-14355
  * SECURITY UPDATE: Mishandles a zero-lenght UID
    - debian/patches/ubuntu/mutt-CVE-2018-14356.patch: fix in
      pop.c.
    - CVE-2018-14356
  * SECURITY UPDATE: Buffer overflow
    - debian/patches/ubuntu/mutt-CVE-2018-14359.patch: fix in
      base64.c, imap/auth_cram.c, imap/auth_gss.c, protos.h.
    - CVE-2018-14359
  * SECURITY UPDATE: Unsafe character interactions
    - debian/patches/ubuntu/mutt-CVE-2018-14362.patch: fix in
      pop.c.
    - CVE-2018-14362

ubuntu/trusty-security 2018-07-23 13:33:16 UTC 2018-07-23
Import patches-unapplied version 1.5.21-6.4ubuntu2.2 to ubuntu/trusty-security

Author: Leonidas S. Barbosa
Author Date: 2018-07-19 12:35:37 UTC

Import patches-unapplied version 1.5.21-6.4ubuntu2.2 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 827210946dea5b48d261ff9439523c952135e164

New changelog entries:
  * SECURITY UPDATE: Mishandles a NO response without a msg
    - debian/patches/ubuntu/mutt-CVE-2018-14349.patch: fix in
      imap/command.c.
    - CVE-2018-14349
  * SECURITY UPDATE: Stack-based buffer overflow
    - debian/patches/ubuntu/mutt-CVE-2018-14350-CVE-2018-14358.patch:
      fix in imap/message.c.
    - CVE-2018-14350
    - CVE-2018-14358
  * SECURITY UPDATE: Mishandles a long IMAP status
    - debian/patches/ubuntu/mutt-CVE-2018-14351.patch: fix in
      imap/command.c.
    - CVE-2018-14351
  * SECURITY UPDATE: Integer underflow and stack-based buffer overflow
    - debian/patches/ubuntu/mutt-CVE-2018-14352-CVE-2018-14353.patch:
      fix in imap/util.c.
    - CVE-2018-14352
    - CVE-2018-14353
  * SECURITY UPDATE: Remote arbitrary code execution
    - debian/patches/ubuntu/mutt-CVE-2018-14354-CVE-2018-14357.patch:
      fix in imap/command.c, imap/imap.c, imap/imap_private.h, imap/util.c.
    - CVE-2018-14354
    - CVE-2018-14357
  * SECURITY UPDATE: Directory traversal
    - debian/patches/ubuntu/mutt-CVE-2018-14355.patch: fix in
      imap/util.c.
    - CVE-2018-14355
  * SECURITY UPDATE: Mishandles a zero-lenght UID
    - debian/patches/ubuntu/mutt-CVE-2018-14356.patch: fix in
      pop.c.
    - CVE-2018-14356
  * SECURITY UPDATE: Buffer overflow
    - debian/patches/ubuntu/mutt-CVE-2018-14359.patch: fix in
      base64.c, imap/auth_cram.c, imap/auth_gss.c, protos.h.
    - CVE-2018-14359
  * SECURITY UPDATE: Unsafe character interactions
    - debian/patches/ubuntu/mutt-CVE-2018-14362.patch: fix in
      pop.c.
    - CVE-2018-14362

importer/ubuntu/pristine-tar 2018-04-03 07:54:25 UTC 2018-04-03
pristine-tar data for mutt_1.9.4.orig.tar.gz

Author: Ubuntu Git Importer
Author Date: 2018-04-03 07:54:25 UTC

pristine-tar data for mutt_1.9.4.orig.tar.gz

importer/debian/pristine-tar 2018-04-03 07:00:59 UTC 2018-04-03
pristine-tar data for mutt_1.9.4.orig.tar.gz

Author: Ubuntu Git Importer
Author Date: 2018-04-03 07:00:59 UTC

pristine-tar data for mutt_1.9.4.orig.tar.gz

applied/ubuntu/bionic-proposed 2018-03-14 04:33:33 UTC 2018-03-14
Import patches-applied version 1.9.4-3 to applied/debian/sid

Author: Antonio Radici
Author Date: 2018-03-13 21:12:25 UTC

Import patches-applied version 1.9.4-3 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: c99a27decbdd9aa34d53007b2e7f6e524e834544
Unapplied parent: 3a0f9480ea58d0eff3eb5583769972effe8122f1

New changelog entries:
  * debian/patches:
    + added upstream/886104-abort_noattach.patch which replaces the patch in
      the previous version

ubuntu/bionic-proposed 2018-03-14 04:33:33 UTC 2018-03-14
Import patches-unapplied version 1.9.4-3 to debian/sid

Author: Antonio Radici
Author Date: 2018-03-13 21:12:25 UTC

Import patches-unapplied version 1.9.4-3 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 03b925d1d82e863576d8cd57ce8c026dcbad091a

New changelog entries:
  * debian/patches:
    + added upstream/886104-abort_noattach.patch which replaces the patch in
      the previous version

applied/ubuntu/bionic 2018-03-14 04:33:33 UTC 2018-03-14
Import patches-applied version 1.9.4-3 to applied/debian/sid

Author: Antonio Radici
Author Date: 2018-03-13 21:12:25 UTC

Import patches-applied version 1.9.4-3 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: c99a27decbdd9aa34d53007b2e7f6e524e834544
Unapplied parent: 3a0f9480ea58d0eff3eb5583769972effe8122f1

New changelog entries:
  * debian/patches:
    + added upstream/886104-abort_noattach.patch which replaces the patch in
      the previous version

ubuntu/bionic 2018-03-14 04:33:33 UTC 2018-03-14
Import patches-unapplied version 1.9.4-3 to debian/sid

Author: Antonio Radici
Author Date: 2018-03-13 21:12:25 UTC

Import patches-unapplied version 1.9.4-3 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 03b925d1d82e863576d8cd57ce8c026dcbad091a

New changelog entries:
  * debian/patches:
    + added upstream/886104-abort_noattach.patch which replaces the patch in
      the previous version

ubuntu/artful 2017-07-26 11:18:33 UTC 2017-07-26
Import patches-unapplied version 1.8.3+neomutt20170609-2build1 to ubuntu/artf...

