DescriptionMutt 1.5.13 and earlier does not properly use the --status-fd argument when invoking GnuPG, which prevents Mutt from visually distinguishing between signed and unsigned portions of OpenPGP messages with multiple components, which allows remote attackers to forge the contents of a message without detection.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
mutt (PTS)buster1.10.1-2.1+deb10u6vulnerable
buster (security)1.10.1-2.1+deb10u7vulnerable
bullseye (security), bullseye2.0.5-4.1+deb11u3vulnerable
bookworm (security)2.2.9-1+deb12u1vulnerable
sid, trixie2.2.12-0.1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs


this is a "feature request", since gnupg is fixed from CVE-2007-1263

Search for package or bug name: Reporting problems