Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-15-SP1:GA
patchinfo.8079
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.8079
<patchinfo incident="8079"> <issue tracker="bnc" id="1101428">VUL-0: mutt,neomutt: code injection and a couple path traversal vulnerabilities</issue> <issue tracker="bnc" id="1101583">VUL-1: CVE-2018-14351: mutt,neomutt: imap/command.c mishandles a long IMAP status mailbox literal count size.</issue> <issue tracker="bnc" id="1101581">VUL-0: CVE-2018-14353: mutt,neomutt: imap_quote_string in imap/util.c has an integer underflow.</issue> <issue tracker="bnc" id="1101567">VUL-0: CVE-2018-14362: mutt,neomutt: pop.c does not forbid characters that may have unsafe interaction with message-cache pathnames, as demonstrated by a '/' character.</issue> <issue tracker="bnc" id="1101578">VUL-0: CVE-2018-14354: mutt,neomutt: They allow remote IMAP servers to execute arbitrary commands via backquote characters</issue> <issue tracker="bnc" id="1101582">VUL-0: CVE-2018-14352: mutt,neomutt: imap_quote_string in imap/util.c does not leave room for quote characters, leading to a stack-based buffer overflow.</issue> <issue tracker="bnc" id="1101576">VUL-0: CVE-2018-14356: mutt,neomutt: pop.c mishandles a zero-length UID.</issue> <issue tracker="bnc" id="1101577">VUL-0: CVE-2018-14355: mutt,neomutt: imap/util.c mishandles ".." directory traversal in a mailbox name.</issue> <issue tracker="bnc" id="1101589">VUL-1: CVE-2018-14349: mutt,neomutt: imap/command.c mishandles a NO response without a message.</issue> <issue tracker="bnc" id="1101588">VUL-0: CVE-2018-14350: mutt,neomutt: imap/message.c has a stack-based buffer overflow for a FETCH response with along INTERNALDATE field.</issue> <issue tracker="bnc" id="1101566">VUL-0: CVE-2018-14363: neomutt: newsrc.c does not properlyrestrict '/' characters that may have unsafe interaction with cache pathnames.</issue> <issue tracker="bnc" id="1101570">VUL-0: CVE-2018-14359: mutt, neomutt: buffer overflow via base64 data.</issue> <issue tracker="bnc" id="1101571">VUL-0: CVE-2018-14358: mutt,neomutt: imap/message.c has a stack-based buffer overflow for a FETCH response with along RFC822.SIZE field.</issue> <issue tracker="bnc" id="1094717">mutt reports as neomutt and incorrect version</issue> <issue tracker="bnc" id="1101569">VUL-0: CVE-2018-14360: neomutt: nntp_add_group in newsrc.c has a stack-based buffer overflow because of incorrect sscanf usage.</issue> <issue tracker="bnc" id="1101573">VUL-0: CVE-2018-14357: mutt,neomutt: They allow remote IMAP servers to execute arbitrary commands via backquote characters</issue> <issue tracker="bnc" id="1101568">VUL-0: CVE-2018-14361: neomutt: nntp.c proceeds even ifmemory allocation fails for messages data.</issue> <issue tracker="cve" id="2018-14359"/> <issue tracker="cve" id="2018-14358"/> <issue tracker="cve" id="2018-14349"/> <issue tracker="cve" id="2018-14351"/> <issue tracker="cve" id="2018-14350"/> <issue tracker="cve" id="2018-14353"/> <issue tracker="cve" id="2018-14352"/> <issue tracker="cve" id="2018-14355"/> <issue tracker="cve" id="2018-14354"/> <issue tracker="cve" id="2018-14357"/> <issue tracker="cve" id="2018-14356"/> <issue tracker="cve" id="2018-14362"/> <issue tracker="cve" id="2018-14361"/> <issue tracker="cve" id="2014-9116"/> <issue tracker="cve" id="2018-14363"/> <issue tracker="cve" id="2018-14360"/> <category>security</category> <rating>important</rating> <packager>WernerFink</packager> <description>This update for mutt fixes the following issues: Security issues fixed: - bsc#1101428: Mutt 1.10.1 security release update. - CVE-2018-14351: Fix imap/command.c that mishandles long IMAP status mailbox literal count size (bsc#1101583). - CVE-2018-14353: Fix imap_quote_string in imap/util.c that has an integer underflow (bsc#1101581). - CVE-2018-14362: Fix pop.c that does not forbid characters that may have unsafe interaction with message-cache pathnames (bsc#1101567). - CVE-2018-14354: Fix arbitrary command execution from remote IMAP servers via backquote characters (bsc#1101578). - CVE-2018-14352: Fix imap_quote_string in imap/util.c that does not leave room for quote characters (bsc#1101582). - CVE-2018-14356: Fix pop.c that mishandles a zero-length UID (bsc#1101576). - CVE-2018-14355: Fix imap/util.c that mishandles ".." directory traversal in a mailbox name (bsc#1101577). - CVE-2018-14349: Fix imap/command.c that mishandles a NO response without a message (bsc#1101589). - CVE-2018-14350: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along INTERNALDATE field (bsc#1101588). - CVE-2018-14363: Fix newsrc.c that does not properlyrestrict '/' characters that may have unsafe interaction with cache pathnames (bsc#1101566). - CVE-2018-14359: Fix buffer overflow via base64 data (bsc#1101570). - CVE-2018-14358: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along RFC822.SIZE field (bsc#1101571). - CVE-2018-14360: Fix nntp_add_group in newsrc.c that has a stack-based buffer overflow because of incorrect sscanf usage (bsc#1101569). - CVE-2018-14357: Fix that remote IMAP servers are allowed to execute arbitrary commands via backquote characters (bsc#1101573). - CVE-2018-14361: Fix that nntp.c proceeds even if memory allocation fails for messages data (bsc#1101568). Bug fixes: - mutt reports as neomutt and incorrect version (bsc#1094717) </description> <summary>Security update for mutt</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor