A flaw was found in mutt before 1.10.1. When "subscribing" to an IMAP mailbox, either via $imap_check_subscribed, or via the <subscribe> function in the browser menu, the lack of proper input parsing may lead to remote code injection from a malicous IMAP server. Upstream patch: References: http://www.mutt.org/news.html https://gitlab.com/muttmua/mutt/blob/master/ChangeLog
Created attachment 1459535 [details] upstream patch
Created mutt tracking bugs for this issue: Affects: fedora-all [bug 1602082]
Upstream Patch: https://gitlab.com/muttmua/mutt/commit/185152818541f5cdc059cbff3f3e8b654fc27c1d https://github.com/neomutt/neomutt/commit/95e80bf9ff10f68cb6443f760b85df4117cb15eb
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 Via RHSA-2018:2526 https://access.redhat.com/errata/RHSA-2018:2526