Name | CVE-2006-5298 |
Description | The mutt_adv_mktemp function in the Mutt mail client 1.5.12 and earlier does not properly verify that temporary files have been created with restricted permissions, which might allow local users to create files with weak permissions via a race condition between the mktemp and safe_fopen function calls. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 396104 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
mutt (PTS) | jessie, jessie (lts) | 1.5.23-3+deb8u7 | fixed |
| stretch (security) | 1.7.2-1+deb9u6 | fixed |
| stretch (lts), stretch | 1.7.2-1+deb9u7 | fixed |
| buster (security), buster, buster (lts) | 1.10.1-2.1+deb10u7 | fixed |
| bullseye (security), bullseye | 2.0.5-4.1+deb11u3 | fixed |
| bookworm | 2.2.12-0.1~deb12u1 | fixed |
| bookworm (security) | 2.2.9-1+deb12u1 | fixed |
| sid, trixie | 2.2.13-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
mutt | source | (unstable) | 1.5.13-1.1 | low | | 396104 |
Notes
[sarge] - mutt <no-dsa> (Minor issue, tmp dirs on NFS cause problems in many scenarios)