Date: Thu, 19 Jul 2018 12:04:03 +0000 (UTC) From: Pietro Cerutti <gahr@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r474958 - head/security/vuxml Message-ID: <201807191204.w6JC43jD088049@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: gahr Date: Thu Jul 19 12:04:02 2018 New Revision: 474958 URL: https://svnweb.freebsd.org/changeset/ports/474958 Log: security/vuxml: document NeoMutt and Mutt vulnerabilities Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Thu Jul 19 11:57:00 2018 (r474957) +++ head/security/vuxml/vuln.xml Thu Jul 19 12:04:02 2018 (r474958) @@ -58,6 +58,69 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="fe12ef83-8b47-11e8-96cc-001a4a7ec6be"> + <topic>mutt/neomutt -- multiple vulnerabilities</topic> + <affects> + <package> + <name>neomutt</name> + <range><lt>20180716</lt></range> + </package> + <package> + <name>mutt</name> + <range><lt>1.10.1</lt></range> + </package> + <package> + <name>mutt14</name> + <range><lt>*</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>NeoMutt report:</p> + <blockquote cite="https://github.com/neomutt/neomutt/releases/tag/neomutt-20180716"> + <h1>Description</h1> + <h5>CVE-2018-14349</h5><p>NO Response Heap Overflow</p> + <h5>CVE-2018-14350</h5><p>INTERNALDATE Stack Overflow</p> + <h5>CVE-2018-14351</h5><p>STATUS Literal Length relative write</p> + <h5>CVE-2018-14352</h5><p>imap_quote_string off-by-one stack overflow</p> + <h5>CVE-2018-14353</h5><p>imap_quote_string int underflow</p> + <h5>CVE-2018-14354</h5><p>imap_subscribe Remote Code Execution</p> + <h5>CVE-2018-14355</h5><p>STATUS mailbox header cache directory traversal</p> + <h5>CVE-2018-14356</h5><p>POP empty UID NULL deref</p> + <h5>CVE-2018-14357</h5><p>LSUB Remote Code Execution</p> + <h5>CVE-2018-14358</h5><p>RFC822.SIZE Stack Overflow</p> + <h5>CVE-2018-14359</h5><p>base64 decode Stack Overflow</p> + <h5>CVE-2018-14360</h5><p>NNTP Group Stack Overflowe</p> + <h5>CVE-2018-14361</h5><p>NNTP Write 1 where via GROUP response</p> + <h5>CVE-2018-14362</h5><p>POP Message Cache Directory Traversal</p> + <h5>CVE-2018-14363</h5><p>NNTP Header Cache Directory Traversal</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2018-14349</cvename> + <cvename>CVE-2018-14350</cvename> + <cvename>CVE-2018-14351</cvename> + <cvename>CVE-2018-14352</cvename> + <cvename>CVE-2018-14353</cvename> + <cvename>CVE-2018-14354</cvename> + <cvename>CVE-2018-14355</cvename> + <cvename>CVE-2018-14356</cvename> + <cvename>CVE-2018-14357</cvename> + <cvename>CVE-2018-14358</cvename> + <cvename>CVE-2018-14359</cvename> + <cvename>CVE-2018-14360</cvename> + <cvename>CVE-2018-14361</cvename> + <cvename>CVE-2018-14362</cvename> + <cvename>CVE-2018-14363</cvename> + <url>https://github.com/neomutt/neomutt/releases/tag/neomutt-20180716</url> + </references> + <dates> + <discovery>2018-07-10</discovery> + <entry>2018-07-19</entry> + </dates> + </vuln> + <vuln vid="20a1881e-8a9e-11e8-bddf-d017c2ca229d"> <topic>jenkins -- multiple vulnerabilities</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201807191204.w6JC43jD088049>