opensuse-su-2022:10020-1
Vulnerability from csaf_opensuse
Published
2022-06-21 12:01
Modified
2022-06-21 12:01
Summary
Security update for neomutt
Notes
Title of the patch
Security update for neomutt
Description of the patch
This update for neomutt fixes the following issues:
neomutt was updated to 20220429:
* Bug Fixes
* Do not crash on an invalid use_threads/sort combination
* Fix: stuck browser cursor
* Resolve (move) the cursor after <edit-label>
* Index: fix menu size on new mail
* Don't overlimit LMDB mmap size
* OpenBSD y/n translation fix
* Generic: split out OP_EXIT binding
* Fix parsing of sendmail cmd
* Fix: crash with menu_move_off=no
* Newsrc: bugfix; nntp_user and nntp_pass ignored
* Menu: ensure config changes cause a repaint
* Mbox: fix sync duplicates
* Make sure the index redraws all that's needed
* Translations
* 100% Chinese (Simplified)
* 100% Czech
* 100% German
* 100% Hungarian
* 100% Lithuanian
* 100% Serbian
* 100% Turkish
* Docs
* add missing pattern modifier ~I for external_search_command
* Code
* menu: eliminate custom_redraw()
* modernise mixmaster
* Kill global and Propagate display attach status through State-
neomutt was updated to 20220415:
* Security
* Fix uudecode buffer overflow (CVE-2022-1328)
* Features
* Colours, colours, colours
* Bug Fixes
* Pager: fix pager_stop
* Merge colours with normal
* Color: disable mono command
* Fix forwarding text attachments when honor_disposition is set
* Pager: drop the nntp change-group bindings
* Use mailbox_check flags coherently, add IMMEDIATE flag
* Fix: tagging in attachment list
* Fix: misalignment of mini-index
* Make sure to update the menu size after a resort
* Translations
* 100% Hungarian
* Build
* Update acutest
* Code
* Unify pipe functions
* Index: notify if navigation fails
* Gui: set colour to be merged with normal
* Fix: leak in tls_check_one_certificate()
* Upstream
* Flush iconv() in mutt_convert_string()
* Fix integer overflow in mutt_convert_string()
* Fix uudecode cleanup on unexpected eof
update to 20220408:
* Compose multipart emails
* Fix screen mode after attempting decryption
* imap: increase max size of oauth2 token
* Fix autocrypt
* Unify Alias/Query workflow
* Fix colours
* Say which file exists when saving attachments
* Force SMTP authentication if `smtp_user` is set
* Fix selecting the right email after limiting
* Make sure we have enough memory for a new email
* Don't overwrite with zeroes after unlinking the file
* Fix crash when forwarding attachments
* Fix help reformatting on window resize
* Fix poll to use PollFdsCount and not PollFdsLen
* regex: range check arrays strictly
* Fix Coverity defects
* Fix out of bounds write with long log lines
* Apply `fast_reply` to 'to', 'cc', or 'bcc'
* Prevent warning on empty emails
* New default: `set rfc2047_parameters = yes`
* 100% German
* 100% Lithuanian
* 100% Serbian
* 100% Czech
* 100% Turkish
* 72% Hungarian
* Improve header cache explanation
* Improve description of some notmuch variables
* Explain how timezones and `!`s work inside `%{}`, `%[]` and `%()`
* Document config synonyms and deprecations
* Create lots of GitHub Actions
* Drop TravisCI
* Add automated Fuzzing tests
* Add automated ASAN tests
* Create Dockers for building Centos/Fedora
* Build fixes for Solaris 10
* New libraries: browser, enter, envelope
* New configure options: `--fuzzing` `--debug-color` `--debug-queue`
* Split Index/Pager GUIs/functions
* Add lots of function dispatchers
* Eliminate `menu_loop()`
* Refactor function opcodes
* Refactor cursor setting
* Unify Alias/Query functions
* Refactor Compose/Envelope functions
* Modernise the Colour handling
* Refactor the Attachment View
* Eliminate the global `Context`
* Upgrade `mutt_get_field()`
* Refactor the `color quoted` code
* Fix lots of memory leaks
* Refactor Index resolve code