Author: Gianfranco Costamagna
Author Date: 2017-07-26 11:11:26 UTC

Import patches-unapplied version 1.8.3+neomutt20170609-2build1 to ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: 95ac24792fb0258cbf5d4a7ef3918e25730dea16

New changelog entries:
  * Rebuild against new libnotmuch5.

applied/ubuntu/artful-proposed 2017-07-26 11:18:33 UTC 2017-07-26
Import patches-applied version 1.8.3+neomutt20170609-2build1 to applied/ubunt...

Author: Gianfranco Costamagna
Author Date: 2017-07-26 11:11:26 UTC

Import patches-applied version 1.8.3+neomutt20170609-2build1 to applied/ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: 22c0e8a7a0360f9c1aa08163ead4448655d1814f
Unapplied parent: 795610377e5d476afa84ca427e585e838978bce0

New changelog entries:
  * Rebuild against new libnotmuch5.

applied/ubuntu/artful-devel 2017-07-26 11:18:33 UTC 2017-07-26
Import patches-applied version 1.8.3+neomutt20170609-2build1 to applied/ubunt...

Author: Gianfranco Costamagna
Author Date: 2017-07-26 11:11:26 UTC

Import patches-applied version 1.8.3+neomutt20170609-2build1 to applied/ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: 22c0e8a7a0360f9c1aa08163ead4448655d1814f
Unapplied parent: 795610377e5d476afa84ca427e585e838978bce0

New changelog entries:
  * Rebuild against new libnotmuch5.

ubuntu/artful-proposed 2017-07-26 11:18:33 UTC 2017-07-26
Import patches-unapplied version 1.8.3+neomutt20170609-2build1 to ubuntu/artf...

Author: Gianfranco Costamagna
Author Date: 2017-07-26 11:11:26 UTC

Import patches-unapplied version 1.8.3+neomutt20170609-2build1 to ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: 95ac24792fb0258cbf5d4a7ef3918e25730dea16

New changelog entries:
  * Rebuild against new libnotmuch5.

applied/ubuntu/artful 2017-07-26 11:18:33 UTC 2017-07-26
Import patches-applied version 1.8.3+neomutt20170609-2build1 to applied/ubunt...

Author: Gianfranco Costamagna
Author Date: 2017-07-26 11:11:26 UTC

Import patches-applied version 1.8.3+neomutt20170609-2build1 to applied/ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: 22c0e8a7a0360f9c1aa08163ead4448655d1814f
Unapplied parent: 795610377e5d476afa84ca427e585e838978bce0

New changelog entries:
  * Rebuild against new libnotmuch5.

ubuntu/artful-devel 2017-07-26 11:18:33 UTC 2017-07-26
Import patches-unapplied version 1.8.3+neomutt20170609-2build1 to ubuntu/artf...

Author: Gianfranco Costamagna
Author Date: 2017-07-26 11:11:26 UTC

Import patches-unapplied version 1.8.3+neomutt20170609-2build1 to ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: 95ac24792fb0258cbf5d4a7ef3918e25730dea16

New changelog entries:
  * Rebuild against new libnotmuch5.

ubuntu/zesty 2017-01-21 04:18:56 UTC 2017-01-21
Import patches-unapplied version 1.7.2-1 to debian/sid

Author: Antonio Radici
Author Date: 2017-01-20 21:47:49 UTC

Import patches-unapplied version 1.7.2-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 21ca636a9ad5182c6196fe0b1f2aa9ea03f23eed

New changelog entries:
  * New upstream Mutt release.
  * New upstream NeoMutt release, 2017-01-13.
  * debian/patches:
    + all patches refreshed.
    + upstream/gpgme-set-sender.patch removed because it is already upstream.

applied/ubuntu/zesty-proposed 2017-01-21 04:18:56 UTC 2017-01-21
Import patches-applied version 1.7.2-1 to applied/debian/sid

Author: Antonio Radici
Author Date: 2017-01-20 21:47:49 UTC

Import patches-applied version 1.7.2-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 4721d6fbdd576671cae9e0f9c0ada146720f8ec3
Unapplied parent: f46e6051d2510eb77182f21510a2ad573f651e4a

New changelog entries:
  * New upstream Mutt release.
  * New upstream NeoMutt release, 2017-01-13.
  * debian/patches:
    + all patches refreshed.
    + upstream/gpgme-set-sender.patch removed because it is already upstream.

ubuntu/zesty-devel 2017-01-21 04:18:56 UTC 2017-01-21
Import patches-unapplied version 1.7.2-1 to debian/sid

Author: Antonio Radici
Author Date: 2017-01-20 21:47:49 UTC

Import patches-unapplied version 1.7.2-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 21ca636a9ad5182c6196fe0b1f2aa9ea03f23eed

New changelog entries:
  * New upstream Mutt release.
  * New upstream NeoMutt release, 2017-01-13.
  * debian/patches:
    + all patches refreshed.
    + upstream/gpgme-set-sender.patch removed because it is already upstream.

ubuntu/zesty-proposed 2017-01-21 04:18:56 UTC 2017-01-21
Import patches-unapplied version 1.7.2-1 to debian/sid

Author: Antonio Radici
Author Date: 2017-01-20 21:47:49 UTC

Import patches-unapplied version 1.7.2-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 21ca636a9ad5182c6196fe0b1f2aa9ea03f23eed

New changelog entries:
  * New upstream Mutt release.
  * New upstream NeoMutt release, 2017-01-13.
  * debian/patches:
    + all patches refreshed.
    + upstream/gpgme-set-sender.patch removed because it is already upstream.

applied/ubuntu/zesty-devel 2017-01-21 04:18:56 UTC 2017-01-21
Import patches-applied version 1.7.2-1 to applied/debian/sid

Author: Antonio Radici
Author Date: 2017-01-20 21:47:49 UTC

Import patches-applied version 1.7.2-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 4721d6fbdd576671cae9e0f9c0ada146720f8ec3
Unapplied parent: f46e6051d2510eb77182f21510a2ad573f651e4a

