Your message dated Fri, 17 Aug 2018 21:02:08 +0000
with message-id <e1fqlsm-000frf...@fasolo.debian.org>
and subject line Bug#904051: fixed in mutt 1.7.2-1+deb9u1
has caused the Debian Bug report #904051,
regarding mutt: CVE-2018-14362 CVE-2018-14359 CVE-2018-14358 CVE-2018-14357
CVE-2018-14356 CVE-2018-14355 CVE-2018-14354 CVE-2018-14353 CVE-2018-14352
CVE-2018-14351 CVE-2018-14350 CVE-2018-14349
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
904051: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904051
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: mutt
Version: 1.7.2-1
Severity: grave
Tags: security upstream
Justification: user security hole
Hi,
The following vulnerabilities were published for mutt.
CVE-2018-14362[0]:
| An issue was discovered in Mutt before 1.10.1 and NeoMutt before
| 2018-07-16. pop.c does not forbid characters that may have unsafe
| interaction with message-cache pathnames, as demonstrated by a '/'
| character.
CVE-2018-14359[1]:
| An issue was discovered in Mutt before 1.10.1 and NeoMutt before
| 2018-07-16. They have a buffer overflow via base64 data.
CVE-2018-14358[2]:
| An issue was discovered in Mutt before 1.10.1 and NeoMutt before
| 2018-07-16. imap/message.c has a stack-based buffer overflow for a
| FETCH response with a long RFC822.SIZE field.
CVE-2018-14357[3]:
| An issue was discovered in Mutt before 1.10.1 and NeoMutt before
| 2018-07-16. They allow remote IMAP servers to execute arbitrary
| commands via backquote characters, related to the mailboxes command
| associated with an automatic subscription.
CVE-2018-14356[4]:
| An issue was discovered in Mutt before 1.10.1 and NeoMutt before
| 2018-07-16. pop.c mishandles a zero-length UID.
CVE-2018-14355[5]:
| An issue was discovered in Mutt before 1.10.1 and NeoMutt before
| 2018-07-16. imap/util.c mishandles ".." directory traversal in a
| mailbox name.
CVE-2018-14354[6]:
| An issue was discovered in Mutt before 1.10.1 and NeoMutt before
| 2018-07-16. They allow remote IMAP servers to execute arbitrary
| commands via backquote characters, related to the mailboxes command
| associated with a manual subscription or unsubscription.
CVE-2018-14353[7]:
| An issue was discovered in Mutt before 1.10.1 and NeoMutt before
| 2018-07-16. imap_quote_string in imap/util.c has an integer underflow.
CVE-2018-14352[8]:
| An issue was discovered in Mutt before 1.10.1 and NeoMutt before
| 2018-07-16. imap_quote_string in imap/util.c does not leave room for
| quote characters, leading to a stack-based buffer overflow.
CVE-2018-14351[9]:
| An issue was discovered in Mutt before 1.10.1 and NeoMutt before
| 2018-07-16. imap/command.c mishandles a long IMAP status mailbox
| literal count size.
CVE-2018-14350[10]:
| An issue was discovered in Mutt before 1.10.1 and NeoMutt before
| 2018-07-16. imap/message.c has a stack-based buffer overflow for a
| FETCH response with a long INTERNALDATE field.
CVE-2018-14349[11]:
| An issue was discovered in Mutt before 1.10.1 and NeoMutt before
| 2018-07-16. imap/command.c mishandles a NO response without a message.
If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2018-14362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14362
[1] https://security-tracker.debian.org/tracker/CVE-2018-14359
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14359
[2] https://security-tracker.debian.org/tracker/CVE-2018-14358
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14358
[3] https://security-tracker.debian.org/tracker/CVE-2018-14357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14357
[4] https://security-tracker.debian.org/tracker/CVE-2018-14356
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14356
[5] https://security-tracker.debian.org/tracker/CVE-2018-14355
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14355
[6] https://security-tracker.debian.org/tracker/CVE-2018-14354
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14354
[7] https://security-tracker.debian.org/tracker/CVE-2018-14353
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14353
[8] https://security-tracker.debian.org/tracker/CVE-2018-14352
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14352
[9] https://security-tracker.debian.org/tracker/CVE-2018-14351
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14351
[10] https://security-tracker.debian.org/tracker/CVE-2018-14350
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14350
[11] https://security-tracker.debian.org/tracker/CVE-2018-14349
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14349
Please adjust the affected versions in the BTS as needed.
Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: mutt
Source-Version: 1.7.2-1+deb9u1
We believe that the bug you reported is fixed in the latest version of
mutt, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 904...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Antonio Radici <anto...@debian.org> (supplier of updated mutt package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Tue, 07 Aug 2018 09:48:44 +0100
Source: mutt
Binary: mutt
Architecture: source
Version: 1.7.2-1+deb9u1
Distribution: stretch-security
Urgency: high
Maintainer: Mutt maintainers <pkg-mutt-maintain...@lists.alioth.debian.org>
Changed-By: Antonio Radici <anto...@debian.org>
Description:
mutt - text-based mailreader supporting MIME, GPG, PGP and threading
Closes: 904051
Changes:
mutt (1.7.2-1+deb9u1) stretch-security; urgency=high
.
* Initial changelog entries for security update (Closes: 904051)
* Patches provided by Roberto C. Sánchez <robe...@debian.org>
+ Fix arbitrary command execution by remote IMAP servers via backquote
characters, related to the mailboxes command associated with a manual
subscription or unsubscription (CVE-2018-14354)
+ Fix arbitrary command execution by remote IMAP servers via backquote
characters, related to the mailboxes command associated with an automatic
subscription (CVE-2018-14357)
+ Fix a stack-based buffer overflow caused by imap_quote_string() not
leaving room for quote characters (CVE-2018-14352)
+ Fix an integer underflow in imap_quote_string() (CVE-2018-14353)
+ Fix mishandling of zero-length UID in pop.c (CVE-2018-14356)
+ Fix unsafe interaction between message-cache pathnames and certain
characters in pop.c (CVE-2018-14362)
+ Fix mishandling of ".." directory traversal in IMAP mailbox name
(CVE-2018-14355)
+ Fix a stack-based buffer overflow for an IMAP FETCH response with a long
INTERNALDATE field (CVE-2018-14350)
+ Fix a stack-based buffer overflow for an IMAP FETCH response with a long
RFC822.SIZE field (CVE-2018-14358)
+ Fix mishandling of an IMAP NO response without a message (CVE-2018-14349)
+ Fix mishandling of long IMAP status mailbox literal count size
(CVE-2018-14351)
+ Fix a buffer overflow via base64 data (CVE-2018-14359)
+ Fix a stack-based buffer overflow because of incorrect sscanf usage
(CVE-2018-14360)
+ Fix a defect where processing continues if memory allocation fails for
NNTP messages (CVE-2018-14361)
* Fix unsafe interaction between message-cache pathnames and certain
characters in newsrc.c (CVE-2018-14363)
Checksums-Sha1:
ee6cbca7086be8f154a12c8dd1c7691af3fb8d3a 2261 mutt_1.7.2-1+deb9u1.dsc
39be2b552b99ed16f263487017c68cdbc1c7b384 4025880 mutt_1.7.2.orig.tar.gz
f9016623034e6c882c989fa155e9ad1f6180053a 942128
mutt_1.7.2-1+deb9u1.debian.tar.xz
46d6d2d1705ffcddd4dcf707b39f355f760949a9 8197
mutt_1.7.2-1+deb9u1_amd64.buildinfo
Checksums-Sha256:
444b1ae5aa891a062cf384eba463b5b3890f165001bf48a660323d6994fad6c6 2261
mutt_1.7.2-1+deb9u1.dsc
1553501687cd22d5b8aaee4dc5a7d9dcf6cc61d7956f6aabaadd252d10cd5ff9 4025880
mutt_1.7.2.orig.tar.gz
2cdb980933fc6c17869af79ae2f574193b1bf3883e8dd514ddc552430590ded6 942128
mutt_1.7.2-1+deb9u1.debian.tar.xz
840f8e44945e240b1bfc4b2dd24084fa84c1d41a0833007715a821ef700742aa 8197
mutt_1.7.2-1+deb9u1_amd64.buildinfo
Files:
6d8db98e29b0fa03b1771fbbc513036a 2261 mail optional mutt_1.7.2-1+deb9u1.dsc
15425c4c9946d58c22ccb44901544e6d 4025880 mail optional mutt_1.7.2.orig.tar.gz
01f386aeba296788821facd530dfa6de 942128 mail optional
mutt_1.7.2-1+deb9u1.debian.tar.xz
4ed1cded4d079c153ae39af449715077 8197 mail optional
mutt_1.7.2-1+deb9u1_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----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=YAgc
-----END PGP SIGNATURE-----
--- End Message ---