Debian: DSA-4277-1: mutt security update

    Date 17 Aug 2018
    5365
    Posted By Anthony Pell
    Several vulnerabilities were discovered in Mutt, a text-based mailreader supporting MIME, GPG, PGP and threading, potentially leading to code execution, denial of service or information disclosure when connecting to a malicious mail/NNTP server.
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-4277-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                     Salvatore Bonaccorso
    August 17, 2018                       https://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : mutt
    CVE ID         : CVE-2018-14349 CVE-2018-14350 CVE-2018-14351 CVE-2018-14352
                     CVE-2018-14353 CVE-2018-14354 CVE-2018-14355 CVE-2018-14356
                     CVE-2018-14357 CVE-2018-14358 CVE-2018-14359 CVE-2018-14360
                     CVE-2018-14361 CVE-2018-14362 CVE-2018-14363
    Debian Bug     : 904051
    
    Several vulnerabilities were discovered in Mutt, a text-based mailreader
    supporting MIME, GPG, PGP and threading, potentially leading to code
    execution, denial of service or information disclosure when connecting
    to a malicious mail/NNTP server.
    
    For the stable distribution (stretch), these problems have been fixed in
    version 1.7.2-1+deb9u1.
    
    We recommend that you upgrade your mutt packages.
    
    For the detailed security status of mutt please refer to its security
    tracker page at:
    https://security-tracker.debian.org/tracker/mutt
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    

    LinuxSecurity Poll

    How do you feel about the elimination of the terms 'blacklist' and 'slave' from the Linux kernel?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/32-how-do-you-feel-about-the-elimination-of-the-terms-blacklist-and-slave-from-the-linux-kernel?task=poll.vote&format=json
    32
    radio
    [{"id":"112","title":"I strongly support this change - racially charged language should not be used in the code and documentation of the kernel and other open-source projects.","votes":"7","type":"x","order":"1","pct":20,"resources":[]},{"id":"113","title":"I'm indifferent - this small change will not affect broader issues of racial insensitivity and white privilege.","votes":"4","type":"x","order":"2","pct":11.43,"resources":[]},{"id":"114","title":"I'm opposed to this change - there is no need to change language that has been used for years. It doesn't make sense for people to take offense to terminology used in community projects.","votes":"24","type":"x","order":"3","pct":68.57,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Advisories

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.