New changelog entries:
  * New upstream Mutt release.
  * New upstream NeoMutt release, 2017-01-13.
  * debian/patches:
    + all patches refreshed.
    + upstream/gpgme-set-sender.patch removed because it is already upstream.

applied/ubuntu/zesty 2017-01-21 04:18:56 UTC 2017-01-21
Import patches-applied version 1.7.2-1 to applied/debian/sid

Author: Antonio Radici
Author Date: 2017-01-20 21:47:49 UTC

Import patches-applied version 1.7.2-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 4721d6fbdd576671cae9e0f9c0ada146720f8ec3
Unapplied parent: f46e6051d2510eb77182f21510a2ad573f651e4a

New changelog entries:
  * New upstream Mutt release.
  * New upstream NeoMutt release, 2017-01-13.
  * debian/patches:
    + all patches refreshed.
    + upstream/gpgme-set-sender.patch removed because it is already upstream.

applied/ubuntu/yakkety-devel 2016-08-24 04:23:13 UTC 2016-08-24
Import patches-applied version 1.6.2-3 to applied/debian/sid

Author: Antonio Radici
Author Date: 2016-08-23 20:48:35 UTC

Import patches-applied version 1.6.2-3 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: b6488a4e3bcb404ad9b5d8a0582d1c258cc747d2
Unapplied parent: 7e73b8c8f1381ea77777e952f3162a80dcb72876

New changelog entries:
  [ Faidon Liambotis ]
  * Pass --disable-fmemopen to ./configure. fmemopen has been the cause for
    some issues, such as reported crashes and incompatibility with torify.
    (Closes: #834408).
  [ Antonio Radici ]
  * New NeoMutt release, 2016-08-21.
    - Fixes data corruption in compressed folders. (Closes: #834818)
    - Reverts to the vanilla mutt keybindings. (Closes: #834448, #834500)
    - Hide the progress bar if it wasn't given a color. (Closes: #834450)
    - Drop neomutt-devel/*sidebar* patches, already included upstream.
    - Drop getrandom patch already included upstream.
    - Some patches, including sensible-browser, refreshed.
    - Slightly modified the AC_INIT in configure.ac so that the package builds.
  * debian/patches:
    + created neomutt-devel/restore-docfile-installation.patch to restore the
      installation of some docfiles dropped by neomutt.

ubuntu/yakkety-proposed 2016-08-24 04:23:13 UTC 2016-08-24
Import patches-unapplied version 1.6.2-3 to debian/sid

Author: Antonio Radici
Author Date: 2016-08-23 20:48:35 UTC

Import patches-unapplied version 1.6.2-3 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 735df685cf4fa3e1cee9a9385b3cc9044410357f

New changelog entries:
  [ Faidon Liambotis ]
  * Pass --disable-fmemopen to ./configure. fmemopen has been the cause for
    some issues, such as reported crashes and incompatibility with torify.
    (Closes: #834408).
  [ Antonio Radici ]
  * New NeoMutt release, 2016-08-21.
    - Fixes data corruption in compressed folders. (Closes: #834818)
    - Reverts to the vanilla mutt keybindings. (Closes: #834448, #834500)
    - Hide the progress bar if it wasn't given a color. (Closes: #834450)
    - Drop neomutt-devel/*sidebar* patches, already included upstream.
    - Drop getrandom patch already included upstream.
    - Some patches, including sensible-browser, refreshed.
    - Slightly modified the AC_INIT in configure.ac so that the package builds.
  * debian/patches:
    + created neomutt-devel/restore-docfile-installation.patch to restore the
      installation of some docfiles dropped by neomutt.

ubuntu/yakkety-devel 2016-08-24 04:23:13 UTC 2016-08-24
Import patches-unapplied version 1.6.2-3 to debian/sid

Author: Antonio Radici
Author Date: 2016-08-23 20:48:35 UTC

Import patches-unapplied version 1.6.2-3 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 735df685cf4fa3e1cee9a9385b3cc9044410357f

New changelog entries:
  [ Faidon Liambotis ]
  * Pass --disable-fmemopen to ./configure. fmemopen has been the cause for
    some issues, such as reported crashes and incompatibility with torify.
    (Closes: #834408).
  [ Antonio Radici ]
  * New NeoMutt release, 2016-08-21.
    - Fixes data corruption in compressed folders. (Closes: #834818)
    - Reverts to the vanilla mutt keybindings. (Closes: #834448, #834500)
    - Hide the progress bar if it wasn't given a color. (Closes: #834450)
    - Drop neomutt-devel/*sidebar* patches, already included upstream.
    - Drop getrandom patch already included upstream.
    - Some patches, including sensible-browser, refreshed.
    - Slightly modified the AC_INIT in configure.ac so that the package builds.
  * debian/patches:
    + created neomutt-devel/restore-docfile-installation.patch to restore the
      installation of some docfiles dropped by neomutt.

applied/ubuntu/yakkety-proposed 2016-08-24 04:23:13 UTC 2016-08-24
Import patches-applied version 1.6.2-3 to applied/debian/sid

Author: Antonio Radici
Author Date: 2016-08-23 20:48:35 UTC

Import patches-applied version 1.6.2-3 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: b6488a4e3bcb404ad9b5d8a0582d1c258cc747d2
Unapplied parent: 7e73b8c8f1381ea77777e952f3162a80dcb72876

New changelog entries:
  [ Faidon Liambotis ]
  * Pass --disable-fmemopen to ./configure. fmemopen has been the cause for
    some issues, such as reported crashes and incompatibility with torify.
    (Closes: #834408).
  [ Antonio Radici ]
  * New NeoMutt release, 2016-08-21.
    - Fixes data corruption in compressed folders. (Closes: #834818)
    - Reverts to the vanilla mutt keybindings. (Closes: #834448, #834500)
    - Hide the progress bar if it wasn't given a color. (Closes: #834450)
    - Drop neomutt-devel/*sidebar* patches, already included upstream.
    - Drop getrandom patch already included upstream.
    - Some patches, including sensible-browser, refreshed.
    - Slightly modified the AC_INIT in configure.ac so that the package builds.
  * debian/patches:
    + created neomutt-devel/restore-docfile-installation.patch to restore the
      installation of some docfiles dropped by neomutt.