* Refactor PatternList parsing
* Refactor Mailbox freeing
* Improve key mapping
* Factor out charset hooks
* Expose mutt_file_seek API
* Improve API of `strto*` wrappers
* imap QRESYNC fixes
* Allow an empty To: address prompt
* Fix argc==0 handling
* Don't queue IMAP close commands
* Fix IMAP UTF-7 for code points >= U+10000
* Don't include inactive messages in msgset generation
update to 20211029 (boo#1185705, CVE-2021-32055):
* Notmuch: support separate database and mail roots without .notmuch
* fix notmuch crash on open failure
* fix crypto crash handling pgp keys
* fix ncrypt/pgp file_get_size return check
* fix restore case-insensitive header sort
* fix pager redrawing of long lines
* fix notmuch: check database dir for xapian dir
* fix notmuch: update index count after <entire-thread>
* fix protect hash table against empty keys
* fix prevent real_subj being set but empty
* fix leak when saving fcc
* fix leak after <edit-or-view-raw-message>
* fix leak after trash to hidden mailbox
* fix leak restoring postponed emails
* fix new mail notifications
* fix pattern compilation error for ( !>(~P) )
* fix menu display on window resize
* Stop batch mode emails with no argument or recipients
* Add sanitize call in print mailcap function
* fix hdr_order to use the longest match
* fix (un)setenv to not return an error with unset env vars
* fix Imap sync when closing a mailbox
* fix segfault on OpenBSD current
* sidebar: restore sidebar_spoolfile colour
* fix assert when displaying a file from the browser
* fix exec command in compose
* fix check_stats for Notmuch mailboxes
* Fallback: Open Notmuch database without config
* fix gui hook commands on startup
* threads: implement the $use_threads feature
* https://neomutt.org/feature/use-threads
* hooks: allow a -noregex param to folder and mbox hooks
* mailing lists: implement list-(un)subscribe using RFC2369 headers
* mailcap: implement x-neomutt-nowrap flag
* pager: add $local_date_header option
* imap, smtp: add support for authenticating using XOAUTH2
* Allow <sync-mailbox> to fail quietly
* imap: speed up server-side searches
* pager: improve skip-quoted and skip-headers
* notmuch: open database with user's configuration
* notmuch: implement <vfolder-window-reset>
* config: allow += modification of my_ variables
* notmuch: tolerate file renames behind neomutt's back
* pager: implement $pager_read_delay
* notmuch: validate nm_query_window_timebase
* notmuch: make $nm_record work in non-notmuch mailboxes
* compose: add $greeting - a welcome message on top of emails
* notmuch: show additional mail in query windows
* imap: fix crash on external IMAP events
* notmuch: handle missing libnotmuch version bumps
* imap: add sanity check for qresync
* notmuch: allow windows with 0 duration
* index: fix index selection on <collapse-all>
* imap: fix crash when sync'ing labels
* search: fix searching by Message-Id in <mark-message>
* threads: fix double sorting of threads
* stats: don't check mailbox stats unless told
* alias: fix crash on empty query
* pager: honor mid-message config changes
* mailbox: don't propagate read-only state across reopens
* hcache: fix caching new labels in the header cache
* crypto: set invalidity flags for gpgme/smime keys
* notmuch: fix parsing of multiple type=
* notmuch: validate $nm_default_url
* messages: avoid unnecessary opening of messages
* imap: fix seqset iterator when it ends in a comma
* build: refuse to build without pcre2 when pcre2 is linked in ncurses
Patchnames
openSUSE-2022-10020
