File _patchinfo of Package patchinfo.8259
<patchinfo incident="8259">
<issue tracker="bnc" id="1101428">VUL-0: mutt,neomutt: code injection and a couple path traversal vulnerabilities</issue>
<issue tracker="bnc" id="1101583">VUL-1: CVE-2018-14351: mutt,neomutt: imap/command.c mishandles a long IMAP status mailbox literal count size.</issue>
<issue tracker="bnc" id="1061343">(neo)mutt displaying times in Zulu time</issue>
<issue tracker="bnc" id="986534">mutt unconditionally segfaults when displaying a message</issue>
<issue tracker="bnc" id="1101567">VUL-0: CVE-2018-14362: mutt,neomutt: pop.c does not forbid characters that may have unsafe interaction with message-cache pathnames, as demonstrated by a '/' character.</issue>
<issue tracker="bnc" id="1101578">VUL-0: CVE-2018-14354: mutt,neomutt: They allow remote IMAP servers to execute arbitrary commands via backquote characters</issue>
<issue tracker="bnc" id="1101582">VUL-0: CVE-2018-14352: mutt,neomutt: imap_quote_string in imap/util.c does not leave room for quote characters, leading to a stack-based buffer overflow.</issue>
<issue tracker="bnc" id="1101576">VUL-0: CVE-2018-14356: mutt,neomutt: pop.c mishandles a zero-length UID.</issue>
<issue tracker="bnc" id="1101577">VUL-0: CVE-2018-14355: mutt,neomutt: imap/util.c mishandles ".." directory traversal in a mailbox name.</issue>
<issue tracker="bnc" id="1101589">VUL-1: CVE-2018-14349: mutt,neomutt: imap/command.c mishandles a NO response without a message.</issue>
<issue tracker="bnc" id="1101588">VUL-0: CVE-2018-14350: mutt,neomutt: imap/message.c has a stack-based buffer overflow for a FETCH response with along INTERNALDATE field.</issue>
<issue tracker="bnc" id="1101566">VUL-0: CVE-2018-14363: neomutt: newsrc.c does not properlyrestrict '/' characters that may have unsafe interaction with cache pathnames.</issue>
<issue tracker="bnc" id="1101570">VUL-0: CVE-2018-14359: mutt, neomutt: buffer overflow via base64 data.</issue>
<issue tracker="bnc" id="1101571">VUL-0: CVE-2018-14358: mutt,neomutt: imap/message.c has a stack-based buffer overflow for a FETCH response with along RFC822.SIZE field.</issue>
<issue tracker="bnc" id="1094717">mutt reports as neomutt and incorrect version</issue>
<issue tracker="bnc" id="1101569">VUL-0: CVE-2018-14360: neomutt: nntp_add_group in newsrc.c has a stack-based buffer overflow because of incorrect sscanf usage.</issue>
<issue tracker="bnc" id="1101573">VUL-0: CVE-2018-14357: mutt,neomutt: They allow remote IMAP servers to execute arbitrary commands via backquote characters</issue>
<issue tracker="bnc" id="1101568">VUL-0: CVE-2018-14361: neomutt: nntp.c proceeds even ifmemory allocation fails for messages data.</issue>
<issue tracker="bnc" id="980830">No sidebar available in mutt 1.6.1 from Tumbleweed snapshot 20160517</issue>
<issue tracker="bnc" id="982129">[TW] mutt-1.6.1 unusable when built with --enable-sidebar</issue>
<issue tracker="bnc" id="1101581">VUL-0: CVE-2018-14353: mutt,neomutt: imap_quote_string in imap/util.c has an integer underflow.</issue>
<issue tracker="cve" id="2018-14359"/>
<issue tracker="cve" id="2018-14358"/>
<issue tracker="cve" id="2018-14349"/>
<issue tracker="cve" id="2018-14351"/>
<issue tracker="cve" id="2018-14350"/>
<issue tracker="cve" id="2018-14353"/>
<issue tracker="cve" id="2018-14352"/>
<issue tracker="cve" id="2018-14355"/>
<issue tracker="cve" id="2018-14354"/>
<issue tracker="cve" id="2018-14357"/>
<issue tracker="cve" id="2018-14356"/>
<issue tracker="cve" id="2018-14362"/>
<issue tracker="cve" id="2018-14361"/>
<issue tracker="cve" id="2014-9116"/>
<issue tracker="cve" id="2018-14363"/>
<issue tracker="cve" id="2018-14360"/>
<issue tracker="fate" id="323578"/>
<category>security</category>
<rating>important</rating>
<packager>WernerFink</packager>
<description>This update for mutt fixes the following issues:
Security issues fixed:
- bsc#1101428: Mutt 1.10.1 security release update.
- CVE-2018-14351: Fix imap/command.c that mishandles long IMAP status mailbox literal count size (bsc#1101583).
- CVE-2018-14353: Fix imap_quote_string in imap/util.c that has an integer underflow (bsc#1101581).
- CVE-2018-14362: Fix pop.c that does not forbid characters that may have unsafe interaction with message-cache pathnames (bsc#1101567).
- CVE-2018-14354: Fix arbitrary command execution from remote IMAP servers via backquote characters (bsc#1101578).
- CVE-2018-14352: Fix imap_quote_string in imap/util.c that does not leave room for quote characters (bsc#1101582).
- CVE-2018-14356: Fix pop.c that mishandles a zero-length UID (bsc#1101576).
- CVE-2018-14355: Fix imap/util.c that mishandles ".." directory traversal in a mailbox name (bsc#1101577).
- CVE-2018-14349: Fix imap/command.c that mishandles a NO response without a message (bsc#1101589).
- CVE-2018-14350: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along INTERNALDATE field (bsc#1101588).
- CVE-2018-14363: Fix newsrc.c that does not properlyrestrict '/' characters that may have unsafe interaction with cache pathnames (bsc#1101566).
- CVE-2018-14359: Fix buffer overflow via base64 data (bsc#1101570).
- CVE-2018-14358: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along RFC822.SIZE field (bsc#1101571).
- CVE-2018-14360: Fix nntp_add_group in newsrc.c that has a stack-based buffer overflow because of incorrect sscanf usage (bsc#1101569).
- CVE-2018-14357: Fix that remote IMAP servers are allowed to execute arbitrary commands via backquote characters (bsc#1101573).
- CVE-2018-14361: Fix that nntp.c proceeds even if memory allocation fails for messages data (bsc#1101568).
Bug fixes:
- mutt reports as neomutt and incorrect version (bsc#1094717)
- No sidebar available in mutt 1.6.1 from Tumbleweed snapshot 20160517 (bsc#980830)
- mutt-1.6.1 unusable when built with --enable-sidebar (bsc#982129)
- (neo)mutt displaying times in Zulu time (bsc#1061343)
- mutt unconditionally segfaults when displaying a message (bsc#986534)
</description>
<summary>Security update for mutt</summary>
</patchinfo>