applied/ubuntu/yakkety 2016-08-24 04:23:13 UTC 2016-08-24
Import patches-applied version 1.6.2-3 to applied/debian/sid

Author: Antonio Radici
Author Date: 2016-08-23 20:48:35 UTC

Import patches-applied version 1.6.2-3 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: b6488a4e3bcb404ad9b5d8a0582d1c258cc747d2
Unapplied parent: 7e73b8c8f1381ea77777e952f3162a80dcb72876

New changelog entries:
  [ Faidon Liambotis ]
  * Pass --disable-fmemopen to ./configure. fmemopen has been the cause for
    some issues, such as reported crashes and incompatibility with torify.
    (Closes: #834408).
  [ Antonio Radici ]
  * New NeoMutt release, 2016-08-21.
    - Fixes data corruption in compressed folders. (Closes: #834818)
    - Reverts to the vanilla mutt keybindings. (Closes: #834448, #834500)
    - Hide the progress bar if it wasn't given a color. (Closes: #834450)
    - Drop neomutt-devel/*sidebar* patches, already included upstream.
    - Drop getrandom patch already included upstream.
    - Some patches, including sensible-browser, refreshed.
    - Slightly modified the AC_INIT in configure.ac so that the package builds.
  * debian/patches:
    + created neomutt-devel/restore-docfile-installation.patch to restore the
      installation of some docfiles dropped by neomutt.

ubuntu/yakkety 2016-08-24 04:23:13 UTC 2016-08-24
Import patches-unapplied version 1.6.2-3 to debian/sid

Author: Antonio Radici
Author Date: 2016-08-23 20:48:35 UTC

Import patches-unapplied version 1.6.2-3 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 735df685cf4fa3e1cee9a9385b3cc9044410357f

New changelog entries:
  [ Faidon Liambotis ]
  * Pass --disable-fmemopen to ./configure. fmemopen has been the cause for
    some issues, such as reported crashes and incompatibility with torify.
    (Closes: #834408).
  [ Antonio Radici ]
  * New NeoMutt release, 2016-08-21.
    - Fixes data corruption in compressed folders. (Closes: #834818)
    - Reverts to the vanilla mutt keybindings. (Closes: #834448, #834500)
    - Hide the progress bar if it wasn't given a color. (Closes: #834450)
    - Drop neomutt-devel/*sidebar* patches, already included upstream.
    - Drop getrandom patch already included upstream.
    - Some patches, including sensible-browser, refreshed.
    - Slightly modified the AC_INIT in configure.ac so that the package builds.
  * debian/patches:
    + created neomutt-devel/restore-docfile-installation.patch to restore the
      installation of some docfiles dropped by neomutt.

debian/experimental 2016-07-10 04:10:51 UTC 2016-07-10
Import patches-unapplied version 1.6.1-2 to debian/experimental

Author: Faidon Liambotis
Author Date: 2016-07-08 21:05:49 UTC

Import patches-unapplied version 1.6.1-2 to debian/experimental

Imported using git-ubuntu import.

Changelog parent: 28469ebc76aee4423341e2c14914e5e67f78a552

New changelog entries:
  * Fold mutt-patched into mutt, as the line between the wo has became more
    blurry since its introduction. Upstream mutt has merged the sidebar and
    the Debian mutt binary package already carries a lot of feature patches.
    - Remove the mutt-patched binary from debian/control.
    - Add Breaks/Replaces: mutt-patched on the mutt binary package.
    - Remove mutt-patched rules from debian/rules.
    - Move multiple-fcc (the only remaining patch) under features/.
  * Similarly, fold mutt-kz, a binary from a different source package until
    now, into mutt. mutt-kz upstream has joined forces with NeoMutt, so this
    is now a matter of just passing --enable-notmuch to our ./configure.
  * Remove update-alternatives support for /usr/bin/mutt and associated
    manpages and docs. This only existed for the benefit of mutt-patched and
    mutt-kz and is thus moot now.
  * Update neomutt to a newer version, 20160611.
    - Enable *all* the neomutt patches now, not just a hand-picked selection.
    - Use the single patch, as the broken out patches conflict with each
      other.
    - Drop the compressed-folders, NNTP and path_max patches, as they are now
      part of neomutt.
    - Update sensible-browser and multiple-fcc patches to adjusted versions
      from the neomutt-upstream.
    - Adjust the package's description to mention some of neomutt's features.
  * Enable all hardening build flags. (Closes: #823295)
  * Remove README.Patches from /usr/share/doc. Including a unified diff in
    /usr/share/doc isn't very useful; the source package can always be used
    instead.
  * Remove mentions of gpg-2comp from gpg.rc and README.Debian and ship the
    resulting gpg.rc into /etc/Muttrc.d pristine, with the comments included.
  * Switch to tokyocabinet (from qdbm) in hurd-i386 as well, as it is nowadays
    available there too.
  * Lower Priority to optional (from standard), as this is currently the value
    in the archive, as overridden by ftp-masters.
  * Remove postinst code that handles migrations from pre-1.5.20-9 versions,
    as it's too old (even wheezy shipped with 1.5.21-6.2).
  * Remove preinst code that handles an obsolete conffile from pre-1.5.19-2
    versions, for the same reasons.
  * Remove Conflicts/Replaces mutt-utf8, it was last shipped with version
    1.5.5.1-20040105+1, released over 12 years ago.
  * Remove statically-linked-binary lintian override for mutt_dotlock, not the
    case anymore.
  * Remove quilt.mk and manual quilt invocations. Rely on the native 3.0
    (quilt) source package format instead for applying debian/patches.
  * Use dh_bugfiles instead of manual install invocations.
  * Migrate from our own -dbg package to the automatic -dbgsym package.
  * Migrate to dh, instead of our hand-crafted old-style debhelper d/rules.
  * Migrate to dh-autoreconf instead of autotools-dev.
  * Revamp debian/copyright: use copyright-format 1.0 (aka DEP5), update the
    list of copyright holders, add a debian/* stanza with all the past
    maintainers for the period they were maintainers etc.
  * Change Maintainer to the newly created pkg-mutt-maintainers list.
  * Add myself to Uploaders.

applied/debian/experimental 2016-07-10 04:10:51 UTC 2016-07-10
Import patches-applied version 1.6.1-2 to applied/debian/experimental

Author: Faidon Liambotis
Author Date: 2016-07-08 21:05:49 UTC

Import patches-applied version 1.6.1-2 to applied/debian/experimental

Imported using git-ubuntu import.

