Vulnerability Database
Blog
FAQ
Docs
SUSE-SU-2023:3702-1
See a problem?
Please try reporting it
to the source
first.
Source
https://www.suse.com/support/update/announcement/2023/suse-su-20233702-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2023:3702-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2023:3702-1
Related
CVE-2023-4874
CVE-2023-4875
Published
2023-09-20T10:59:11Z
Modified
2023-09-20T10:59:11Z
Summary
Security update for mutt
Details
This update for mutt fixes the following issues:
CVE-2023-4874: Fixed NULL pointer dereference when composing an email (bsc#1215189).
CVE-2023-4875: Fixed NULL pointer dereference when receiving an email (bsc#1215191).
References
https://www.suse.com/support/update/announcement/2023/suse-su-20233702-1/
https://bugzilla.suse.com/1215189
https://bugzilla.suse.com/1215191
https://www.suse.com/security/cve/CVE-2023-4874
https://www.suse.com/security/cve/CVE-2023-4875
Affected packages
SUSE:Linux Enterprise Server 12 SP5
/
mutt
Package
Name
mutt
Purl
pkg:rpm/suse/mutt&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
1.10.1-55.30.1
Ecosystem specific
{ "binaries": [ { "mutt": "1.10.1-55.30.1" } ] }
SUSE:Linux Enterprise Server for SAP Applications 12 SP5
/
mutt
Package
Name
mutt
Purl
pkg:rpm/suse/mutt&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
1.10.1-55.30.1
Ecosystem specific
{ "binaries": [ { "mutt": "1.10.1-55.30.1" } ] }
SUSE-SU-2023:3702-1 - OSV