Univention Bugzilla – Full Text Bug Listing |
Summary: | mutt: Multiple issues (4.2) | ||
---|---|---|---|
Product: | UCS | Reporter: | Quality Assurance <qa> |
Component: | Security updates | Assignee: | Quality Assurance <qa> |
Status: | CLOSED FIXED | QA Contact: | Philipp Hahn <hahn> |
Severity: | normal | ||
Priority: | P3 | ||
Version: | UCS 4.2 | ||
Target Milestone: | UCS 4.2-4-errata | ||
Hardware: | All | ||
OS: | Linux | ||
What kind of report is it?: | Security Issue | What type of bug is this?: | --- |
Who will be affected by this bug?: | --- | How will those affected feel about the bug?: | --- |
User Pain: | Enterprise Customer affected?: | ||
School Customer affected?: | ISV affected?: | ||
Waiting Support: | Flags outvoted (downgraded) after PO Review: | ||
Ticket number: | Bug group (optional): | ||
Max CVSS v3 score: | 9.6 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H) |
Description
Quality Assurance
2018-08-09 10:17:30 CEST
--- mirror/ftp/4.2/unmaintained/4.2-0/source/mutt_1.5.23-3.dsc +++ apt/ucs_4.2-0-errata4.2-4/source/mutt_1.5.23-3+deb8u1.dsc @@ -1,6 +1,38 @@ +1.5.23-3+deb8u1 [Fri, 27 Jul 2018 22:20:50 -0400] Roberto C. Sanchez <roberto@debian.org>: + + * Non-maintainer upload by the LTS Team. (Closes: 904051) + * Fix arbitrary command execution by remote IMAP servers via backquote + characters, related to the mailboxes command associated with a manual + subscription or unsubscription (CVE-2018-14354) + * Fix arbitrary command execution by remote IMAP servers via backquote + characters, related to the mailboxes command associated with an automatic + subscription (CVE-2018-14357) + * Fix a stack-based buffer overflow caused by imap_quote_string() not + leaving room for quote characters (CVE-2018-14352) + * Fix an integer underflow in imap_quote_string() (CVE-2018-14353) + * Fix mishandling of zero-length UID in pop.c (CVE-2018-14356) + * Fix unsafe interaction between message-cache pathnames and certain + characters in pop.c (CVE-2018-14362) + * Fix mishandling of ".." directory traversal in IMAP mailbox name + (CVE-2018-14355) + * Fix a stack-based buffer overflow for an IMAP FETCH response with a long + INTERNALDATE field (CVE-2018-14350) + * Fix a stack-based buffer overflow for an IMAP FETCH response with a long + RFC822.SIZE field (CVE-2018-14358) + * Fix mishandling of an IMAP NO response without a message (CVE-2018-14349) + * Fix mishandling of long IMAP status mailbox literal count size + (CVE-2018-14351) + * Fix a buffer overflow via base64 data (CVE-2018-14359) + * Fix a stack-based buffer overflow because of incorrect sscanf usage + (CVE-2018-14360) + * Fix a defect where processing continues if memory allocation fails for + NNTP messages (CVE-2018-14361) + * Fix unsafe interaction between message-cache pathnames and certain + characters in newsrc.c (CVE-2018-14363) + 1.5.23-3 [Thu, 04 Dec 2014 21:09:07 +0000] Antonio Radici <antonio@dyne.org>: * Fixed upstream/771125-CVE-2014-9116-jessie.patch thanks to Salvatore Bonaccorso; now it correctly fixes the CVE and does not affect other - functionalities of mutt (Closes: 771674) + functionalities of mutt (Closes: 771674) <http://10.200.17.11/4.2-4/#5998964184392568087> OK: piuparts OK: patch OK: errata-announce [4.2-4] 1b4e7f641b Bug #47521: mutt 1.5.23-3+deb8u1 doc/errata/staging/mutt.yaml | 52 ++++++++++++++++---------------------------- 1 file changed, 19 insertions(+), 33 deletions(-) [4.2-4] 3fcdbaef3b Bug #47521: mutt 1.5.23-3+deb8u1 doc/errata/staging/mutt.yaml | 57 ++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 57 insertions(+) |