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for neomutt", "title": "Title of the patch" }, { "category": "description", "text": "This update for neomutt fixes the following issues:\n\nneomutt was updated to 20220429:\n\n* Bug Fixes\n* Do not crash on an invalid use_threads/sort combination\n* Fix: stuck browser cursor\n* Resolve (move) the cursor after \u003cedit-label\u003e\n* Index: fix menu size on new mail\n* Don\u0027t overlimit LMDB mmap size\n* OpenBSD y/n translation fix\n* Generic: split out OP_EXIT binding\n* Fix parsing of sendmail cmd\n* Fix: crash with menu_move_off=no\n* Newsrc: bugfix; nntp_user and nntp_pass ignored\n* Menu: ensure config changes cause a repaint\n* Mbox: fix sync duplicates\n* Make sure the index redraws all that\u0027s needed\n* Translations\n* 100% Chinese (Simplified)\n* 100% Czech\n* 100% German\n* 100% Hungarian\n* 100% Lithuanian\n* 100% Serbian\n* 100% Turkish\n* Docs\n* add missing pattern modifier ~I for external_search_command\n* Code\n* menu: eliminate custom_redraw()\n* modernise mixmaster\n* Kill global and Propagate display attach status through State- \n\nneomutt was updated to 20220415:\n\n* Security\n* Fix uudecode buffer overflow (CVE-2022-1328)\n* Features\n* Colours, colours, colours\n* Bug Fixes\n* Pager: fix pager_stop\n* Merge colours with normal\n* Color: disable mono command\n* Fix forwarding text attachments when honor_disposition is set\n* Pager: drop the nntp change-group bindings\n* Use mailbox_check flags coherently, add IMMEDIATE flag\n* Fix: tagging in attachment list\n* Fix: misalignment of mini-index\n* Make sure to update the menu size after a resort\n* Translations\n* 100% Hungarian\n* Build\n* Update acutest\n* Code\n* Unify pipe functions\n* Index: notify if navigation fails\n* Gui: set colour to be merged with normal\n* Fix: leak in tls_check_one_certificate()\n* Upstream\n* Flush iconv() in mutt_convert_string()\n* Fix integer overflow in mutt_convert_string()\n* Fix uudecode cleanup on unexpected eof\n\nupdate to 20220408:\n\n* Compose multipart emails\n* Fix screen mode after attempting decryption\n* imap: increase max size of oauth2 token\n* Fix autocrypt\n* Unify Alias/Query workflow\n* Fix colours\n* Say which file exists when saving attachments\n* Force SMTP authentication if `smtp_user` is set\n* Fix selecting the right email after limiting\n* Make sure we have enough memory for a new email\n* Don\u0027t overwrite with zeroes after unlinking the file\n* Fix crash when forwarding attachments\n* Fix help reformatting on window resize\n* Fix poll to use PollFdsCount and not PollFdsLen\n* regex: range check arrays strictly\n* Fix Coverity defects\n* Fix out of bounds write with long log lines\n* Apply `fast_reply` to \u0027to\u0027, \u0027cc\u0027, or \u0027bcc\u0027\n* Prevent warning on empty emails\n* New default: `set rfc2047_parameters = yes`\n* 100% German\n* 100% Lithuanian\n* 100% Serbian\n* 100% Czech\n* 100% Turkish\n* 72% Hungarian\n* Improve header cache explanation\n* Improve description of some notmuch variables\n* Explain how timezones and `!`s work inside `%{}`, `%[]` and `%()`\n* Document config synonyms and deprecations\n* Create lots of GitHub Actions\n* Drop TravisCI\n* Add automated Fuzzing tests\n* Add automated ASAN tests\n* Create Dockers for building Centos/Fedora\n* Build fixes for Solaris 10\n* New libraries: browser, enter, envelope\n* New configure options: `--fuzzing` `--debug-color` `--debug-queue`\n* Split Index/Pager GUIs/functions\n* Add lots of function dispatchers\n* Eliminate `menu_loop()`\n* Refactor function opcodes\n* Refactor cursor setting\n* Unify Alias/Query functions\n* Refactor Compose/Envelope functions\n* Modernise the Colour handling\n* Refactor the Attachment View\n* Eliminate the global `Context`\n* Upgrade `mutt_get_field()`\n* Refactor the `color quoted` code\n* Fix lots of memory leaks\n* Refactor Index resolve code\n* Refactor PatternList parsing\n* Refactor Mailbox freeing\n* Improve key mapping\n* Factor out charset hooks\n* Expose mutt_file_seek API\n* Improve API of `strto*` wrappers\n* imap QRESYNC fixes\n* Allow an empty To: address prompt\n* Fix argc==0 