Mutt is vulnerable to arbitrary code execution vulnerability. The vulnerability exists in an unknown code block of the component IMAP Server Handler. Remote IMAP servers could execute arbitrary commands via backquote characters, related to the mailboxes command associated with an automatic subscription.
www.mutt.org/news.html
access.redhat.com/errata/RHSA-2018:2526
access.redhat.com/security/updates/classification/#important
github.com/neomutt/neomutt/commit/e52393740334443ae0206cab2d7caef381646725
gitlab.com/muttmua/mutt/commit/185152818541f5cdc059cbff3f3e8b654fc27c1d
lists.debian.org/debian-lts-announce/2018/08/msg00001.html
neomutt.org/2018/07/16/release
security.gentoo.org/glsa/201810-07
usn.ubuntu.com/3719-1/
usn.ubuntu.com/3719-3/
www.debian.org/security/2018/dsa-4277