{"affected":[{"ecosystem_specific":{"binaries":[{"mutt":"1.10.1-55.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Desktop 12 SP3","name":"mutt","purl":"pkg:rpm/suse/mutt&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.10.1-55.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"mutt":"1.10.1-55.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP3","name":"mutt","purl":"pkg:rpm/suse/mutt&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.10.1-55.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"mutt":"1.10.1-55.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","name":"mutt","purl":"pkg:rpm/suse/mutt&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.10.1-55.3.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for mutt fixes the following issues:\n\nSecurity issues fixed:\n\n- bsc#1101428: Mutt 1.10.1 security release update.\n- CVE-2018-14351: Fix imap/command.c that mishandles long IMAP status mailbox literal count size (bsc#1101583).\n- CVE-2018-14353: Fix imap_quote_string in imap/util.c that has an integer underflow (bsc#1101581).\n- CVE-2018-14362: Fix pop.c that does not forbid characters that may have unsafe interaction with message-cache pathnames (bsc#1101567).\n- CVE-2018-14354: Fix arbitrary command execution from remote IMAP servers via backquote characters (bsc#1101578).\n- CVE-2018-14352: Fix imap_quote_string in imap/util.c that does not leave room for quote characters (bsc#1101582).\n- CVE-2018-14356: Fix pop.c that mishandles a zero-length UID (bsc#1101576).\n- CVE-2018-14355: Fix imap/util.c that mishandles '..' directory traversal in a mailbox name (bsc#1101577).\n- CVE-2018-14349: Fix imap/command.c that mishandles a NO response without a message (bsc#1101589).\n- CVE-2018-14350: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along INTERNALDATE field (bsc#1101588).\n- CVE-2018-14363: Fix newsrc.c that does not properlyrestrict '/' characters that may have unsafe interaction with cache pathnames (bsc#1101566).\n- CVE-2018-14359: Fix buffer overflow via base64 data (bsc#1101570).\n- CVE-2018-14358: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along RFC822.SIZE field (bsc#1101571).\n- CVE-2018-14360: Fix nntp_add_group in newsrc.c that has a stack-based buffer overflow because of incorrect sscanf usage (bsc#1101569).\n- CVE-2018-14357: Fix that remote IMAP servers are allowed to execute arbitrary commands via backquote characters (bsc#1101573).\n- CVE-2018-14361: Fix that nntp.c proceeds even if memory allocation fails for messages data (bsc#1101568).\n\nBug fixes:\n\n- mutt reports as neomutt and incorrect version (bsc#1094717)\n- No sidebar available in mutt 1.6.1 from Tumbleweed snapshot 20160517 (bsc#980830)\n- mutt-1.6.1 unusable when built with --enable-sidebar (bsc#982129)\n- (neo)mutt displaying times in Zulu time (bsc#1061343)\n- mutt unconditionally segfaults when displaying a message (bsc#986534)\n","id":"SUSE-SU-2018:2084-1","modified":"2018-07-27T10:45:47Z","published":"2018-07-27T10:45:47Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2018/suse-su-20182084-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1061343"},{"type":"REPORT","url":"https://bugzilla.suse.com/1094717"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101428"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101566"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101567"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101568"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101569"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101570"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101571"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101573"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101576"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101577"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101578"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101581"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101582"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101583"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101588"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101589"},{"type":"REPORT","url":"https://bugzilla.suse.com/980830"},{"type":"REPORT","url":"https://bugzilla.suse.com/982129"},{"type":"REPORT","url":"https://bugzilla.suse.com/986534"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-9116"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14349"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14350"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14351"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14352"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14353"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14354"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14355"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14356"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14357"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14358"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14359"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14360"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14361"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14362"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14363"}],"related":["CVE-2014-9116","CVE-2018-14349","CVE-2018-14350","CVE-2018-14351","CVE-2018-14352","CVE-2018-14353","CVE-2018-14354","CVE-2018-14355","CVE-2018-14356","CVE-2018-14357","CVE-2018-14358","CVE-2018-14359","CVE-2018-14360","CVE-2018-14361","CVE-2018-14362","CVE-2018-14363"],"summary":"Security update for mutt","upstream":["CVE-2014-9116","CVE-2018-14349","CVE-2018-14350","CVE-2018-14351","CVE-2018-14352","CVE-2018-14353","CVE-2018-14354","CVE-2018-14355","CVE-2018-14356","CVE-2018-14357","CVE-2018-14358","CVE-2018-14359","CVE-2018-14360","CVE-2018-14361","CVE-2018-14362","CVE-2018-14363"]}