Bug 1848287 (CVE-2020-14154)

Summary: CVE-2020-14154 mutt: TLS mishandling during connection
Product: [Other] Security Response Reporter: Marian Rehak <mrehak>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: athoscribeiro, dakingun, databases-maint, hhorak, jmmahler, me, mmuzila, pkubat
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: mutt 1.14.3 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-02-14 14:50:45 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1848288, 1850348, 1850349    
Bug Blocks: 1848289    

Description Marian Rehak 2020-06-18 07:39:43 UTC
Mutt before 1.14.3 proceeds with a connection even if, in response to a GnuTLS certificate prompt, the user rejects an expired intermediate certificate.

Upstream Reference:

http://lists.mutt.org/pipermail/mutt-announce/Week-of-Mon-20200608/000022.html

Comment 1 Marian Rehak 2020-06-18 07:40:08 UTC
Created mutt tracking bugs for this issue:

Affects: fedora-all [bug 1848288]

Comment 3 Huzaifa S. Sidhpurwala 2020-06-24 06:43:38 UTC
External References:

http://lists.mutt.org/pipermail/mutt-announce/Week-of-Mon-20200608/000022.html

Comment 6 Fabio Alessandro Locati 2022-02-13 20:53:52 UTC
This has been fixed in following versions. Can we close this bug?