Changelog parent: 2afddd24eb5937079391c382ad30c34cad4564f1
Unapplied parent: 1b4068d994496854a9b9d6806c67b290dc58a630

New changelog entries:
  * Fold mutt-patched into mutt, as the line between the wo has became more
    blurry since its introduction. Upstream mutt has merged the sidebar and
    the Debian mutt binary package already carries a lot of feature patches.
    - Remove the mutt-patched binary from debian/control.
    - Add Breaks/Replaces: mutt-patched on the mutt binary package.
    - Remove mutt-patched rules from debian/rules.
    - Move multiple-fcc (the only remaining patch) under features/.
  * Similarly, fold mutt-kz, a binary from a different source package until
    now, into mutt. mutt-kz upstream has joined forces with NeoMutt, so this
    is now a matter of just passing --enable-notmuch to our ./configure.
  * Remove update-alternatives support for /usr/bin/mutt and associated
    manpages and docs. This only existed for the benefit of mutt-patched and
    mutt-kz and is thus moot now.
  * Update neomutt to a newer version, 20160611.
    - Enable *all* the neomutt patches now, not just a hand-picked selection.
    - Use the single patch, as the broken out patches conflict with each
      other.
    - Drop the compressed-folders, NNTP and path_max patches, as they are now
      part of neomutt.
    - Update sensible-browser and multiple-fcc patches to adjusted versions
      from the neomutt-upstream.
    - Adjust the package's description to mention some of neomutt's features.
  * Enable all hardening build flags. (Closes: #823295)
  * Remove README.Patches from /usr/share/doc. Including a unified diff in
    /usr/share/doc isn't very useful; the source package can always be used
    instead.
  * Remove mentions of gpg-2comp from gpg.rc and README.Debian and ship the
    resulting gpg.rc into /etc/Muttrc.d pristine, with the comments included.
  * Switch to tokyocabinet (from qdbm) in hurd-i386 as well, as it is nowadays
    available there too.
  * Lower Priority to optional (from standard), as this is currently the value
    in the archive, as overridden by ftp-masters.
  * Remove postinst code that handles migrations from pre-1.5.20-9 versions,
    as it's too old (even wheezy shipped with 1.5.21-6.2).
  * Remove preinst code that handles an obsolete conffile from pre-1.5.19-2
    versions, for the same reasons.
  * Remove Conflicts/Replaces mutt-utf8, it was last shipped with version
    1.5.5.1-20040105+1, released over 12 years ago.
  * Remove statically-linked-binary lintian override for mutt_dotlock, not the
    case anymore.
  * Remove quilt.mk and manual quilt invocations. Rely on the native 3.0
    (quilt) source package format instead for applying debian/patches.
  * Use dh_bugfiles instead of manual install invocations.
  * Migrate from our own -dbg package to the automatic -dbgsym package.
  * Migrate to dh, instead of our hand-crafted old-style debhelper d/rules.
  * Migrate to dh-autoreconf instead of autotools-dev.
  * Revamp debian/copyright: use copyright-format 1.0 (aka DEP5), update the
    list of copyright holders, add a debian/* stanza with all the past
    maintainers for the period they were maintainers etc.
  * Change Maintainer to the newly created pkg-mutt-maintainers list.
  * Add myself to Uploaders.

applied/ubuntu/xenial 2016-02-17 22:43:51 UTC 2016-02-17
Import patches-applied version 1.5.24-1build1 to applied/ubuntu/xenial-proposed

Author: Matthias Klose
Author Date: 2016-02-17 22:26:36 UTC

Import patches-applied version 1.5.24-1build1 to applied/ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: ebdbb8571f01c29003bbb80506fe195e36717e97
Unapplied parent: d1f66f5d88fd5d0c12be59a9a1ecf910c35202c4

New changelog entries:
  * No-change rebuild for gnutls transition.

ubuntu/xenial-proposed 2016-02-17 22:43:51 UTC 2016-02-17
Import patches-unapplied version 1.5.24-1build1 to ubuntu/xenial-proposed

Author: Matthias Klose
Author Date: 2016-02-17 22:26:36 UTC

Import patches-unapplied version 1.5.24-1build1 to ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 6d8ed90c7372195d615a2e0efef39bea5bffdaba

New changelog entries:
  * No-change rebuild for gnutls transition.

applied/ubuntu/xenial-proposed 2016-02-17 22:43:51 UTC 2016-02-17
Import patches-applied version 1.5.24-1build1 to applied/ubuntu/xenial-proposed

Author: Matthias Klose
Author Date: 2016-02-17 22:26:36 UTC

Import patches-applied version 1.5.24-1build1 to applied/ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: ebdbb8571f01c29003bbb80506fe195e36717e97
Unapplied parent: d1f66f5d88fd5d0c12be59a9a1ecf910c35202c4

New changelog entries:
  * No-change rebuild for gnutls transition.

ubuntu/xenial 2016-02-17 22:43:51 UTC 2016-02-17
Import patches-unapplied version 1.5.24-1build1 to ubuntu/xenial-proposed

Author: Matthias Klose
Author Date: 2016-02-17 22:26:36 UTC

Import patches-unapplied version 1.5.24-1build1 to ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 6d8ed90c7372195d615a2e0efef39bea5bffdaba

New changelog entries:
  * No-change rebuild for gnutls transition.

ubuntu/vivid-updates 2015-10-07 15:55:08 UTC 2015-10-07
Import patches-unapplied version 1.5.23-3ubuntu1 to ubuntu/vivid-proposed

Author: Serge Hallyn
Author Date: 2015-10-01 20:27:35 UTC

Import patches-unapplied version 1.5.23-3ubuntu1 to ubuntu/vivid-proposed

Imported using git-ubuntu import.

