ALT-BU-2018-3434-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2018-01636
Уязвимость процессоров Intel архитектур Skylake и Kaby Lake, связанная с ошибками реализации технологии одновременной многопоточности (SMT), позволяющая нарушителю раскрыть защищаемую информацию
BDU:2019-00186
Уязвимость библиотеки OpenSSL, связанная с ошибками обработки криптографических ключей при использовании протокола DH (E), позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-0732
During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- 104442
- 104442
- 1041090
- 1041090
- RHSA-2018:2552
- RHSA-2018:2552
- RHSA-2018:2553
- RHSA-2018:2553
- RHSA-2018:3221
- RHSA-2018:3221
- RHSA-2018:3505
- RHSA-2018:3505
- RHSA-2019:1296
- RHSA-2019:1296
- RHSA-2019:1297
- RHSA-2019:1297
- RHSA-2019:1543
- RHSA-2019:1543
- https://cert-portal.siemens.com/productcert/pdf/ssa-419820.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-419820.pdf
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3984ef0b72831da8b3ece4745cac4f8575b19098
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3984ef0b72831da8b3ece4745cac4f8575b19098
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ea7abeeabf92b7aca160bdd0208636d4da69f4f4
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ea7abeeabf92b7aca160bdd0208636d4da69f4f4
- [debian-lts-announce] 20180728 [SECURITY] [DLA 1449-1] openssl security update
- [debian-lts-announce] 20180728 [SECURITY] [DLA 1449-1] openssl security update
- FEDORA-2019-db06efdea1
- FEDORA-2019-db06efdea1
- FEDORA-2019-9a0a7c0986
- FEDORA-2019-9a0a7c0986
- FEDORA-2019-00c25b9379
- FEDORA-2019-00c25b9379
- https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/
- https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/
- GLSA-201811-03
- GLSA-201811-03
- https://security.netapp.com/advisory/ntap-20181105-0001/
- https://security.netapp.com/advisory/ntap-20181105-0001/
- https://security.netapp.com/advisory/ntap-20190118-0002/
- https://security.netapp.com/advisory/ntap-20190118-0002/
- https://securityadvisories.paloaltonetworks.com/Home/Detail/133
- https://securityadvisories.paloaltonetworks.com/Home/Detail/133
- USN-3692-1
- USN-3692-1
- USN-3692-2
- USN-3692-2
- DSA-4348
- DSA-4348
- DSA-4355
- DSA-4355
- https://www.openssl.org/news/secadv/20180612.txt
- https://www.openssl.org/news/secadv/20180612.txt
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-13
- https://www.tenable.com/security/tns-2018-13
- https://www.tenable.com/security/tns-2018-14
- https://www.tenable.com/security/tns-2018-14
- https://www.tenable.com/security/tns-2018-17
- https://www.tenable.com/security/tns-2018-17
Modified: 2024-11-21
CVE-2018-12115
In all versions of Node.js prior to 6.14.4, 8.11.4 and 10.9.0 when used with UCS-2 encoding (recognized by Node.js under the names `'ucs2'`, `'ucs-2'`, `'utf16le'` and `'utf-16le'`), `Buffer#write()` can be abused to write outside of the bounds of a single `Buffer`. Writes that start from the second-to-last position of a buffer cause a miscalculation of the maximum length of the input bytes to be written.
- 105127
- 105127
- RHSA-2018:2552
- RHSA-2018:2552
- RHSA-2018:2553
- RHSA-2018:2553
- RHSA-2018:2944
- RHSA-2018:2944
- RHSA-2018:2949
- RHSA-2018:2949
- RHSA-2018:3537
- RHSA-2018:3537
- https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/
- https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/
- GLSA-202003-48
- GLSA-202003-48
Modified: 2024-11-21
CVE-2018-5407
Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'.
