Replies: 24 comments
-
|
Did you or the reporter contact upstream (Mutt)? Will/Have the reporter request(ed) CVEs? |
Beta Was this translation helpful? Give feedback.
-
|
He's been talking to Kevin too and CVEs are being organised. |
Beta Was this translation helpful? Give feedback.
-
|
Would you say it is imperative that the patches be incorporated and released downstream now or should we wait for the release on Friday? |
Beta Was this translation helpful? Give feedback.
-
|
It's been over a decade, I think we can we wait 'til Friday. The bugs rely on compromising a server that the user connects to. The patches are available here: https://flatcap.org/mutt/cve.mbox I imagine we're meant to do a coordinated release across all versions and all distros. |
Beta Was this translation helpful? Give feedback.
-
|
I'm in favor of coordinated release (with Mutt) and thorough testing of the private patches (they are merged in a hurry :-).
If the connection is not secure (without TLS), MITM attacks can also exploit this. |
Beta Was this translation helpful? Give feedback.
-
Good point.
We'll see if I hear from Kevin. I'd already pushed some of the earlier fixes before thinking through the consequences.
Yes please, comments welcome.
|
Beta Was this translation helpful? Give feedback.
-
|
If it's patched, say, Friday Morning EST, the voidlinux packages for all mutt variants can be updated at once, about 5 minutes. |
Beta Was this translation helpful? Give feedback.
-
|
Unless any other changes were introduced that require modification on how the package is built, I should be able to update the MacPorts package in 30 minutes or less (once the release is ready). However, keep in mind that it may take a few hours for the updated port and the corresponding binaries to be visible to end users after I push the changes to the MacPorts repository. |
Beta Was this translation helpful? Give feedback.
-
|
@lbschenkel There is a modification needed, see neomutt/neomutt@b945055. We need to reinplace from |
Beta Was this translation helpful? Give feedback.
-
|
All right, thanks for the heads up. I'll prepare a branch with the necessary tweaks to build the current master hash, then it should be just a matter of updating the hash when the release is ready. |
Beta Was this translation helpful? Give feedback.
-
|
How is the progress? Are we waiting for Mutt? |
Beta Was this translation helpful? Give feedback.
-
|
Sorry for the silence. |
Beta Was this translation helpful? Give feedback.
-
|
NeoMutt 2018-07-16 is go! |
Beta Was this translation helpful? Give feedback.
-
|
Updated in Void. |
Beta Was this translation helpful? Give feedback.
-
|
Updated in Arch Linux. Thanks a lot for the headsup! Is there a link to the assigned CVE's so we can make a proper security announcement? |
Beta Was this translation helpful? Give feedback.
-
I haven't heard. I'm not in those circles. |
Beta Was this translation helpful? Give feedback.
-
|
Just noticed your message a few minutes ago. Updated in MacPorts: macports/macports-ports@597ed83 |
Beta Was this translation helpful? Give feedback.
-
|
Please mention that this is a security release in the release notes, and preferably also mention the related CVEs. P.S. Translations were not merged? |
Beta Was this translation helpful? Give feedback.
-
Done. Don't know if there's a CVE, yet.
Yes, they were merged. This release's notes were very stripped down, to focus the bug-fixes. Sorry for missing you and Marius from the credits -- FIXED. |
Beta Was this translation helpful? Give feedback.
-
I was referring to [news on the website]https://github.com/neomutt/neomutt.github.io/blob/master/_posts/2018-07-16-release.md (and inherently to the GitHub release).
CVE disclosure doesn't require a fix. I'm aware of some CVEs disclosed on https://nmap.org/mailman/listinfo/fulldisclosure that never got a fix.
Right, I checked the translate branch and the release notes but forgot to check the master branch. Stupid me. |
Beta Was this translation helpful? Give feedback.
-
|
News updated too. |
Beta Was this translation helpful? Give feedback.
-
|
The following CVEs have been allocated:
|
Beta Was this translation helpful? Give feedback.
-
|
Thanks! |
Beta Was this translation helpful? Give feedback.
-
|
Debian packages are up to date in unstable, they will appear in the archives tomorrow at the latest. There is some work in progress to merge all the commits to stretch (mut-1.7.2, which was neomutt), I will update this thread once I have that done, it can take a couple of days. From there a DSA needs to be issued and the update will be pushed via security.debian.org |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
This is a private discussion sent to the "Downstream Packagers" Team.
Over the last couple of weeks, @jeriko-one has been hammering NeoMutt.
So far, he's found 13 vulnerabilities, ranging from stack overflows when reading the config file, to remote execution flaws.
NeoMutt was taking server strings, then running, e.g.
By inserting a pair of `` into those strings, the attacker could run arbitrary commands on the client.
Besides finding the bugs, @jeriko-one also created python scripts, mimicking imap, pop and nntp servers and created patches for most of the problems. Thank you @jeriko-one!
NOTE: These bugs date back to 2005, so almost every version of Mutt and NeoMutt in play is affected.
I'm planning a new release on Friday 13th.
All the patches are fairly small and self-contained, but if anyone needs a hand patching their package, please let me know.
These commits have already been merged:
These will be merged on Friday, before release:
This is my first time dealing with vulnerabilities, so any advice on how to do it better next time would be appreciated :-)
Beta Was this translation helpful? Give feedback.
All reactions