Changelog parent: 09d74a0ba7f8387da3496d8a3883117036d300b1

New changelog entries:
  * import fix-search-performance-regression.patch from upstream (LP: #1483796)

applied/ubuntu/vivid-updates 2015-10-07 15:55:08 UTC 2015-10-07
Import patches-applied version 1.5.23-3ubuntu1 to applied/ubuntu/vivid-proposed

Author: Serge Hallyn
Author Date: 2015-10-01 20:27:35 UTC

Import patches-applied version 1.5.23-3ubuntu1 to applied/ubuntu/vivid-proposed

Imported using git-ubuntu import.

Changelog parent: c40378fe66988578e2611585e0312944da1cf629
Unapplied parent: 70d37e5f28cef268b0e337d58599cf5e37f9caf6

New changelog entries:
  * import fix-search-performance-regression.patch from upstream (LP: #1483796)

applied/ubuntu/vivid-devel 2015-10-07 15:55:08 UTC 2015-10-07
Import patches-applied version 1.5.23-3ubuntu1 to applied/ubuntu/vivid-proposed

Author: Serge Hallyn
Author Date: 2015-10-01 20:27:35 UTC

Import patches-applied version 1.5.23-3ubuntu1 to applied/ubuntu/vivid-proposed

Imported using git-ubuntu import.

Changelog parent: c40378fe66988578e2611585e0312944da1cf629
Unapplied parent: 70d37e5f28cef268b0e337d58599cf5e37f9caf6

New changelog entries:
  * import fix-search-performance-regression.patch from upstream (LP: #1483796)

applied/ubuntu/vivid-proposed 2015-10-07 15:55:08 UTC 2015-10-07
Import patches-applied version 1.5.23-3ubuntu1 to applied/ubuntu/vivid-proposed

Author: Serge Hallyn
Author Date: 2015-10-01 20:27:35 UTC

Import patches-applied version 1.5.23-3ubuntu1 to applied/ubuntu/vivid-proposed

Imported using git-ubuntu import.

Changelog parent: c40378fe66988578e2611585e0312944da1cf629
Unapplied parent: 70d37e5f28cef268b0e337d58599cf5e37f9caf6

New changelog entries:
  * import fix-search-performance-regression.patch from upstream (LP: #1483796)

ubuntu/vivid-devel 2015-10-07 15:55:08 UTC 2015-10-07
Import patches-unapplied version 1.5.23-3ubuntu1 to ubuntu/vivid-proposed

Author: Serge Hallyn
Author Date: 2015-10-01 20:27:35 UTC

Import patches-unapplied version 1.5.23-3ubuntu1 to ubuntu/vivid-proposed

Imported using git-ubuntu import.

Changelog parent: 09d74a0ba7f8387da3496d8a3883117036d300b1

New changelog entries:
  * import fix-search-performance-regression.patch from upstream (LP: #1483796)

ubuntu/vivid-proposed 2015-10-07 15:55:08 UTC 2015-10-07
Import patches-unapplied version 1.5.23-3ubuntu1 to ubuntu/vivid-proposed

Author: Serge Hallyn
Author Date: 2015-10-01 20:27:35 UTC

Import patches-unapplied version 1.5.23-3ubuntu1 to ubuntu/vivid-proposed

Imported using git-ubuntu import.

Changelog parent: 09d74a0ba7f8387da3496d8a3883117036d300b1

New changelog entries:
  * import fix-search-performance-regression.patch from upstream (LP: #1483796)

applied/ubuntu/wily-proposed 2015-10-01 22:00:24 UTC 2015-10-01
Import patches-applied version 1.5.23-3.1ubuntu1 to applied/ubuntu/wily-proposed

Author: Serge Hallyn
Author Date: 2015-10-01 20:25:43 UTC

Import patches-applied version 1.5.23-3.1ubuntu1 to applied/ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: 9a33036c27b9850e009927eb78b4d908f4122173
Unapplied parent: 2901d458b2d1f59c0ab57ff233f648cb2015271f

New changelog entries:
  * import fix-search-performance-regression.patch from upstream (LP: #1483796)

applied/ubuntu/wily-devel 2015-10-01 22:00:24 UTC 2015-10-01
Import patches-applied version 1.5.23-3.1ubuntu1 to applied/ubuntu/wily-proposed

Author: Serge Hallyn
Author Date: 2015-10-01 20:25:43 UTC

Import patches-applied version 1.5.23-3.1ubuntu1 to applied/ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: 9a33036c27b9850e009927eb78b4d908f4122173
Unapplied parent: 2901d458b2d1f59c0ab57ff233f648cb2015271f

New changelog entries:
  * import fix-search-performance-regression.patch from upstream (LP: #1483796)

applied/ubuntu/wily 2015-10-01 22:00:24 UTC 2015-10-01
Import patches-applied version 1.5.23-3.1ubuntu1 to applied/ubuntu/wily-proposed

Author: Serge Hallyn
Author Date: 2015-10-01 20:25:43 UTC

Import patches-applied version 1.5.23-3.1ubuntu1 to applied/ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: 9a33036c27b9850e009927eb78b4d908f4122173
Unapplied parent: 2901d458b2d1f59c0ab57ff233f648cb2015271f

New changelog entries:
  * import fix-search-performance-regression.patch from upstream (LP: #1483796)

ubuntu/wily-devel 2015-10-01 22:00:24 UTC 2015-10-01
Import patches-unapplied version 1.5.23-3.1ubuntu1 to ubuntu/wily-proposed

Author: Serge Hallyn
Author Date: 2015-10-01 20:25:43 UTC

Import patches-unapplied version 1.5.23-3.1ubuntu1 to ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: d2cbcedddc9e334e1ac99a81e680d7dc05270320