- 105897
- 105897
- RHSA-2019:0483
- RHSA-2019:0483
- RHSA-2019:0651
- RHSA-2019:0651
- RHSA-2019:0652
- RHSA-2019:0652
- RHSA-2019:2125
- RHSA-2019:2125
- RHSA-2019:3929
- RHSA-2019:3929
- RHSA-2019:3931
- RHSA-2019:3931
- RHSA-2019:3932
- RHSA-2019:3932
- RHSA-2019:3933
- RHSA-2019:3933
- RHSA-2019:3935
- RHSA-2019:3935
- https://eprint.iacr.org/2018/1060.pdf
- https://eprint.iacr.org/2018/1060.pdf
- https://github.com/bbbrumley/portsmash
- https://github.com/bbbrumley/portsmash
- [debian-lts-announce] 20181121 [SECURITY] [DLA 1586-1] openssl security update
- [debian-lts-announce] 20181121 [SECURITY] [DLA 1586-1] openssl security update
- https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/
- https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/
- GLSA-201903-10
- GLSA-201903-10
- https://security.netapp.com/advisory/ntap-20181126-0001/
- https://security.netapp.com/advisory/ntap-20181126-0001/
- https://support.f5.com/csp/article/K49711130?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K49711130?utm_source=f5support&%3Butm_medium=RSS
- USN-3840-1
- USN-3840-1
- DSA-4348
- DSA-4348
- DSA-4355
- DSA-4355
- 45785
- 45785
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://www.tenable.com/security/tns-2018-16
- https://www.tenable.com/security/tns-2018-16
- https://www.tenable.com/security/tns-2018-17
- https://www.tenable.com/security/tns-2018-17
Closed vulnerabilities
BDU:2019-00511
Уязвимость в коде «pop.c» почтовых клиентов Mutt и NeoMutt, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2019-01626
Уязвимость почтовых клиентов Mutt и NeoMutt, связанная с выходом операции за границы буфера данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04312
Уязвимость компонента imap/util.c почтовых клиентов Mutt и NeoMutt, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2019-04313
Уязвимость компонента newsrc.c почтового клиента NeoMutt, позволяющая нарушителю оказать воздействие на целостность защищаемой информации
BDU:2019-04570
Уязвимость почтовых клиентов Mutt и NeoMutt, связанная с ошибками при обработке входных данных, позволяющая нарушителю выполнить произвольный код
BDU:2019-04571
Уязвимость файла imap/command.c почтовых клиентов Mutt и NeoMutt, связанная с ошибками при обработке размера литерала состояния IMAP, позволяющая нарушителю выполнить произвольный код
BDU:2019-04572
Уязвимость функции imap_quote_string файла imap/util.c почтовых клиентов Mutt и NeoMutt, связанная с переполнением буфера в стеке, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04573
Уязвимость функции imap_quote_string файла imap/util.c почтовых клиентов Mutt и NeoMutt, связанная с целочисленной потерей значимости, позволяющая нарушителю выполнить произвольный код
BDU:2019-04574
Уязвимость почтовых клиентов Mutt и NeoMutt, связанная с непринятием мер по чистке данных на управляющем уровне, позволяющая нарушителю выполнить произвольные команды
BDU:2019-04575
Уязвимость почтовых клиентов Mutt и NeoMutt, связанная с использованием неинициализированного указателя, позволяющая нарушителю выполнить произвольный код
BDU:2019-04576
Уязвимость почтовых клиентов Mutt и NeoMutt, связанная с непринятием мер по чистке данных на управляющем уровне, позволяющая нарушителю выполнить произвольные команды
BDU:2019-04577
Уязвимость файла imap/message.c почтовых клиентов Mutt и NeoMutt, связанная с переполнением буфера в стеке, позволяющая нарушителю выполнить произвольный код
BDU:2019-04578
Уязвимость почтовых клиентов Mutt и NeoMutt, связанная с переполнением буфера, позволяющая нарушителю выполнить произвольный код
BDU:2019-04579
Уязвимость функции sscanf в файле newsrc.c почтового клиента NeoMutt, связанная с ошибками при обработке объектов в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2019-04580
Уязвимость файла nntp.c почтового клиента NeoMutt, связанная с ошибками при обработке входных данных, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2018-14349
An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/command.c mishandles a NO response without a message.
