This is an automatically created tracking bug! It was created to ensure that one or more security vulnerabilities are fixed in affected Fedora versions. For comments that are specific to the vulnerability please use bugs filed against "Security Response" product referenced in the "Blocks" field. For more information see: http://fedoraproject.org/wiki/Security/TrackingBugs When creating a Bodhi update request, please include the bug IDs of the respective parent bugs filed against the "Security Response" product. Please mention CVE ids in the RPM changelog when available. Bodhi update submission link: https://admin.fedoraproject.org/updates/new/?type_=security&bugs=688755 Please note: this issue affects multiple supported versions of Fedora. Only one tracking bug has been filed; please only close it when all affected versions are fixed. [bug automatically created by: add-tracking-bugs]
Created attachment 487048 [details] proposed patch - always check peer cert The proposed patch is being consulted with upstream; joining the discussion available here: http://dev.mutt.org/trac/ticket/3506
Comment on attachment 487048 [details] proposed patch - always check peer cert patch proposed in the parent bug
F14 (FEDORA-2011-7751) and F15 (FEDORA-2011-7739) updates are stable, F13 is EOL, closing.