Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2018:2526 - Security Advisory
Issued:
2018-08-20
Updated:
2018-08-20

RHSA-2018:2526 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: mutt security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for mutt is now available for Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Mutt is a low resource, highly configurable, text-based MIME e-mail client. Mutt supports most e-mail storing formats, such as mbox and Maildir, as well as most protocols, including POP3 and IMAP.

Security Fix(es):

  • mutt: Remote code injection vulnerability to an IMAP mailbox (CVE-2018-14354)
  • mutt: Remote Code Execution via backquote characters (CVE-2018-14357)
  • mutt: POP body caching path traversal vulnerability (CVE-2018-14362)

For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 7 x86_64
  • Red Hat Enterprise Linux Server 6 x86_64
  • Red Hat Enterprise Linux Server 6 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.7 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.6 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.5 x86_64
  • Red Hat Enterprise Linux Server - AUS 7.7 x86_64
  • Red Hat Enterprise Linux Server - AUS 7.6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 7 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
  • Red Hat Enterprise Linux Workstation 7 x86_64
  • Red Hat Enterprise Linux Workstation 6 x86_64
  • Red Hat Enterprise Linux Workstation 6 i386
  • Red Hat Enterprise Linux Desktop 7 x86_64
  • Red Hat Enterprise Linux Desktop 6 x86_64
  • Red Hat Enterprise Linux Desktop 6 i386
  • Red Hat Enterprise Linux for IBM z Systems 7 s390x
  • Red Hat Enterprise Linux for IBM z Systems 6 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.7 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.6 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.5 s390x
  • Red Hat Enterprise Linux for Power, big endian 7 ppc64
  • Red Hat Enterprise Linux for Power, big endian 6 ppc64
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.7 ppc64
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.6 ppc64
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.5 ppc64
  • Red Hat Enterprise Linux for Scientific Computing 7 x86_64
  • Red Hat Enterprise Linux for Power, little endian 7 ppc64le
  • Red Hat Enterprise Linux for Scientific Computing 6 x86_64
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.7 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.6 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.5 ppc64le
  • Red Hat Enterprise Linux Server - TUS 7.7 x86_64
  • Red Hat Enterprise Linux Server - TUS 7.6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 7 s390x
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x
  • Red Hat Enterprise Linux for ARM 64 7 aarch64
  • Red Hat Enterprise Linux for Power 9 7 ppc64le
  • Red Hat Enterprise Linux EUS Compute Node 7.7 x86_64
  • Red Hat Enterprise Linux EUS Compute Node 7.6 x86_64
  • Red Hat Enterprise Linux EUS Compute Node 7.5 x86_64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.7 ppc64le
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.6 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.7 x86_64
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.6 x86_64
  • Red Hat Enterprise Linux for IBM System z (Structure A) 7 s390x
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, big endian 7 ppc64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, little endian 7 ppc64le
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6 s390x

Fixes

  • BZ - 1602069 - CVE-2018-14354 mutt: Remote code injection vulnerability to an IMAP mailbox
  • BZ - 1602079 - CVE-2018-14362 mutt: POP body caching path traversal vulnerability
  • BZ - 1602915 - CVE-2018-14357 mutt: Remote Code Execution via backquote characters

CVEs

  • CVE-2018-14354
  • CVE-2018-14357
  • CVE-2018-14362

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 7

SRPM
mutt-1.5.21-28.el7_5.src.rpm SHA-256: a078fd3c15b881509853c2b5e630b9bd10bc40c0e7c6359eeea6997260bb2af9
x86_64
mutt-1.5.21-28.el7_5.x86_64.rpm SHA-256: f6a5a6bd680d8b3b905a2cecca51cf9bacb3507205bcf48548024b08d263e314
mutt-debuginfo-1.5.21-28.el7_5.x86_64.rpm SHA-256: d9ff83a0fd52723b2c402e0e5796513ab8e56a2acb498c1016495e596a9ca721

