Bug 23345 - mutt new security issues CVE-2018-14349, CVE-2018-1435[0-9], CVE-2018-1436[0-3]
Summary: mutt new security issues CVE-2018-14349, CVE-2018-1435[0-9], CVE-2018-1436[0-3]
Status: ASSIGNED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 6
Hardware: All Linux
Priority: Normal major
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2018-07-24 18:24 CEST by David Walser
Modified: 2018-10-12 01:14 CEST (History)
1 user (show)

See Also:
Source RPM: mutt-1.10.0-1.mga7.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2018-07-24 18:24:17 CEST
Ubuntu has issued an advisory on July 23:
https://usn.ubuntu.com/3719-1/

The issues are fixed upstream in 1.10.1.

Mageia 5 and Mageia 6 are also affected.
David Walser 2018-07-24 18:24:33 CEST

Whiteboard: (none) => MGA6TOO

Comment 1 David Walser 2018-08-02 17:34:01 CEST
SUSE has issued an advisory on July 27:
http://lists.suse.com/pipermail/sle-security-updates/2018-July/004326.html

It fixes these and a few more issues.

Summary: mutt new security issues CVE-2018-14349, CVE-2018-1435[0-9], CVE-2018-14362 => mutt new security issues CVE-2018-14349, CVE-2018-1435[0-9], CVE-2018-1436[0-3]

Comment 3 David Walser 2018-08-06 22:01:18 CEST
openSUSE has issued an advisory for this today (August 6):
https://lists.opensuse.org/opensuse-updates/2018-08/msg00027.html
Comment 4 David Walser 2018-08-10 00:21:45 CEST
mutt-1.10.1-1.mga7 uploaded for Cauldron by Jani.

Whiteboard: MGA6TOO => (none)
Version: Cauldron => 6

Comment 5 David Walser 2018-10-10 00:39:19 CEST
Ubuntu has issued an updated advisory for this on September 28:
https://usn.ubuntu.com/3719-3/
Comment 6 Bruno Cornec 2018-10-11 01:54:17 CEST
I pushed mutt 1.10.1 for 6 in core/updates_testing

Target Milestone: --- => Mageia 6
Assignee: jani.valimaa => qa-bugs
Status: NEW => ASSIGNED
CC: (none) => bruno

Comment 7 David Walser 2018-10-12 01:14:13 CEST
Advisory:
========================

Updated mutt package fixes security vulnerabilities:

It was discovered that Mutt incorrectly handled certain requests. An attacker
could possibly use this to execute arbitrary code (CVE-2018-14350,
CVE-2018-14352, CVE-2018-14354, CVE-2018-14359, CVE-2018-14358, CVE-2018-14353
,CVE-2018-14357).

It was discovered that Mutt incorrectly handled certain inputs. An attacker
could possibly use this to access or expose sensitive information
(CVE-2018-14355, CVE-2018-14356, CVE-2018-14351, CVE-2018-14362,
CVE-2018-14349).

nntp_add_group in newsrc.c has a stack-based buffer overflow because of
incorrect sscanf usage (CVE-2018-14360).

nntp.c proceeds even if memory allocation fails for messages data (CVE-2018-14361).

newsrc.c does not properlyrestrict '/' characters that may have unsafe
interaction with cache pathnames (CVE-2018-14363).

References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14349
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14350
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14351
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14352
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14353
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14354
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14355
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14356
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14358
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14359
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14360
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14361
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14363
https://usn.ubuntu.com/3719-1/
https://lists.opensuse.org/opensuse-updates/2018-08/msg00027.html
========================

Updated packages in core/updates_testing:
========================
mutt-1.10.1-1.1.mga6
mutt-utf8-1.10.1-1.1.mga6
mutt-doc-1.10.1-1.1.mga6

from mutt-1.10.1-1.1.mga6.src.rpm

Target Milestone: Mageia 6 => ---


Note You need to log in before you can comment on or make changes to this bug.