handling\n* Don\u0027t queue IMAP close commands\n* Fix IMAP UTF-7 for code points \u003e= U+10000\n* Don\u0027t include inactive messages in msgset generation\n\nupdate to 20211029 (boo#1185705, CVE-2021-32055):\n\n* Notmuch: support separate database and mail roots without .notmuch\n* fix notmuch crash on open failure\n* fix crypto crash handling pgp keys\n* fix ncrypt/pgp file_get_size return check\n* fix restore case-insensitive header sort\n* fix pager redrawing of long lines\n* fix notmuch: check database dir for xapian dir\n* fix notmuch: update index count after \u003centire-thread\u003e\n* fix protect hash table against empty keys\n* fix prevent real_subj being set but empty\n* fix leak when saving fcc\n* fix leak after \u003cedit-or-view-raw-message\u003e\n* fix leak after trash to hidden mailbox\n* fix leak restoring postponed emails\n* fix new mail notifications\n* fix pattern compilation error for ( !\u003e(~P) )\n* fix menu display on window resize\n* Stop batch mode emails with no argument or recipients\n* Add sanitize call in print mailcap function\n* fix hdr_order to use the longest match\n* fix (un)setenv to not return an error with unset env vars\n* fix Imap sync when closing a mailbox\n* fix segfault on OpenBSD current\n* sidebar: restore sidebar_spoolfile colour\n* fix assert when displaying a file from the browser\n* fix exec command in compose\n* fix check_stats for Notmuch mailboxes\n* Fallback: Open Notmuch database without config\n* fix gui hook commands on startup\n* threads: implement the $use_threads feature\n* https://neomutt.org/feature/use-threads\n* hooks: allow a -noregex param to folder and mbox hooks\n* mailing lists: implement list-(un)subscribe using RFC2369 headers\n* mailcap: implement x-neomutt-nowrap flag\n* pager: add $local_date_header option\n* imap, smtp: add support for authenticating using XOAUTH2\n* Allow \u003csync-mailbox\u003e to fail quietly\n* imap: speed up server-side searches\n* pager: improve skip-quoted and skip-headers\n* notmuch: open database with user\u0027s configuration\n* notmuch: implement \u003cvfolder-window-reset\u003e\n* config: allow += modification of my_ variables\n* notmuch: tolerate file renames behind neomutt\u0027s back\n* pager: implement $pager_read_delay\n* notmuch: validate nm_query_window_timebase\n* notmuch: make $nm_record work in non-notmuch mailboxes\n* compose: add $greeting - a welcome message on top of emails\n* notmuch: show additional mail in query windows\n* imap: fix crash on external IMAP events\n* notmuch: handle missing libnotmuch version bumps\n* imap: add sanity check for qresync\n* notmuch: allow windows with 0 duration\n* index: fix index selection on \u003ccollapse-all\u003e\n* imap: fix crash when sync\u0027ing labels\n* search: fix searching by Message-Id in \u003cmark-message\u003e\n* threads: fix double sorting of threads\n* stats: don\u0027t check mailbox stats unless told\n* alias: fix crash on empty query\n* pager: honor mid-message config changes\n* mailbox: don\u0027t propagate read-only state across reopens\n* hcache: fix caching new labels in the header cache\n* crypto: set invalidity flags for gpgme/smime keys\n* notmuch: fix parsing of multiple type=\n* notmuch: validate $nm_default_url\n* messages: avoid unnecessary opening of messages\n* imap: fix seqset iterator when it ends in a comma\n* build: refuse to build without pcre2 when pcre2 is linked in ncurses\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2022-10020", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2022_10020-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2022:10020-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YAIJ2AOB7KV4ZEDS2ZHBBCKGSPYKSKDI/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2022:10020-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YAIJ2AOB7KV4ZEDS2ZHBBCKGSPYKSKDI/" }, { "category": "self", "summary": "SUSE