mutt is vulnerable to directory traversal. The IMAP header caching mishandles the mailbox name parameter and allows ../
characters to be included. This results in arbitrary file access.
www.mutt.org/news.html
access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.8_release_notes/index
access.redhat.com/errata/RHSA-2020:1126
access.redhat.com/security/updates/classification/#moderate
github.com/neomutt/neomutt/commit/57971dba06346b2d7179294f4528b8d4427a7c5d
gitlab.com/muttmua/mutt/commit/31eef6c766f47df8281942d19f76e35f475c781d
lists.debian.org/debian-lts-announce/2018/08/msg00001.html
neomutt.org/2018/07/16/release
security.gentoo.org/glsa/201810-07
usn.ubuntu.com/3719-3/
www.debian.org/security/2018/dsa-4277