New changelog entries:
  * import fix-search-performance-regression.patch from upstream (LP: #1483796)

ubuntu/wily 2015-10-01 22:00:24 UTC 2015-10-01
Import patches-unapplied version 1.5.23-3.1ubuntu1 to ubuntu/wily-proposed

Author: Serge Hallyn
Author Date: 2015-10-01 20:25:43 UTC

Import patches-unapplied version 1.5.23-3.1ubuntu1 to ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: d2cbcedddc9e334e1ac99a81e680d7dc05270320

New changelog entries:
  * import fix-search-performance-regression.patch from upstream (LP: #1483796)

ubuntu/wily-proposed 2015-10-01 22:00:24 UTC 2015-10-01
Import patches-unapplied version 1.5.23-3.1ubuntu1 to ubuntu/wily-proposed

Author: Serge Hallyn
Author Date: 2015-10-01 20:25:43 UTC

Import patches-unapplied version 1.5.23-3.1ubuntu1 to ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: d2cbcedddc9e334e1ac99a81e680d7dc05270320

New changelog entries:
  * import fix-search-performance-regression.patch from upstream (LP: #1483796)

debian/wheezy 2015-01-10 16:52:36 UTC 2015-01-10
Import patches-unapplied version 1.5.21-6.2+deb7u3 to debian/wheezy

Author: Antonio Radici
Author Date: 2014-11-29 17:10:22 UTC

Import patches-unapplied version 1.5.21-6.2+deb7u3 to debian/wheezy

Imported using git-ubuntu import.

Changelog parent: 792057b76d9cda109ad06dc03da61619c030bfd8

New changelog entries:
  * Fix an incorrect use of mutt_substrdup() in write_one_header() reported in
    CVE-2014-0467 (Closes: 771125)

applied/debian/wheezy 2015-01-10 16:52:36 UTC 2015-01-10
Import patches-applied version 1.5.21-6.2+deb7u3 to applied/debian/wheezy

Author: Antonio Radici
Author Date: 2014-11-29 17:10:22 UTC

Import patches-applied version 1.5.21-6.2+deb7u3 to applied/debian/wheezy

Imported using git-ubuntu import.

Changelog parent: 8fef0fa98193b359c9251b439396275ecfbeeafc
Unapplied parent: db8ec270427cac4c5f7c7d15c66acbafdc478776

New changelog entries:
  * Fix an incorrect use of mutt_substrdup() in write_one_header() reported in
    CVE-2014-0467 (Closes: 771125)

applied/ubuntu/lucid-updates 2014-12-11 20:18:40 UTC 2014-12-11
Import patches-applied version 1.5.20-7ubuntu1.3 to applied/ubuntu/lucid-secu...

Author: Steve Beattie
Author Date: 2014-12-10 20:46:54 UTC

Import patches-applied version 1.5.20-7ubuntu1.3 to applied/ubuntu/lucid-security

Imported using git-ubuntu import.

Changelog parent: 87e1693de46bdcd7cf5c82e1dea7c816ab22fa8d
Unapplied parent: cc2eb32025e12675ea08e66641e5aa26f9dbf6cf

New changelog entries:
  * SECURITY UPDATE: heap-based overflow in mutt_substrdup() when
    handling headers beginning with newline.
    - debian/patches/ubuntu/mutt-CVE-2014-9116.patch
    - CVE-2014-9116

applied/ubuntu/lucid-security 2014-12-11 20:18:40 UTC 2014-12-11
Import patches-applied version 1.5.20-7ubuntu1.3 to applied/ubuntu/lucid-secu...

Author: Steve Beattie
Author Date: 2014-12-10 20:46:54 UTC

Import patches-applied version 1.5.20-7ubuntu1.3 to applied/ubuntu/lucid-security

Imported using git-ubuntu import.

Changelog parent: 87e1693de46bdcd7cf5c82e1dea7c816ab22fa8d
Unapplied parent: cc2eb32025e12675ea08e66641e5aa26f9dbf6cf

New changelog entries:
  * SECURITY UPDATE: heap-based overflow in mutt_substrdup() when
    handling headers beginning with newline.
    - debian/patches/ubuntu/mutt-CVE-2014-9116.patch
    - CVE-2014-9116

applied/ubuntu/lucid-devel 2014-12-11 20:18:40 UTC 2014-12-11
Import patches-applied version 1.5.20-7ubuntu1.3 to applied/ubuntu/lucid-secu...

Author: Steve Beattie
Author Date: 2014-12-10 20:46:54 UTC

Import patches-applied version 1.5.20-7ubuntu1.3 to applied/ubuntu/lucid-security

Imported using git-ubuntu import.

Changelog parent: 87e1693de46bdcd7cf5c82e1dea7c816ab22fa8d
Unapplied parent: cc2eb32025e12675ea08e66641e5aa26f9dbf6cf

New changelog entries:
  * SECURITY UPDATE: heap-based overflow in mutt_substrdup() when
    handling headers beginning with newline.
    - debian/patches/ubuntu/mutt-CVE-2014-9116.patch
    - CVE-2014-9116

ubuntu/lucid-devel 2014-12-11 20:18:40 UTC 2014-12-11
Import patches-unapplied version 1.5.20-7ubuntu1.3 to ubuntu/lucid-security

Author: Steve Beattie
Author Date: 2014-12-10 20:46:54 UTC

Import patches-unapplied version 1.5.20-7ubuntu1.3 to ubuntu/lucid-security

Imported using git-ubuntu import.

Changelog parent: 3f9ba32299657f70558fe9c7291a259ff1707a1a

New changelog entries:
  * SECURITY UPDATE: heap-based overflow in mutt_substrdup() when
    handling headers beginning with newline.
    - debian/patches/ubuntu/mutt-CVE-2014-9116.patch
    - CVE-2014-9116

applied/ubuntu/utopic-updates 2014-12-11 20:18:40 UTC 2014-12-11
Import patches-applied version 1.5.23-1.1ubuntu0.2 to applied/ubuntu/utopic-s...

Author: Steve Beattie
Author Date: 2014-12-10 19:51:47 UTC

Import patches-applied version 1.5.23-1.1ubuntu0.2 to applied/ubuntu/utopic-security

Imported using git-ubuntu import.