Bug 1184787", "url": "https://bugzilla.suse.com/1184787" }, { "category": "self", "summary": "SUSE Bug 1185705", "url": "https://bugzilla.suse.com/1185705" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32055 page", "url": "https://www.suse.com/security/cve/CVE-2021-32055/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1328 page", "url": "https://www.suse.com/security/cve/CVE-2022-1328/" } ], "title": "Security update for neomutt", "tracking": { "current_release_date": "2022-06-21T12:01:18Z", "generator": { "date": "2022-06-21T12:01:18Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2022:10020-1", "initial_release_date": "2022-06-21T12:01:18Z", "revision_history": [ { "date": "2022-06-21T12:01:18Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "neomutt-20220429-bp154.2.3.1.aarch64", "product": { "name": "neomutt-20220429-bp154.2.3.1.aarch64", "product_id": "neomutt-20220429-bp154.2.3.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "neomutt-doc-20220429-bp154.2.3.1.noarch", "product": { "name": "neomutt-doc-20220429-bp154.2.3.1.noarch", "product_id": "neomutt-doc-20220429-bp154.2.3.1.noarch" } }, { "category": "product_version", "name": "neomutt-lang-20220429-bp154.2.3.1.noarch", "product": { "name": "neomutt-lang-20220429-bp154.2.3.1.noarch", "product_id": "neomutt-lang-20220429-bp154.2.3.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "neomutt-20220429-bp154.2.3.1.ppc64le", "product": { "name": "neomutt-20220429-bp154.2.3.1.ppc64le", "product_id": "neomutt-20220429-bp154.2.3.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "neomutt-20220429-bp154.2.3.1.s390x", "product": { "name": "neomutt-20220429-bp154.2.3.1.s390x", "product_id": "neomutt-20220429-bp154.2.3.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "neomutt-20220429-bp154.2.3.1.x86_64", "product": { "name": "neomutt-20220429-bp154.2.3.1.x86_64", "product_id": "neomutt-20220429-bp154.2.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Package Hub 15 SP4", "product": { "name": "SUSE Package Hub 15 SP4", "product_id": "SUSE Package Hub 15 SP4" } }, { "category": "product_name", "name": "openSUSE Leap 15.4", "product": { "name": "openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "neomutt-20220429-bp154.2.3.1.aarch64 as component of SUSE Package Hub 15 SP4", "product_id": "SUSE Package Hub 15 SP4:neomutt-20220429-bp154.2.3.1.aarch64" }, "product_reference": "neomutt-20220429-bp154.2.3.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "neomutt-20220429-bp154.2.3.1.ppc64le as component of SUSE Package Hub 15 SP4", "product_id": "SUSE Package Hub 15 SP4:neomutt-20220429-bp154.2.3.1.ppc64le" }, "product_reference": "neomutt-20220429-bp154.2.3.1.ppc64le", "relates_to_product_reference": "SUSE Package Hub 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "neomutt-20220429-bp154.2.3.1.s390x as component of SUSE Package Hub 15 SP4", "product_id": "SUSE Package Hub 15 SP4:neomutt-20220429-bp154.2.3.1.s390x" }, "product_reference": "neomutt-20220429-bp154.2.3.1.s390x", "relates_to_product_reference": "SUSE Package Hub 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "neomutt-20220429-bp154.2.3.1.x86_64 as component of SUSE Package Hub 15 SP4", "product_id": "SUSE Package Hub 15 SP4:neomutt-20220429-bp154.2.3.1.x86_64" }, "product_reference": "neomutt-20220429-bp154.2.3.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "neomutt-doc-20220429-bp154.2.3.1.noarch as component of SUSE Package Hub 15 SP4", "product_id": "SUSE Package Hub 15 SP4:neomutt-doc-20220429-bp154.2.3.1.noarch" }, "product_reference": "neomutt-doc-20220429-bp154.2.3.1.noarch", "relates_to_product_reference": "SUSE Package Hub 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "neomutt-lang-20220429-bp154.2.3.1.noarch as component of SUSE Package Hub 15 SP4", "product_id": "SUSE Package Hub 15 SP4:neomutt-lang-20220429-bp154.2.3.1.noarch" }, "product_reference": "neomutt-lang-20220429-bp154.2.3.1.noarch", "relates_to_product_reference": "SUSE Package Hub 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "neomutt-20220429-bp154.2.3.