Login
Log in using an SSO provider:
Fedora Account System
Red Hat Associate
Red Hat Customer
Login using a Red Hat Bugzilla account
Forgot Password
Create an Account
Red Hat Bugzilla – Bug 2464859
Home
New
Search
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh112 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
Migrated Products
[?]
This site requires JavaScript to be enabled to function correctly, please enable it.
Bug 2464859
(
CVE-2026-43860
) -
CVE-2026-43860
mutt: mutt: Authentication bypass due to IMAP CRAM-MD5 hash truncation
Summary:
CVE-2026-43860 mutt: mutt: Authentication bypass due to IMAP CRAM-MD5 hash tr...
Keywords
:
Security
Status
:
NEW
Alias:
CVE-2026-43860
Product:
Security Response
Classification:
Other
Component:
vulnerability
Sub Component:
---
Version:
unspecified
Hardware:
All
OS:
Linux
Priority:
low
Severity:
low
Target Milestone:
---
Assignee:
Product Security
QA Contact:
Docs Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+
depends on
/
blocked
Reported:
2026-05-04 07:01 UTC by
OSIDB Bzimport
Modified:
2026-05-07 09:45 UTC (
History
)
CC List:
2 users
(
show
)
rhel-process-autobot
watson-tool-maintainers
Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:
Attachments
(Terms of Use)
Description
OSIDB Bzimport
2026-05-04 07:01:35 UTC
mutt before 2.3.2 sometimes truncates the hash_passwd by one byte for IMAP auth_cram MD5 digest.
Note
You need to
log in
before you can comment on or make changes to this bug.