Bug 14707 - mutt new security issue CVE-2014-9116
Summary: mutt new security issue CVE-2014-9116
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 4
Hardware: i586 Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL: http://lwn.net/Vulnerabilities/623865/
Whiteboard: has_procedure advisory MGA4-32-OK MGA...
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2014-12-01 23:02 CET by David Walser
Modified: 2014-12-05 16:54 CET (History)
4 users (show)

See Also:
Source RPM: mutt-1.5.21-12.1.mga4.src.rpm
CVE:
Status comment:


Attachments
Mageia SVN diff for update to 1.5.23 (714.31 KB, patch)
2014-12-03 14:53 CET, Theodoros Kalamatianos
Details | Diff

Description David Walser 2014-12-01 23:02:59 CET
Debian has issued an advisory on November 30:
https://www.debian.org/security/2014/dsa-3083

Patched packages uploaded for Mageia 4 and Cauldron.

Advisory:
========================

Updated mutt packages fix security vulnerability:

A flaw was discovered in mutt. A specially crafted mail header could cause
mutt to crash, leading to a denial of service condition (CVE-2014-9116).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9116
https://www.debian.org/security/2014/dsa-3083
========================

Updated packages in core/updates_testing:
========================
mutt-1.5.21-12.2.mga4
mutt-utf8-1.5.21-12.2.mga4
mutt-doc-1.5.21-12.2.mga4

from mutt-1.5.21-12.2.mga4.src.rpm

Reproducible: 

Steps to Reproduce:
Comment 1 David Walser 2014-12-02 15:28:40 CET
PoC is here on the upstream bug (hit enter once mutt starts):
http://dev.mutt.org/trac/ticket/3716

Unfortunately even with the update it still segfaults for me.  Maybe we need to update to 1.5.21 and use the patch from Debian sid?

Jerome, perhaps you could have a look at this?

CC: (none) => qa-bugs
Assignee: qa-bugs => jquelin
Whiteboard: (none) => has_procedure

Comment 2 Theodoros Kalamatianos 2014-12-03 14:53:36 CET
Created attachment 5676 [details]
Mageia SVN diff for update to 1.5.23

This is an update of Mutt to 1.5.23. Several patches have been rediffed and the latest patch for Mutt ticket #3716 has been applied.

On my own system (Cauldron/x86_64) Mutt no longer crashes with the Debian crasher.mbox PoC.

CC: (none) => thkala

Comment 3 David Walser 2014-12-03 17:58:16 CET
Theodoros, thank you so much for this, it was very helpful!

I have committed everything in SVN for Mageia 4 and Cauldron, and requested a freeze push for Cauldron.  I have confirmed that it works and fixes the new CVE with a local Mageia 4 build.  I will push the update to the build system once the Cauldron update is pushed.
Comment 4 David Walser 2014-12-04 15:03:34 CET
Updated packages uploaded for Mageia 4 and Cauldron.

Advisory:
========================

Updated mutt packages fix security vulnerability:

A flaw was discovered in mutt. A specially crafted mail header could cause
mutt to crash, leading to a denial of service condition (CVE-2014-9116).

The mutt package has been updated to version 1.5.23 and patched to fix this
issue.

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9116
https://www.debian.org/security/2014/dsa-3083
========================

Updated packages in core/updates_testing:
========================
mutt-1.5.23-1.mga4
mutt-utf8-1.5.23-1.mga4
mutt-doc-1.5.23-1.mga4

from mutt-1.5.23-1.mga4.src.rpm

CC: qa-bugs => jquelin
Assignee: jquelin => qa-bugs

Comment 5 David Walser 2014-12-04 16:28:07 CET
Fix verified with the update from the build system, Mageia 4 i586.

Whiteboard: has_procedure => has_procedure MGA4-32-OK

Comment 6 olivier charles 2014-12-04 22:49:46 CET
Testing on Mageia4x64 real hardware

From current packages :
---------------------
- mutt-1.5.21-12.1.mga4.x86_64
- mutt-doc-1.5.21-12.1.mga4.x86_64
- mutt-utf8-1.5.21-12.1.mga4.x86_64

Using PoC,
Downloaded testfile (crasher.mbox)
$ mutt -R -f crasher.mbox -e 'set weed=no'
produced a segmentation fault.

To updated testing packages :
---------------------------
- mutt-1.5.23-1.mga4.x86_64
- mutt-doc-1.5.23-1.mga4.x86_64
- mutt-utf8-1.5.23-1.mga4.x86_64

$ mutt -R -f crasher.mbox -e 'set weed=no'
No segmentation fault

Configured mutt (with .muttrc file) : could retrieve mails from
my gmail account, read, delete...

OK then

CC: (none) => olchal
Whiteboard: has_procedure MGA4-32-OK => has_procedure MGA4-32-OK MGA4-64-OK

Comment 7 claire robinson 2014-12-05 16:18:58 CET
Validating. Advisory uploaded.

Please push to updates

Thanks

Keywords: (none) => validated_update
Whiteboard: has_procedure MGA4-32-OK MGA4-64-OK => has_procedure advisory MGA4-32-OK MGA4-64-OK
CC: (none) => sysadmin-bugs

Comment 8 Mageia Robot 2014-12-05 16:54:52 CET
An update for this issue has been pushed to Mageia Updates repository.

http://advisories.mageia.org/MGASA-2014-0509.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.