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:neomutt-20220429-bp154.2.3.1.aarch64" }, "product_reference": "neomutt-20220429-bp154.2.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "neomutt-20220429-bp154.2.3.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:neomutt-20220429-bp154.2.3.1.ppc64le" }, "product_reference": "neomutt-20220429-bp154.2.3.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "neomutt-20220429-bp154.2.3.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:neomutt-20220429-bp154.2.3.1.s390x" }, "product_reference": "neomutt-20220429-bp154.2.3.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "neomutt-20220429-bp154.2.3.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:neomutt-20220429-bp154.2.3.1.x86_64" }, "product_reference": "neomutt-20220429-bp154.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "neomutt-doc-20220429-bp154.2.3.1.noarch as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:neomutt-doc-20220429-bp154.2.3.1.noarch" }, "product_reference": "neomutt-doc-20220429-bp154.2.3.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "neomutt-lang-20220429-bp154.2.3.1.noarch as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:neomutt-lang-20220429-bp154.2.3.1.noarch" }, "product_reference": "neomutt-lang-20220429-bp154.2.3.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-32055", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32055" } ], "notes": [ { "category": "general", "text": "Mutt 1.11.0 through 2.0.x before 2.0.7 (and NeoMutt 2019-10-25 through 2021-05-04) has a $imap_qresync issue in which imap/util.c has an out-of-bounds read in situations where an IMAP sequence set ends with a comma. NOTE: the $imap_qresync setting for QRESYNC is not enabled by default.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP4:neomutt-20220429-bp154.2.3.1.aarch64", "SUSE Package Hub 15 SP4:neomutt-20220429-bp154.2.3.1.ppc64le", "SUSE Package Hub 15 SP4:neomutt-20220429-bp154.2.3.1.s390x", "SUSE Package Hub 15 SP4:neomutt-20220429-bp154.2.3.1.x86_64", "SUSE Package Hub 15 SP4:neomutt-doc-20220429-bp154.2.3.1.noarch", "SUSE Package Hub 15 SP4:neomutt-lang-20220429-bp154.2.3.1.noarch", "openSUSE Leap 15.4:neomutt-20220429-bp154.2.3.1.aarch64", "openSUSE Leap 15.4:neomutt-20220429-bp154.2.3.1.ppc64le", "openSUSE Leap 15.4:neomutt-20220429-bp154.2.3.1.s390x", "openSUSE Leap 15.4:neomutt-20220429-bp154.2.3.1.x86_64", "openSUSE Leap 15.4:neomutt-doc-20220429-bp154.2.3.1.noarch", "openSUSE Leap 15.4:neomutt-lang-20220429-bp154.2.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32055", "url": "https://www.suse.com/security/cve/CVE-2021-32055" }, { "category": "external", "summary": "SUSE Bug 1185705 for CVE-2021-32055", "url": "https://bugzilla.suse.com/1185705" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP4:neomutt-20220429-bp154.2.3.1.aarch64", "SUSE Package Hub 15 SP4:neomutt-20220429-bp154.2.3.1.ppc64le", "SUSE Package Hub 15 SP4:neomutt-20220429-bp154.2.3.1.s390x", "SUSE Package Hub 15 SP4:neomutt-20220429-bp154.2.3.1.x86_64", "SUSE Package Hub 15 SP4:neomutt-doc-20220429-bp154.2.3.1.noarch", "SUSE Package Hub 15 SP4:neomutt-lang-20220429-bp154.2.3.1.noarch", "openSUSE Leap 15.4:neomutt-20220429-bp154.2.3.1.aarch64", "openSUSE Leap 15.4:neomutt-20220429-bp154.2.3.1.ppc64le", "openSUSE Leap 15.4:neomutt-20220429-bp154.2.3.1.s390x", "openSUSE Leap 15.4:neomutt-20220429-bp154.2.3.1.x86_64", "openSUSE Leap 15.4:neomutt-doc-20220429-bp154.2.3.1.noarch", "openSUSE Leap 15.4:neomutt-lang-20220429-bp154.2.