Red Hat Enterprise Linux Server 6

SRPM
mutt-1.5.20-9.20091214hg736b6a.el6.src.rpm SHA-256: cdfb045347e7d404ddeb1d4c49beeef076ff7f786106e3a40dc9b7f8b0ccad8a
x86_64
mutt-1.5.20-9.20091214hg736b6a.el6.x86_64.rpm SHA-256: 3d244c518486e3bb94c481c97d0548b3dc52f8e24bb3226ed03de307af94c4f8
mutt-1.5.20-9.20091214hg736b6a.el6.x86_64.rpm SHA-256: 3d244c518486e3bb94c481c97d0548b3dc52f8e24bb3226ed03de307af94c4f8
mutt-debuginfo-1.5.20-9.20091214hg736b6a.el6.x86_64.rpm SHA-256: a5239afe83e0aa8f41a783f7852e055c840f8abb5b9e57e7108d441ce6f6fc51
mutt-debuginfo-1.5.20-9.20091214hg736b6a.el6.x86_64.rpm SHA-256: a5239afe83e0aa8f41a783f7852e055c840f8abb5b9e57e7108d441ce6f6fc51
i386
mutt-1.5.20-9.20091214hg736b6a.el6.i686.rpm SHA-256: bf33719586bbb8fcf16e74d261e147d55d232f975fe3661e28aef651277fcc5a
mutt-debuginfo-1.5.20-9.20091214hg736b6a.el6.i686.rpm SHA-256: 8357e90b7f725578593a88f11eb48beae4401736520152f28138226408871c06

Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.7

SRPM
mutt-1.5.21-28.el7_5.src.rpm SHA-256: a078fd3c15b881509853c2b5e630b9bd10bc40c0e7c6359eeea6997260bb2af9
x86_64
mutt-1.5.21-28.el7_5.x86_64.rpm SHA-256: f6a5a6bd680d8b3b905a2cecca51cf9bacb3507205bcf48548024b08d263e314
mutt-debuginfo-1.5.21-28.el7_5.x86_64.rpm SHA-256: d9ff83a0fd52723b2c402e0e5796513ab8e56a2acb498c1016495e596a9ca721

Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.6

SRPM
mutt-1.5.21-28.el7_5.src.rpm SHA-256: a078fd3c15b881509853c2b5e630b9bd10bc40c0e7c6359eeea6997260bb2af9
x86_64
mutt-1.5.21-28.el7_5.x86_64.rpm SHA-256: f6a5a6bd680d8b3b905a2cecca51cf9bacb3507205bcf48548024b08d263e314
mutt-debuginfo-1.5.21-28.el7_5.x86_64.rpm SHA-256: d9ff83a0fd52723b2c402e0e5796513ab8e56a2acb498c1016495e596a9ca721

Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.5

SRPM
mutt-1.5.21-28.el7_5.src.rpm SHA-256: a078fd3c15b881509853c2b5e630b9bd10bc40c0e7c6359eeea6997260bb2af9
x86_64
mutt-1.5.21-28.el7_5.x86_64.rpm SHA-256: f6a5a6bd680d8b3b905a2cecca51cf9bacb3507205bcf48548024b08d263e314
mutt-debuginfo-1.5.21-28.el7_5.x86_64.rpm SHA-256: d9ff83a0fd52723b2c402e0e5796513ab8e56a2acb498c1016495e596a9ca721

Red Hat Enterprise Linux Server - AUS 7.7

SRPM
mutt-1.5.21-28.el7_5.src.rpm SHA-256: a078fd3c15b881509853c2b5e630b9bd10bc40c0e7c6359eeea6997260bb2af9
x86_64
mutt-1.5.21-28.el7_5.x86_64.rpm SHA-256: f6a5a6bd680d8b3b905a2cecca51cf9bacb3507205bcf48548024b08d263e314
mutt-debuginfo-1.5.21-28.el7_5.x86_64.rpm SHA-256: d9ff83a0fd52723b2c402e0e5796513ab8e56a2acb498c1016495e596a9ca721

Red Hat Enterprise Linux Server - AUS 7.6

SRPM
mutt-1.5.21-28.el7_5.src.rpm SHA-256: a078fd3c15b881509853c2b5e630b9bd10bc40c0e7c6359eeea6997260bb2af9
x86_64
mutt-1.5.21-28.el7_5.x86_64.rpm SHA-256: f6a5a6bd680d8b3b905a2cecca51cf9bacb3507205bcf48548024b08d263e314
mutt-debuginfo-1.5.21-28.el7_5.x86_64.rpm SHA-256: d9ff83a0fd52723b2c402e0e5796513ab8e56a2acb498c1016495e596a9ca721

Red Hat Enterprise Linux Server - Extended Life Cycle Support 7

SRPM
mutt-1.5.21-28.el7_5.src.rpm SHA-256: a078fd3c15b881509853c2b5e630b9bd10bc40c0e7c6359eeea6997260bb2af9
x86_64
mutt-1.5.21-28.el7_5.x86_64.rpm SHA-256: f6a5a6bd680d8b3b905a2cecca51cf9bacb3507205bcf48548024b08d263e314
mutt-debuginfo-1.5.21-28.el7_5.x86_64.rpm SHA-256: d9ff83a0fd52723b2c402e0e5796513ab8e56a2acb498c1016495e596a9ca721

