Bugzilla – Full Text Bug Listing |
Summary: | VUL-0: CVE-2018-14352: mutt,neomutt: imap_quote_string in imap/util.c does not leave room for quote characters, leading to a stack-based buffer overflow. | ||
---|---|---|---|
Product: | [Novell Products] SUSE Security Incidents | Reporter: | Karol Babioch <karol> |
Component: | Incidents | Assignee: | Security Team bot <security-team> |
Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
Severity: | Normal | ||
Priority: | P3 - Medium | CC: | dsterba, karol, werner |
Version: | unspecified | ||
Target Milestone: | --- | ||
Hardware: | Other | ||
OS: | Other | ||
URL: | https://smash.suse.de/issue/210783/ | ||
Whiteboard: | CVSSv3:SUSE:CVE-2018-14352:6.3:(AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) CVSSv3:RedHat:CVE-2018-14352:6.3:(AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) CVSSv2:NVD:CVE-2018-14352:7.5:(AV:N/AC:L/Au:N/C:P/I:P/A:P) maint:released:sle10-sp3:64139 | ||
Found By: | Security Response Team | Services Priority: | |
Business Priority: | Blocker: | --- | |
Marketing QA Status: | --- | IT Deployment: | --- |
Bug Depends on: | |||
Bug Blocks: | 1101428 |
Description
Karol Babioch
2018-07-18 07:33:05 UTC
Can we please merge this as duplicate of bsc#1101428 This is an autogenerated message for OBS integration: This bug (1101582) was mentioned in https://build.opensuse.org/request/show/623577 Factory / mutt All codestreams affected, straight-forward to fix (upstream fix can be applied): - SUSE:SLE-10-SP3:Update - SUSE:SLE-11:Update - SUSE:SLE-12:Update - SUSE:SLE-15:Update SUSE-SU-2018:2084-1: An update that solves 16 vulnerabilities and has 5 fixes is now available. Category: security (important) Bug References: 1061343,1094717,1101428,1101566,1101567,1101568,1101569,1101570,1101571,1101573,1101576,1101577,1101578,1101581,1101582,1101583,1101588,1101589,980830,982129,986534 CVE References: CVE-2014-9116,CVE-2018-14349,CVE-2018-14350,CVE-2018-14351,CVE-2018-14352,CVE-2018-14353,CVE-2018-14354,CVE-2018-14355,CVE-2018-14356,CVE-2018-14357,CVE-2018-14358,CVE-2018-14359,CVE-2018-14360,CVE-2018-14361,CVE-2018-14362,CVE-2018-14363 Sources used: SUSE Linux Enterprise Server 12-SP3 (src): mutt-1.10.1-55.3.1 SUSE Linux Enterprise Desktop 12-SP3 (src): mutt-1.10.1-55.3.1 SUSE-SU-2018:2085-1: An update that solves 16 vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1094717,1101428,1101566,1101567,1101568,1101569,1101570,1101571,1101573,1101576,1101577,1101578,1101581,1101582,1101583,1101588,1101589 CVE References: CVE-2014-9116,CVE-2018-14349,CVE-2018-14350,CVE-2018-14351,CVE-2018-14352,CVE-2018-14353,CVE-2018-14354,CVE-2018-14355,CVE-2018-14356,CVE-2018-14357,CVE-2018-14358,CVE-2018-14359,CVE-2018-14360,CVE-2018-14361,CVE-2018-14362,CVE-2018-14363 Sources used: SUSE Linux Enterprise Module for Basesystem 15 (src): mutt-1.10.1-3.3.4 openSUSE-SU-2018:2212-1: An update that solves 16 vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1094717,1101428,1101566,1101567,1101568,1101569,1101570,1101571,1101573,1101576,1101577,1101578,1101581,1101582,1101583,1101588,1101589 CVE References: CVE-2014-9116,CVE-2018-14349,CVE-2018-14350,CVE-2018-14351,CVE-2018-14352,CVE-2018-14353,CVE-2018-14354,CVE-2018-14355,CVE-2018-14356,CVE-2018-14357,CVE-2018-14358,CVE-2018-14359,CVE-2018-14360,CVE-2018-14361,CVE-2018-14362,CVE-2018-14363 Sources used: openSUSE Leap 15.0 (src): mutt-1.10.1-lp150.2.3.1 SUSE-SU-2018:2403-1: An update that solves 11 vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1101567,1101570,1101571,1101573,1101576,1101577,1101578,1101581,1101582,1101588,1101589,936807 CVE References: CVE-2018-14349,CVE-2018-14350,CVE-2018-14352,CVE-2018-14353,CVE-2018-14354,CVE-2018-14355,CVE-2018-14356,CVE-2018-14357,CVE-2018-14358,CVE-2018-14359,CVE-2018-14362 Sources used: SUSE Linux Enterprise Server 11-SP4 (src): mutt-1.5.17-42.43.1 SUSE Linux Enterprise Server 11-SP3-LTSS (src): mutt-1.5.17-42.43.1 SUSE Linux Enterprise Point of Sale 11-SP3 (src): mutt-1.5.17-42.43.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): mutt-1.5.17-42.43.1 SUSE Linux Enterprise Debuginfo 11-SP3 (src): mutt-1.5.17-42.43.1 An update workflow for this issue was started. This issue was rated as important. Please submit fixed packages until 2018-09-18. When done, reassign the bug to security-team@suse.de. https://swamp.suse.de/webswamp/wf/64138 This is an autogenerated message for OBS integration: This bug (1101582) was mentioned in https://build.opensuse.org/request/show/663361 42.3 / mutt openSUSE-SU-2019:0052-1: An update that solves 16 vulnerabilities and has 6 fixes is now available. Category: security (important) Bug References: 1061343,1094717,1101428,1101566,1101567,1101568,1101569,1101570,1101571,1101573,1101576,1101577,1101578,1101581,1101582,1101583,1101588,1101589,1120935,980830,982129,986534 CVE References: CVE-2014-9116,CVE-2018-14349,CVE-2018-14350,CVE-2018-14351,CVE-2018-14352,CVE-2018-14353,CVE-2018-14354,CVE-2018-14355,CVE-2018-14356,CVE-2018-14357,CVE-2018-14358,CVE-2018-14359,CVE-2018-14360,CVE-2018-14361,CVE-2018-14362,CVE-2018-14363 Sources used: openSUSE Leap 42.3 (src): mutt-1.10.1-2.5.1 released SUSE-SU-2019:1196-1: An update that solves 16 vulnerabilities and has 5 fixes is now available. Category: security (important) Bug References: 1061343,1094717,1101428,1101566,1101567,1101568,1101569,1101570,1101571,1101573,1101576,1101577,1101578,1101581,1101582,1101583,1101588,1101589,980830,982129,986534 CVE References: CVE-2014-9116,CVE-2018-14349,CVE-2018-14350,CVE-2018-14351,CVE-2018-14352,CVE-2018-14353,CVE-2018-14354,CVE-2018-14355,CVE-2018-14356,CVE-2018-14357,CVE-2018-14358,CVE-2018-14359,CVE-2018-14360,CVE-2018-14361,CVE-2018-14362,CVE-2018-14363 Sources used: SUSE Linux Enterprise Server 12-SP3 (src): mutt-1.10.1-55.6.1 SUSE Linux Enterprise Desktop 12-SP3 (src): mutt-1.10.1-55.6.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. |