SUSE Security Update: Security update for mutt
______________________________________________________________________________

Announcement ID:    SUSE-SU-2015:0012-1
Rating:             important
References:         #899712 #907453 
Cross-References:   CVE-2014-9116
Affected Products:
                    SUSE Linux Enterprise Server 12
                    SUSE Linux Enterprise Desktop 12
______________________________________________________________________________

   An update that solves one vulnerability and has one errata
   is now available.

Description:

   mutt was updated to fix one security issue.

   This security issue was fixed:
   - Heap-based buffer overflow in mutt_substrdup() (CVE-2014-9116).

   This non-security issue was fixed:
   - Handle text/html by default (bnc#899712)


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 12:

      zypper in -t patch SUSE-SLE-SERVER-12-2015-3

   - SUSE Linux Enterprise Desktop 12:

      zypper in -t patch SUSE-SLE-DESKTOP-12-2015-3

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64):

      mutt-1.5.21-49.1
      mutt-debuginfo-1.5.21-49.1
      mutt-debugsource-1.5.21-49.1

   - SUSE Linux Enterprise Desktop 12 (x86_64):

      mutt-1.5.21-49.1
      mutt-debuginfo-1.5.21-49.1
      mutt-debugsource-1.5.21-49.1


References:

   https://www.suse.com/security/cve/CVE-2014-9116.html
   https://bugzilla.suse.com/show_bug.cgi?id=899712
   https://bugzilla.suse.com/show_bug.cgi?id=907453

SuSE: 2015:0012-1: important: mutt

January 6, 2015
An update that solves one vulnerability and has one errata An update that solves one vulnerability and has one errata An update that solves one vulnerability and has one errata is ...

Summary

mutt was updated to fix one security issue. This security issue was fixed: - Heap-based buffer overflow in mutt_substrdup() (CVE-2014-9116). This non-security issue was fixed: - Handle text/html by default (bnc#899712) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 12: zypper in -t patch SUSE-SLE-SERVER-12-2015-3 - SUSE Linux Enterprise Desktop 12: zypper in -t patch SUSE-SLE-DESKTOP-12-2015-3 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64): mutt-1.5.21-49.1 mutt-debuginfo-1.5.21-49.1 mutt-debugsource-1.5.21-49.1 - SUSE Linux Enterprise Desktop 12 (x86_64): mutt-1.5.21-49.1 mutt-debuginfo-1.5.21-49.1 mutt-debugsource-1.5.21-49.1

References

#899712 #907453

Cross- CVE-2014-9116

Affected Products:

SUSE Linux Enterprise Server 12

SUSE Linux Enterprise Desktop 12

https://www.suse.com/security/cve/CVE-2014-9116.html

https://bugzilla.suse.com/show_bug.cgi?id=899712

https://bugzilla.suse.com/show_bug.cgi?id=907453

Severity
Announcement ID: SUSE-SU-2015:0012-1
Rating: important

Related News