- http://www.mutt.org/news.html
- http://www.mutt.org/news.html
- https://github.com/neomutt/neomutt/commit/36a29280448097f34ce9c94606195f2ac643fed1
- https://github.com/neomutt/neomutt/commit/36a29280448097f34ce9c94606195f2ac643fed1
- https://gitlab.com/muttmua/mutt/commit/9347b5c01dc52682cb6be11539d9b7ebceae4416
- https://gitlab.com/muttmua/mutt/commit/9347b5c01dc52682cb6be11539d9b7ebceae4416
- [debian-lts-announce] 20180802 [SECURITY] [DLA 1455-1] mutt security update
- [debian-lts-announce] 20180802 [SECURITY] [DLA 1455-1] mutt security update
- https://neomutt.org/2018/07/16/release
- https://neomutt.org/2018/07/16/release
- GLSA-201810-07
- GLSA-201810-07
- USN-3719-3
- USN-3719-3
- DSA-4277
- DSA-4277
Modified: 2024-11-21
CVE-2018-14350
An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long INTERNALDATE field.
- http://www.mutt.org/news.html
- http://www.mutt.org/news.html
- 104931
- 104931
- https://github.com/neomutt/neomutt/commit/1b0f0d0988e6df4e32e9f4bf8780846ea95d4485
- https://github.com/neomutt/neomutt/commit/1b0f0d0988e6df4e32e9f4bf8780846ea95d4485
- https://gitlab.com/muttmua/mutt/commit/3287534daa3beac68e2e83ca4b4fe8a3148ff870
- https://gitlab.com/muttmua/mutt/commit/3287534daa3beac68e2e83ca4b4fe8a3148ff870
- [debian-lts-announce] 20180802 [SECURITY] [DLA 1455-1] mutt security update
- [debian-lts-announce] 20180802 [SECURITY] [DLA 1455-1] mutt security update
- https://neomutt.org/2018/07/16/release
- https://neomutt.org/2018/07/16/release
- GLSA-201810-07
- GLSA-201810-07
- USN-3719-1
- USN-3719-1
- USN-3719-2
- USN-3719-2
- USN-3719-3
- USN-3719-3
- DSA-4277
- DSA-4277
Modified: 2024-11-21
CVE-2018-14351
An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/command.c mishandles a long IMAP status mailbox literal count size.
- http://www.mutt.org/news.html
- http://www.mutt.org/news.html
- https://github.com/neomutt/neomutt/commit/3c49c44be9b459d9c616bcaef6eb5d51298c1741
- https://github.com/neomutt/neomutt/commit/3c49c44be9b459d9c616bcaef6eb5d51298c1741
- https://gitlab.com/muttmua/mutt/commit/e57a8602b45f58edf7b3ffb61bb17525d75dfcb1
- https://gitlab.com/muttmua/mutt/commit/e57a8602b45f58edf7b3ffb61bb17525d75dfcb1
- [debian-lts-announce] 20180802 [SECURITY] [DLA 1455-1] mutt security update
- [debian-lts-announce] 20180802 [SECURITY] [DLA 1455-1] mutt security update
- https://neomutt.org/2018/07/16/release
- https://neomutt.org/2018/07/16/release
- GLSA-201810-07
- GLSA-201810-07
- USN-3719-3
- USN-3719-3
- DSA-4277
- DSA-4277
Modified: 2024-11-21
CVE-2018-14352
An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap_quote_string in imap/util.c does not leave room for quote characters, leading to a stack-based buffer overflow.
