Your message dated Sun, 10 Sep 2023 11:12:35 +0000
with message-id <e1qfiml-003wut...@fasolo.debian.org>
and subject line Bug#1051563: fixed in mutt 2.2.12-0.1
has caused the Debian Bug report #1051563,
regarding mutt: CVE-2023-4874 CVE-2023-4875
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1051563: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051563
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: mutt
Version: 2.2.9-1
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerabilities were published for mutt.

CVE-2023-4874[0]:
| Null pointer dereference when viewing a specially crafted email in
| Mutt >1.5.2 <2.2.12


CVE-2023-4875[1]:
| Null pointer dereference when composing from a specially crafted
| draft message in Mutt >1.5.2 <2.2.12

Make sure to include all three commits referenced from [2], the last
one is technically not part of the two CVEs, but another crash found
by upstream.

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-4874
    https://www.cve.org/CVERecord?id=CVE-2023-4874
[1] https://security-tracker.debian.org/tracker/CVE-2023-4875
    https://www.cve.org/CVERecord?id=CVE-2023-4875
[2] 
http://lists.mutt.org/pipermail/mutt-announce/Week-of-Mon-20230904/000056.html

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Source: mutt
Source-Version: 2.2.12-0.1
Done: Sebastian Andrzej Siewior <sebast...@breakpoint.cc>

We believe that the bug you reported is fixed in the latest version of
mutt, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1051...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Sebastian Andrzej Siewior <sebast...@breakpoint.cc> (supplier of updated mutt 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sun, 10 Sep 2023 12:21:34 +0200
Source: mutt
Architecture: source
Version: 2.2.12-0.1
Distribution: unstable
Urgency: medium
Maintainer: Mutt maintainers <m...@packages.debian.org>
Changed-By: Sebastian Andrzej Siewior <sebast...@breakpoint.cc>
Closes: 1051563
Changes:
 mutt (2.2.12-0.1) unstable; urgency=medium
 .
   * Non-maintainer upload.
   * New upstream release (Closes: #1051563).
     - CVE-2023-4874 ("Null pointer dereference when viewing a specially
       crafted email).
     - CVE-2023-4875 ("Null pointer dereference when composing from a specially
       crafted draft message").
Checksums-Sha1:
 bcd3a53f911d60b905c73c4b5041e7c7cc8c4720 2122 mutt_2.2.12-0.1.dsc
 11107acfd21617a3a063a9ee16f21aedc8b8594f 5539244 mutt_2.2.12.orig.tar.gz
 59b657d0ad60c19e5cf6eb9d86aa812afd481f35 833 mutt_2.2.12.orig.tar.gz.asc
 18994ae51d1f04b365542ba3853643494fc2caea 61952 mutt_2.2.12-0.1.debian.tar.xz
Checksums-Sha256:
 38136ad23ab01826aa6a926f21eadeea083ce18e7a2a78261ebf4ab55d42cf24 2122 
mutt_2.2.12-0.1.dsc
 043af312f64b8e56f7fd0bf77f84a205d4c498030bd9586457665c47bb18ce38 5539244 
mutt_2.2.12.orig.tar.gz
 4fdbbb4369d8f1ee55937feaf1d3f090867b05a1e646b036f830171ce238db84 833 
mutt_2.2.12.orig.tar.gz.asc
 7704b58ab675d9a48a676e9974c9ec725ffa6ff90372877a5f9510d8bf05adb3 61952 
mutt_2.2.12-0.1.debian.tar.xz
Files:
 5262930f62024cec1f2ac3591062a45d 2122 mail optional mutt_2.2.12-0.1.dsc
 5b3e1feb8473bf64847d1fd85084dbb0 5539244 mail optional mutt_2.2.12.orig.tar.gz
 5c8d450ebe83630b4646c5fbc2540ada 833 mail optional mutt_2.2.12.orig.tar.gz.asc
 2e7b897574f0b27479069d68656d3673 61952 mail optional 
mutt_2.2.12-0.1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=j6Q9
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to