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP4:neomutt-20220429-bp154.2.3.1.aarch64", "SUSE Package Hub 15 SP4:neomutt-20220429-bp154.2.3.1.ppc64le", "SUSE Package Hub 15 SP4:neomutt-20220429-bp154.2.3.1.s390x", "SUSE Package Hub 15 SP4:neomutt-20220429-bp154.2.3.1.x86_64", "SUSE Package Hub 15 SP4:neomutt-doc-20220429-bp154.2.3.1.noarch", "SUSE Package Hub 15 SP4:neomutt-lang-20220429-bp154.2.3.1.noarch", "openSUSE Leap 15.4:neomutt-20220429-bp154.2.3.1.aarch64", "openSUSE Leap 15.4:neomutt-20220429-bp154.2.3.1.ppc64le", "openSUSE Leap 15.4:neomutt-20220429-bp154.2.3.1.s390x", "openSUSE Leap 15.4:neomutt-20220429-bp154.2.3.1.x86_64", "openSUSE Leap 15.4:neomutt-doc-20220429-bp154.2.3.1.noarch", "openSUSE Leap 15.4:neomutt-lang-20220429-bp154.2.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-06-21T12:01:18Z", "details": "moderate" } ], "title": "CVE-2021-32055" }, { "cve": "CVE-2022-1328", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1328" } ], "notes": [ { "category": "general", "text": "Buffer Overflow in uudecoder in Mutt affecting all versions starting from 0.94.13 before 2.2.3 allows read past end of input line", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP4:neomutt-20220429-bp154.2.3.1.aarch64", "SUSE Package Hub 15 SP4:neomutt-20220429-bp154.2.3.1.ppc64le", "SUSE Package Hub 15 SP4:neomutt-20220429-bp154.2.3.1.s390x", "SUSE Package Hub 15 SP4:neomutt-20220429-bp154.2.3.1.x86_64", "SUSE Package Hub 15 SP4:neomutt-doc-20220429-bp154.2.3.1.noarch", "SUSE Package Hub 15 SP4:neomutt-lang-20220429-bp154.2.3.1.noarch", "openSUSE Leap 15.4:neomutt-20220429-bp154.2.3.1.aarch64", "openSUSE Leap 15.4:neomutt-20220429-bp154.2.3.1.ppc64le", "openSUSE Leap 15.4:neomutt-20220429-bp154.2.3.1.s390x", "openSUSE Leap 15.4:neomutt-20220429-bp154.2.3.1.x86_64", "openSUSE Leap 15.4:neomutt-doc-20220429-bp154.2.3.1.noarch", "openSUSE Leap 15.4:neomutt-lang-20220429-bp154.2.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1328", "url": "https://www.suse.com/security/cve/CVE-2022-1328" }, { "category": "external", "summary": "SUSE Bug 1198518 for CVE-2022-1328", "url": "https://bugzilla.suse.com/1198518" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP4:neomutt-20220429-bp154.2.3.1.aarch64", "SUSE Package Hub 15 SP4:neomutt-20220429-bp154.2.3.1.ppc64le", "SUSE Package Hub 15 SP4:neomutt-20220429-bp154.2.3.1.s390x", "SUSE Package Hub 15 SP4:neomutt-20220429-bp154.2.3.1.x86_64", "SUSE Package Hub 15 SP4:neomutt-doc-20220429-bp154.2.3.1.noarch", "SUSE Package Hub 15 SP4:neomutt-lang-20220429-bp154.2.3.1.noarch", "openSUSE Leap 15.4:neomutt-20220429-bp154.2.3.1.aarch64", "openSUSE Leap 15.4:neomutt-20220429-bp154.2.3.1.ppc64le", "openSUSE Leap 15.4:neomutt-20220429-bp154.2.3.1.s390x", "openSUSE Leap 15.4:neomutt-20220429-bp154.2.3.1.x86_64", "openSUSE Leap 15.4:neomutt-doc-20220429-bp154.2.3.1.noarch", "openSUSE Leap 15.4:neomutt-lang-20220429-bp154.2.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP4:neomutt-20220429-bp154.2.3.1.aarch64", "SUSE Package Hub 15 SP4:neomutt-20220429-bp154.2.3.1.ppc64le", "SUSE Package Hub 15 SP4:neomutt-20220429-bp154.2.3.1.s390x", "SUSE Package Hub 15 SP4:neomutt-20220429-bp154.2.3.1.x86_64", "SUSE Package Hub 15 SP4:neomutt-doc-20220429-bp154.2.3.1.noarch", "SUSE Package Hub 15 SP4:neomutt-lang-20220429-bp154.2.3.1.noarch", "openSUSE Leap 15.4:neomutt-20220429-bp154.2.3.1.aarch64", "openSUSE Leap 15.4:neomutt-20220429-bp154.2.3.1.ppc64le", "openSUSE Leap 15.4:neomutt-20220429-bp154.2.3.1.s390x", "openSUSE Leap 15.4:neomutt-20220429-bp154.2.3.1.x86_64", "openSUSE Leap 15.4:neomutt-doc-20220429-bp154.2.3.1.noarch", "openSUSE Leap 15.4:neomutt-lang-20220429-bp154.2.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-06-21T12:01:18Z", "details": "moderate" } ], "title": "CVE-2022-1328" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…