| Summary: | mutt: plaintext attachment output truncated after null byte | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Andrej Nemec <anemec> |
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
| Status: | CLOSED NOTABUG | QA Contact: | |
| Severity: | low | Docs Contact: | |
| Priority: | low | ||
| Version: | unspecified | CC: | dkholia, fale, hhorak, jpacner, mmuzila |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2016-06-01 11:06:54 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Bug Depends On: | 1329528 | ||
| Bug Blocks: | 1329529 | ||
|
Description
Andrej Nemec
2016-04-22 07:47:27 UTC
Created mutt tracking bugs for this issue: Affects: fedora-all [bug 1329528] The user might get confused by the partial rendering of the attachment but the user needs to take further steps (like running arbitrary attachments) to get compromised. So we can close bug #1329528 as well, right? @Honza, I think that we should do it |