Skip to navigation

Bug Fix Advisory mutt bug fix update

Advisory: RHBA-2012:1143-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-01-07
Last updated on: 2013-01-07
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated mutt packages that fix one bug are now available for Red Hat Enterprise
Linux 5.

Mutt is a text-mode mail user agent. Mutt supports color, threading, arbitrary
key remapping, and a lot of customization.

This update fixes the following bug:

* Prior to this update, the mutt agent failed to allow interruptions during
getch calls. As a consequence, the signal "SIGINT" (Ctrl-C) was not handled
correctly when waiting for user input. This update modifies the underlying code
to allow interruptions. (BZ#313291)

All users of mutt are advised to upgrade to these updated packages, which fix
this bug.


Solution

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
mutt-1.4.2.2-6.el5.src.rpm     MD5: 811c3e0c19f4eaf53bc1f49050c36ea7
SHA-256: 147cea6edfea7c6619476a9774495a9a9237afea3eea9536fd8306f7743c6997
 
IA-32:
mutt-1.4.2.2-6.el5.i386.rpm     MD5: 28c79dd4c6c08568b8c92389118bbf62
SHA-256: 71facdce31413780030de496d6878e64e9dbe6cc1ed87f53d3d2ab5e93e956a5
mutt-debuginfo-1.4.2.2-6.el5.i386.rpm     MD5: 7a4b16b7d50e7d8745bf56f9640811f7
SHA-256: 23a388822d45731d9771c99dc22d0a619ed0bd73fbb490ad0a6f608d4ddcdaa2
 
IA-64:
mutt-1.4.2.2-6.el5.ia64.rpm     MD5: 2f2bfdb9cd130fb88e6a3be12baa5fa7
SHA-256: 1244e7ad7da793fdf7d418a574eab052ae842a39b2fb95f30cae6c06ec71f5eb
mutt-debuginfo-1.4.2.2-6.el5.ia64.rpm     MD5: 8e706580fe3caf114128328af70ae6ed
SHA-256: 6fa4cddc2307a16b949a3f980adc4639a395085ce70411dc2aa2016f0e2154d5
 
PPC:
mutt-1.4.2.2-6.el5.ppc.rpm     MD5: a33aa14da95e63a3a838cd9bec8ee199
SHA-256: c4c411cc23f023d01d9c8d2ee5542d1521528e656df7eb09f1a564394b9da008
mutt-debuginfo-1.4.2.2-6.el5.ppc.rpm     MD5: 9e2133cc843cf216ea400836d5b451ce
SHA-256: 53933eab8debc267f025991038923ddc6b6b9f41439e518c0a339fea90f15d94
 
s390x:
mutt-1.4.2.2-6.el5.s390x.rpm     MD5: 7db1d933619a6088f5d2a76aba5d0409
SHA-256: 01a0446c12185005bb45e87a569cff1a05ab05f29172f96006eeaa2c2b064de1
mutt-debuginfo-1.4.2.2-6.el5.s390x.rpm     MD5: a29cc096b0b84df2682a589b4d0d201d
SHA-256: c6f8f435e031d7458d6788f2f7fd7ecf92ed915d499491112920765fa7b896bf
 
x86_64:
mutt-1.4.2.2-6.el5.x86_64.rpm     MD5: b8a2a1c48f13c5c8cc9c2f64573c4e37
SHA-256: f3c734e614d3f702bb68c1b90d2a4c5e278decfef77b7d6604aa01e305cb1313
mutt-debuginfo-1.4.2.2-6.el5.x86_64.rpm     MD5: 571d549744fa767b0d4a8e705d89789a
SHA-256: f76885c4efb76d279640366d4f9e19f6c71a7036a8779d7bef3c32d54ad6c931
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
mutt-1.4.2.2-6.el5.src.rpm     MD5: 811c3e0c19f4eaf53bc1f49050c36ea7
SHA-256: 147cea6edfea7c6619476a9774495a9a9237afea3eea9536fd8306f7743c6997
 
IA-32:
mutt-1.4.2.2-6.el5.i386.rpm     MD5: 28c79dd4c6c08568b8c92389118bbf62
SHA-256: 71facdce31413780030de496d6878e64e9dbe6cc1ed87f53d3d2ab5e93e956a5
mutt-debuginfo-1.4.2.2-6.el5.i386.rpm     MD5: 7a4b16b7d50e7d8745bf56f9640811f7
SHA-256: 23a388822d45731d9771c99dc22d0a619ed0bd73fbb490ad0a6f608d4ddcdaa2
 
x86_64:
mutt-1.4.2.2-6.el5.x86_64.rpm     MD5: b8a2a1c48f13c5c8cc9c2f64573c4e37
SHA-256: f3c734e614d3f702bb68c1b90d2a4c5e278decfef77b7d6604aa01e305cb1313
mutt-debuginfo-1.4.2.2-6.el5.x86_64.rpm     MD5: 571d549744fa767b0d4a8e705d89789a
SHA-256: f76885c4efb76d279640366d4f9e19f6c71a7036a8779d7bef3c32d54ad6c931
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

313291 - Mutt reacts incorrectly to SIGINT (Ctrl-C)



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/