Red Hat Enterprise Linux Server - Extended Life Cycle Support 6

SRPM
mutt-1.5.20-9.20091214hg736b6a.el6.src.rpm SHA-256: cdfb045347e7d404ddeb1d4c49beeef076ff7f786106e3a40dc9b7f8b0ccad8a
x86_64
mutt-1.5.20-9.20091214hg736b6a.el6.x86_64.rpm SHA-256: 3d244c518486e3bb94c481c97d0548b3dc52f8e24bb3226ed03de307af94c4f8
mutt-debuginfo-1.5.20-9.20091214hg736b6a.el6.x86_64.rpm SHA-256: a5239afe83e0aa8f41a783f7852e055c840f8abb5b9e57e7108d441ce6f6fc51
i386
mutt-1.5.20-9.20091214hg736b6a.el6.i686.rpm SHA-256: bf33719586bbb8fcf16e74d261e147d55d232f975fe3661e28aef651277fcc5a
mutt-debuginfo-1.5.20-9.20091214hg736b6a.el6.i686.rpm SHA-256: 8357e90b7f725578593a88f11eb48beae4401736520152f28138226408871c06

Red Hat Enterprise Linux Workstation 7

SRPM
mutt-1.5.21-28.el7_5.src.rpm SHA-256: a078fd3c15b881509853c2b5e630b9bd10bc40c0e7c6359eeea6997260bb2af9
x86_64
mutt-1.5.21-28.el7_5.x86_64.rpm SHA-256: f6a5a6bd680d8b3b905a2cecca51cf9bacb3507205bcf48548024b08d263e314
mutt-debuginfo-1.5.21-28.el7_5.x86_64.rpm SHA-256: d9ff83a0fd52723b2c402e0e5796513ab8e56a2acb498c1016495e596a9ca721

Red Hat Enterprise Linux Workstation 6

SRPM
mutt-1.5.20-9.20091214hg736b6a.el6.src.rpm SHA-256: cdfb045347e7d404ddeb1d4c49beeef076ff7f786106e3a40dc9b7f8b0ccad8a
x86_64
mutt-1.5.20-9.20091214hg736b6a.el6.x86_64.rpm SHA-256: 3d244c518486e3bb94c481c97d0548b3dc52f8e24bb3226ed03de307af94c4f8
mutt-debuginfo-1.5.20-9.20091214hg736b6a.el6.x86_64.rpm SHA-256: a5239afe83e0aa8f41a783f7852e055c840f8abb5b9e57e7108d441ce6f6fc51
i386
mutt-1.5.20-9.20091214hg736b6a.el6.i686.rpm SHA-256: bf33719586bbb8fcf16e74d261e147d55d232f975fe3661e28aef651277fcc5a
mutt-debuginfo-1.5.20-9.20091214hg736b6a.el6.i686.rpm SHA-256: 8357e90b7f725578593a88f11eb48beae4401736520152f28138226408871c06

Red Hat Enterprise Linux Desktop 7

SRPM
mutt-1.5.21-28.el7_5.src.rpm SHA-256: a078fd3c15b881509853c2b5e630b9bd10bc40c0e7c6359eeea6997260bb2af9
x86_64
mutt-1.5.21-28.el7_5.x86_64.rpm SHA-256: f6a5a6bd680d8b3b905a2cecca51cf9bacb3507205bcf48548024b08d263e314
mutt-debuginfo-1.5.21-28.el7_5.x86_64.rpm SHA-256: d9ff83a0fd52723b2c402e0e5796513ab8e56a2acb498c1016495e596a9ca721

Red Hat Enterprise Linux Desktop 6

SRPM
mutt-1.5.20-9.20091214hg736b6a.el6.src.rpm SHA-256: cdfb045347e7d404ddeb1d4c49beeef076ff7f786106e3a40dc9b7f8b0ccad8a
x86_64
mutt-1.5.20-9.20091214hg736b6a.el6.x86_64.rpm SHA-256: 3d244c518486e3bb94c481c97d0548b3dc52f8e24bb3226ed03de307af94c4f8
mutt-debuginfo-1.5.20-9.20091214hg736b6a.el6.x86_64.rpm SHA-256: a5239afe83e0aa8f41a783f7852e055c840f8abb5b9e57e7108d441ce6f6fc51
i386
mutt-1.5.20-9.20091214hg736b6a.el6.i686.rpm SHA-256: bf33719586bbb8fcf16e74d261e147d55d232f975fe3661e28aef651277fcc5a
mutt-debuginfo-1.5.20-9.20091214hg736b6a.el6.i686.rpm SHA-256: 8357e90b7f725578593a88f11eb48beae4401736520152f28138226408871c06