Changelog parent: d895ca41ca6d9f2335b898e9826ac6a7a98ed53d
Unapplied parent: 5a4597e5459b1aa80e447dccfdae05bb18b02be5

New changelog entries:
  * SECURITY UPDATE: heap-based overflow in mutt_substrdup() when
    handling headers beginning with newline.
    - debian/patches/ubuntu/mutt-CVE-2014-9116.patch
    - CVE-2014-9116

applied/ubuntu/utopic-security 2014-12-11 20:18:40 UTC 2014-12-11
Import patches-applied version 1.5.23-1.1ubuntu0.2 to applied/ubuntu/utopic-s...

Author: Steve Beattie
Author Date: 2014-12-10 19:51:47 UTC

Import patches-applied version 1.5.23-1.1ubuntu0.2 to applied/ubuntu/utopic-security

Imported using git-ubuntu import.

Changelog parent: d895ca41ca6d9f2335b898e9826ac6a7a98ed53d
Unapplied parent: 5a4597e5459b1aa80e447dccfdae05bb18b02be5

New changelog entries:
  * SECURITY UPDATE: heap-based overflow in mutt_substrdup() when
    handling headers beginning with newline.
    - debian/patches/ubuntu/mutt-CVE-2014-9116.patch
    - CVE-2014-9116

applied/ubuntu/utopic-devel 2014-12-11 20:18:40 UTC 2014-12-11
Import patches-applied version 1.5.23-1.1ubuntu0.2 to applied/ubuntu/utopic-s...

Author: Steve Beattie
Author Date: 2014-12-10 19:51:47 UTC

Import patches-applied version 1.5.23-1.1ubuntu0.2 to applied/ubuntu/utopic-security

Imported using git-ubuntu import.

Changelog parent: d895ca41ca6d9f2335b898e9826ac6a7a98ed53d
Unapplied parent: 5a4597e5459b1aa80e447dccfdae05bb18b02be5

New changelog entries:
  * SECURITY UPDATE: heap-based overflow in mutt_substrdup() when
    handling headers beginning with newline.
    - debian/patches/ubuntu/mutt-CVE-2014-9116.patch
    - CVE-2014-9116

ubuntu/utopic-devel 2014-12-11 20:18:40 UTC 2014-12-11
Import patches-unapplied version 1.5.23-1.1ubuntu0.2 to ubuntu/utopic-security

Author: Steve Beattie
Author Date: 2014-12-10 19:51:47 UTC

Import patches-unapplied version 1.5.23-1.1ubuntu0.2 to ubuntu/utopic-security

Imported using git-ubuntu import.

Changelog parent: ebbfee8c5144841f3960e9f4160b0dbdea807753

New changelog entries:
  * SECURITY UPDATE: heap-based overflow in mutt_substrdup() when
    handling headers beginning with newline.
    - debian/patches/ubuntu/mutt-CVE-2014-9116.patch
    - CVE-2014-9116

ubuntu/utopic-updates 2014-12-11 20:18:40 UTC 2014-12-11
Import patches-unapplied version 1.5.23-1.1ubuntu0.2 to ubuntu/utopic-security

Author: Steve Beattie
Author Date: 2014-12-10 19:51:47 UTC

Import patches-unapplied version 1.5.23-1.1ubuntu0.2 to ubuntu/utopic-security

Imported using git-ubuntu import.

Changelog parent: ebbfee8c5144841f3960e9f4160b0dbdea807753

New changelog entries:
  * SECURITY UPDATE: heap-based overflow in mutt_substrdup() when
    handling headers beginning with newline.
    - debian/patches/ubuntu/mutt-CVE-2014-9116.patch
    - CVE-2014-9116

ubuntu/lucid-updates 2014-12-11 20:18:40 UTC 2014-12-11
Import patches-unapplied version 1.5.20-7ubuntu1.3 to ubuntu/lucid-security

Author: Steve Beattie
Author Date: 2014-12-10 20:46:54 UTC

Import patches-unapplied version 1.5.20-7ubuntu1.3 to ubuntu/lucid-security

Imported using git-ubuntu import.

Changelog parent: 3f9ba32299657f70558fe9c7291a259ff1707a1a

New changelog entries:
  * SECURITY UPDATE: heap-based overflow in mutt_substrdup() when
    handling headers beginning with newline.
    - debian/patches/ubuntu/mutt-CVE-2014-9116.patch
    - CVE-2014-9116

ubuntu/precise-devel 2014-12-11 20:18:40 UTC 2014-12-11
Import patches-unapplied version 1.5.21-5ubuntu2.2 to ubuntu/precise-security

Author: Steve Beattie
Author Date: 2014-12-09 19:54:20 UTC

Import patches-unapplied version 1.5.21-5ubuntu2.2 to ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: 464ace3d5458653c445055779e9050f3a6387473

New changelog entries:
  * SECURITY UPDATE: heap-based overflow in mutt_substrdup() when
    handling headers beginning with newline.
    - debian/patches/ubuntu/mutt-CVE-2014-9116.patch
    - CVE-2014-9116

ubuntu/lucid-security 2014-12-11 20:18:40 UTC 2014-12-11
Import patches-unapplied version 1.5.20-7ubuntu1.3 to ubuntu/lucid-security

Author: Steve Beattie
Author Date: 2014-12-10 20:46:54 UTC

Import patches-unapplied version 1.5.20-7ubuntu1.3 to ubuntu/lucid-security

Imported using git-ubuntu import.

Changelog parent: 3f9ba32299657f70558fe9c7291a259ff1707a1a

New changelog entries:
  * SECURITY UPDATE: heap-based overflow in mutt_substrdup() when
    handling headers beginning with newline.
    - debian/patches/ubuntu/mutt-CVE-2014-9116.patch
    - CVE-2014-9116

1100 of 228 results

Other repositories

Name Last Modified
lp:ubuntu/+source/mutt 2019-06-02
11 of 1 result
You can't create new repositories for mutt in Ubuntu.