Mail Program

Edit Package mutt

A very powerful mail user agent. It supports (among other nice things)
highlighting, threading, and PGP. It takes some time to get used to,
however.

Refresh
Refresh
Source Files
Filename Size Changed
README.alternates 0000000284 284 Bytes
Signature_conversion 0000002030 1.98 KB
aw.listreply.diff 0000001938 1.89 KB
backports-datetime-fromisoformat-1.0.0.tar.gz 0000010802 10.5 KB
bsc907453-CVE-2014-9116-jessie.patch 0000000868 868 Bytes
mutt-1.10.1-imap.patch 0000000543 543 Bytes
mutt-1.13.3.dif 0000003620 3.54 KB
mutt-1.5.15-wrapcolumn.diff 0000000558 558 Bytes
mutt-1.5.20-sendgroupreplyto.diff 0000001469 1.43 KB
mutt-1.5.21-mailcap.diff 0000000859 859 Bytes
mutt-1.5.23-carriage-return.path 0000004701 4.59 KB
mutt-1.5.9i-pgpewrap.diff 0000000401 401 Bytes
mutt-1.6.1-opennfs.dif 0000006723 6.57 KB
mutt-2.2.12.tar.gz 0005539244 5.28 MB
mutt-2.2.12.tar.gz.asc 0000000833 833 Bytes
mutt-Fix-SIGQUIT-handling.patch 0000001836 1.79 KB
mutt.changes 0000116106 113 KB
mutt.desktop 0000000190 190 Bytes
mutt.keyring 0000003147 3.07 KB
mutt.mailcap 0000000094 94 Bytes
mutt.png 0000002460 2.4 KB
mutt.spec 0000012166 11.9 KB
mutt_oauth2.py-3.6 0000018279 17.9 KB
mutt_oauth2.py.README 0000014399 14.1 KB
patch-1.5.24.vk.pgp_verbose_mime 0000001780 1.74 KB
skel.muttrc 0000005499 5.37 KB
widechar.sidebar.dif 0000001451 1.42 KB
Latest Revision
Daniel Mach's avatar Daniel Mach (dmach) committed (revision 2)
- Submit latest mutt 2.2.12 to SLE-15-SP6 for jira#PED-5580
  * Drop patches for boo#1172906, boo#1172935, CVE-2020-14093,
    and CVE-2020-14154 now upstream
    - 3e88866dc60b5fa6aaba6fd7c1710c12c1c3cd01.patch
      + Prevent possible IMAP MITM via PREAUTH response.
    - mutt-1.10.1-backport-mutt_ssl_gnutls-1.14.3.dif
      to port mutt_ssl_gnutls.c from mutt 1.14.3 back
      + expired certs not properly rejected with GnuTLS
      + Side effect is support of TLSv1_3 is supported by gnutls
  * Drop patch for bsc#1173197 c547433cdf2e79191b15c6932c57f1472bfb5ff4.dif
    now upstream
    - Fix CVE-2020-14954: STARTTLS buffering issue allowing man
      in the middle attack of IMAP, SMTP and POP3
  * Drop patch for bsc#1179035, CVE-2020-28896.patch now upstream
    - incomplete connection termination could lead to sending
      credentials over unencrypted connections 
  * Drop patch for bsc#1179113 and boo#1179461 nofreeze-c72f740a.patch
    now upstream
    - Avoid that message with a million tiny parts can freeze MUA
      for several minutes
  * Drop patch for bsc#1181221, CVE-2021-3181 mutt-colon.patch now
    upstream
    - recipient parsing memory leak. This patch combines three
      smaller commits 
  * Drop patch for bsc#1198518, CVE-2022-1328 uudecode-e5ed080c.patch
    - fix a buffer overflow in uudecoder
  * Drop patches now upstream
    - CVE-2023-4874-part1.patch (bsc#1215189 for CVE-2023-4874)
    - CVE-2023-4874-part2.patch (bsc#1215189 for CVE-2023-4874)
    - CVE-2023-4875.patch (bsc#1215191 for CVE-2023-4875)
Comments 0
openSUSE Build Service is sponsored by