- http://www.mutt.org/news.html
- http://www.mutt.org/news.html
- https://github.com/neomutt/neomutt/commit/e27b65b3bf8defa34db58919496056caf3850cd4
- https://github.com/neomutt/neomutt/commit/e27b65b3bf8defa34db58919496056caf3850cd4
- https://gitlab.com/muttmua/mutt/commit/e0131852c6059107939893016c8ff56b6e42865d
- https://gitlab.com/muttmua/mutt/commit/e0131852c6059107939893016c8ff56b6e42865d
- [debian-lts-announce] 20180802 [SECURITY] [DLA 1455-1] mutt security update
- [debian-lts-announce] 20180802 [SECURITY] [DLA 1455-1] mutt security update
- https://neomutt.org/2018/07/16/release
- https://neomutt.org/2018/07/16/release
- GLSA-201810-07
- GLSA-201810-07
- USN-3719-1
- USN-3719-1
- USN-3719-2
- USN-3719-2
- USN-3719-3
- USN-3719-3
- DSA-4277
- DSA-4277
Modified: 2024-11-21
CVE-2018-14353
An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap_quote_string in imap/util.c has an integer underflow.
- http://www.mutt.org/news.html
- http://www.mutt.org/news.html
- https://github.com/neomutt/neomutt/commit/65d64a5b60a4a3883f2cd799d92c6091d8854f23
- https://github.com/neomutt/neomutt/commit/65d64a5b60a4a3883f2cd799d92c6091d8854f23
- https://gitlab.com/muttmua/mutt/commit/e0131852c6059107939893016c8ff56b6e42865d
- https://gitlab.com/muttmua/mutt/commit/e0131852c6059107939893016c8ff56b6e42865d
- [debian-lts-announce] 20180802 [SECURITY] [DLA 1455-1] mutt security update
- [debian-lts-announce] 20180802 [SECURITY] [DLA 1455-1] mutt security update
- https://neomutt.org/2018/07/16/release
- https://neomutt.org/2018/07/16/release
- GLSA-201810-07
- GLSA-201810-07
- USN-3719-1
- USN-3719-1
- USN-3719-3
- USN-3719-3
- DSA-4277
- DSA-4277
Modified: 2024-11-21
CVE-2018-14354
An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with a manual subscription or unsubscription.
- http://www.mutt.org/news.html
- http://www.mutt.org/news.html
- 104925
- 104925
- RHSA-2018:2526
- RHSA-2018:2526
- https://github.com/neomutt/neomutt/commit/95e80bf9ff10f68cb6443f760b85df4117cb15eb
- https://github.com/neomutt/neomutt/commit/95e80bf9ff10f68cb6443f760b85df4117cb15eb
- https://gitlab.com/muttmua/mutt/commit/185152818541f5cdc059cbff3f3e8b654fc27c1d
- https://gitlab.com/muttmua/mutt/commit/185152818541f5cdc059cbff3f3e8b654fc27c1d
- [debian-lts-announce] 20180802 [SECURITY] [DLA 1455-1] mutt security update
- [debian-lts-announce] 20180802 [SECURITY] [DLA 1455-1] mutt security update
- https://neomutt.org/2018/07/16/release
- https://neomutt.org/2018/07/16/release
- GLSA-201810-07
- GLSA-201810-07
- USN-3719-1
- USN-3719-1
- USN-3719-2
- USN-3719-2
- USN-3719-3
- USN-3719-3
- DSA-4277
- DSA-4277
Modified: 2024-11-21
CVE-2018-14355
An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/util.c mishandles ".." directory traversal in a mailbox name.
- http://www.mutt.org/news.html
- http://www.mutt.org/news.html
- https://github.com/neomutt/neomutt/commit/57971dba06346b2d7179294f4528b8d4427a7c5d
- https://github.com/neomutt/neomutt/commit/57971dba06346b2d7179294f4528b8d4427a7c5d
- https://gitlab.com/muttmua/mutt/commit/31eef6c766f47df8281942d19f76e35f475c781d
- https://gitlab.com/muttmua/mutt/commit/31eef6c766f47df8281942d19f76e35f475c781d
- [debian-lts-announce] 20180802 [SECURITY] [DLA 1455-1] mutt security update
- [debian-lts-announce] 20180802 [SECURITY] [DLA 1455-1] mutt security update
- https://neomutt.org/2018/07/16/release
- https://neomutt.org/2018/07/16/release
- GLSA-201810-07
- GLSA-201810-07
- USN-3719-3
- USN-3719-3
- DSA-4277
- DSA-4277
Modified: 2024-11-21
CVE-2018-14356
An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop.c mishandles a zero-length UID.
- http://www.mutt.org/news.html
- http://www.mutt.org/news.html
- https://github.com/neomutt/neomutt/commit/93b8ac558752d09e1c56d4f1bc82631316fa9c82
- https://github.com/neomutt/neomutt/commit/93b8ac558752d09e1c56d4f1bc82631316fa9c82
- https://gitlab.com/muttmua/mutt/commit/e154cba1b3fc52bb8cb8aa846353c0db79b5d9c6
- https://gitlab.com/muttmua/mutt/commit/e154cba1b3fc52bb8cb8aa846353c0db79b5d9c6
- [debian-lts-announce] 20180802 [SECURITY] [DLA 1455-1] mutt security update
- [debian-lts-announce] 20180802 [SECURITY] [DLA 1455-1] mutt security update
- https://neomutt.org/2018/07/16/release
- https://neomutt.org/2018/07/16/release
- GLSA-201810-07
- GLSA-201810-07
- USN-3719-3
- USN-3719-3
- DSA-4277
- DSA-4277
Modified: 2024-11-21
CVE-2018-14357
An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with an automatic subscription.
- http://www.mutt.org/news.html
- http://www.mutt.org/news.html
- RHSA-2018:2526
- RHSA-2018:2526
- https://github.com/neomutt/neomutt/commit/e52393740334443ae0206cab2d7caef381646725
- https://github.com/neomutt/neomutt/commit/e52393740334443ae0206cab2d7caef381646725
- https://gitlab.com/muttmua/mutt/commit/185152818541f5cdc059cbff3f3e8b654fc27c1d
- https://gitlab.com/muttmua/mutt/commit/185152818541f5cdc059cbff3f3e8b654fc27c1d
- [debian-lts-announce] 20180802 [SECURITY] [DLA 1455-1] mutt security update
- [debian-lts-announce] 20180802 [SECURITY] [DLA 1455-1] mutt security update
- https://neomutt.org/2018/07/16/release
- https://neomutt.org/2018/07/16/release
- GLSA-201810-07
- GLSA-201810-07
- USN-3719-1
- USN-3719-1
- USN-3719-3
- USN-3719-3
- DSA-4277
- DSA-4277
Modified: 2024-11-21
CVE-2018-14358
An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long RFC822.SIZE field.
- http://www.mutt.org/news.html
- http://www.mutt.org/news.html
- https://github.com/neomutt/neomutt/commit/1b0f0d0988e6df4e32e9f4bf8780846ea95d4485
- https://github.com/neomutt/neomutt/commit/1b0f0d0988e6df4e32e9f4bf8780846ea95d4485
- https://gitlab.com/muttmua/mutt/commit/3287534daa3beac68e2e83ca4b4fe8a3148ff870
- https://gitlab.com/muttmua/mutt/commit/3287534daa3beac68e2e83ca4b4fe8a3148ff870
- [debian-lts-announce] 20180802 [SECURITY] [DLA 1455-1] mutt security update
- [debian-lts-announce] 20180802 [SECURITY] [DLA 1455-1] mutt security update
- https://neomutt.org/2018/07/16/release
- https://neomutt.org/2018/07/16/release
- GLSA-201810-07
- GLSA-201810-07
- USN-3719-1
- USN-3719-1
- USN-3719-3
- USN-3719-3
- DSA-4277
- DSA-4277
Modified: 2024-11-21
CVE-2018-14359
An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They have a buffer overflow via base64 data.
- http://www.mutt.org/news.html
- http://www.mutt.org/news.html
- https://github.com/neomutt/neomutt/commit/6f163e07ae68654d7ac5268cbb7565f6df79ad85
- https://github.com/neomutt/neomutt/commit/6f163e07ae68654d7ac5268cbb7565f6df79ad85
- https://gitlab.com/muttmua/mutt/commit/3d9028fec8f4d08db2251096307c0bbbebce669a
- https://gitlab.com/muttmua/mutt/commit/3d9028fec8f4d08db2251096307c0bbbebce669a
- [debian-lts-announce] 20180802 [SECURITY] [DLA 1455-1] mutt security update
- [debian-lts-announce] 20180802 [SECURITY] [DLA 1455-1] mutt security update
- https://neomutt.org/2018/07/16/release
- https://neomutt.org/2018/07/16/release
- GLSA-201810-07
- GLSA-201810-07
- USN-3719-1
- USN-3719-1
- USN-3719-2
- USN-3719-2
- USN-3719-3
- USN-3719-3
- DSA-4277
- DSA-4277
Modified: 2024-11-21
CVE-2018-14360
An issue was discovered in NeoMutt before 2018-07-16. nntp_add_group in newsrc.c has a stack-based buffer overflow because of incorrect sscanf usage.
- https://github.com/neomutt/neomutt/commit/6296f7153f0c9d5e5cd3aaf08f9731e56621bdd3
- https://github.com/neomutt/neomutt/commit/6296f7153f0c9d5e5cd3aaf08f9731e56621bdd3
- [debian-lts-announce] 20180802 [SECURITY] [DLA 1455-1] mutt security update
- [debian-lts-announce] 20180802 [SECURITY] [DLA 1455-1] mutt security update
- https://neomutt.org/2018/07/16/release
- https://neomutt.org/2018/07/16/release
- DSA-4277
- DSA-4277
Modified: 2024-11-21
CVE-2018-14361
An issue was discovered in NeoMutt before 2018-07-16. nntp.c proceeds even if memory allocation fails for messages data.
- https://github.com/neomutt/neomutt/commit/9e927affe3a021175f354af5fa01d22657c20585
- https://github.com/neomutt/neomutt/commit/9e927affe3a021175f354af5fa01d22657c20585
- [debian-lts-announce] 20180802 [SECURITY] [DLA 1455-1] mutt security update
- [debian-lts-announce] 20180802 [SECURITY] [DLA 1455-1] mutt security update
- https://neomutt.org/2018/07/16/release
- https://neomutt.org/2018/07/16/release
- DSA-4277
- DSA-4277
Modified: 2024-11-21
CVE-2018-14362
An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop.c does not forbid characters that may have unsafe interaction with message-cache pathnames, as demonstrated by a '/' character.
- http://www.mutt.org/news.html
- http://www.mutt.org/news.html
- RHSA-2018:2526
- RHSA-2018:2526
- https://github.com/neomutt/neomutt/commit/9bfab35522301794483f8f9ed60820bdec9be59e
- https://github.com/neomutt/neomutt/commit/9bfab35522301794483f8f9ed60820bdec9be59e
- https://gitlab.com/muttmua/mutt/commit/6aed28b40a0410ec47d40c8c7296d8d10bae7576
- https://gitlab.com/muttmua/mutt/commit/6aed28b40a0410ec47d40c8c7296d8d10bae7576
- [debian-lts-announce] 20180802 [SECURITY] [DLA 1455-1] mutt security update
- [debian-lts-announce] 20180802 [SECURITY] [DLA 1455-1] mutt security update
- https://neomutt.org/2018/07/16/release
- https://neomutt.org/2018/07/16/release
- GLSA-201810-07
- GLSA-201810-07
- USN-3719-3
- USN-3719-3
- DSA-4277
- DSA-4277
Modified: 2024-11-21
CVE-2018-14363
An issue was discovered in NeoMutt before 2018-07-16. newsrc.c does not properly restrict '/' characters that may have unsafe interaction with cache pathnames.
- https://github.com/neomutt/neomutt/commit/9bfab35522301794483f8f9ed60820bdec9be59e
- https://github.com/neomutt/neomutt/commit/9bfab35522301794483f8f9ed60820bdec9be59e
- [debian-lts-announce] 20180802 [SECURITY] [DLA 1455-1] mutt security update
- [debian-lts-announce] 20180802 [SECURITY] [DLA 1455-1] mutt security update
- https://neomutt.org/2018/07/16/release
- https://neomutt.org/2018/07/16/release
- DSA-4277
- DSA-4277