Red Hat Enterprise Linux for IBM z Systems 7

SRPM
mutt-1.5.21-28.el7_5.src.rpm SHA-256: a078fd3c15b881509853c2b5e630b9bd10bc40c0e7c6359eeea6997260bb2af9
s390x
mutt-1.5.21-28.el7_5.s390x.rpm SHA-256: d5f94e28794285b0786441df922ab9a193bca5de0de82eb4275ea9f077244c21
mutt-debuginfo-1.5.21-28.el7_5.s390x.rpm SHA-256: ccd6b24e59b50138aa2e96363394fb0d68982de77f3bbea96bf08797e8467626

Red Hat Enterprise Linux for IBM z Systems 6

SRPM
mutt-1.5.20-9.20091214hg736b6a.el6.src.rpm SHA-256: cdfb045347e7d404ddeb1d4c49beeef076ff7f786106e3a40dc9b7f8b0ccad8a
s390x
mutt-1.5.20-9.20091214hg736b6a.el6.s390x.rpm SHA-256: 02a1c27d0477a73a04180cd64dbbd0fb9093ec8ef8c9d8a2af27556420f5eecb
mutt-debuginfo-1.5.20-9.20091214hg736b6a.el6.s390x.rpm SHA-256: 7e6b39b605ae8028973e478571c4aa59e99c2a36e036be0ee2916342bdb1a8ac

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.7

SRPM
mutt-1.5.21-28.el7_5.src.rpm SHA-256: a078fd3c15b881509853c2b5e630b9bd10bc40c0e7c6359eeea6997260bb2af9
s390x
mutt-1.5.21-28.el7_5.s390x.rpm SHA-256: d5f94e28794285b0786441df922ab9a193bca5de0de82eb4275ea9f077244c21
mutt-debuginfo-1.5.21-28.el7_5.s390x.rpm SHA-256: ccd6b24e59b50138aa2e96363394fb0d68982de77f3bbea96bf08797e8467626

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.6

SRPM
mutt-1.5.21-28.el7_5.src.rpm SHA-256: a078fd3c15b881509853c2b5e630b9bd10bc40c0e7c6359eeea6997260bb2af9
s390x
mutt-1.5.21-28.el7_5.s390x.rpm SHA-256: d5f94e28794285b0786441df922ab9a193bca5de0de82eb4275ea9f077244c21
mutt-debuginfo-1.5.21-28.el7_5.s390x.rpm SHA-256: ccd6b24e59b50138aa2e96363394fb0d68982de77f3bbea96bf08797e8467626

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.5

SRPM
mutt-1.5.21-28.el7_5.src.rpm SHA-256: a078fd3c15b881509853c2b5e630b9bd10bc40c0e7c6359eeea6997260bb2af9
s390x
mutt-1.5.21-28.el7_5.s390x.rpm SHA-256: d5f94e28794285b0786441df922ab9a193bca5de0de82eb4275ea9f077244c21
mutt-debuginfo-1.5.21-28.el7_5.s390x.rpm SHA-256: ccd6b24e59b50138aa2e96363394fb0d68982de77f3bbea96bf08797e8467626

Red Hat Enterprise Linux for Power, big endian 7

SRPM
mutt-1.5.21-28.el7_5.src.rpm SHA-256: a078fd3c15b881509853c2b5e630b9bd10bc40c0e7c6359eeea6997260bb2af9
ppc64
mutt-1.5.21-28.el7_5.ppc64.rpm SHA-256: 02830070f8047f463bfabc723c2af42a28c9ec931fab73f72375844a292aaee1
mutt-debuginfo-1.5.21-28.el7_5.ppc64.rpm SHA-256: 4a576a73c743e06c4cdc9040720b161d743391304e1ec1846d7fef1d604b500a

Red Hat Enterprise Linux for Power, big endian 6

SRPM
mutt-1.5.20-9.20091214hg736b6a.el6.src.rpm SHA-256: cdfb045347e7d404ddeb1d4c49beeef076ff7f786106e3a40dc9b7f8b0ccad8a
ppc64
mutt-1.5.20-9.20091214hg736b6a.el6.ppc64.rpm SHA-256: 63fbd9f13ac5449a0772e413a6f4e3a4c46a4bdaf3ef0bb75ee6aec655fd3a59
mutt-debuginfo-1.5.20-9.20091214hg736b6a.el6.ppc64.rpm SHA-256: 26b199ead0ac2441d9f7b22fd278b4542c0eaf0bd24156f0393aacd350d0d879

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.7

SRPM
mutt-1.5.21-28.el7_5.src.rpm SHA-256: a078fd3c15b881509853c2b5e630b9bd10bc40c0e7c6359eeea6997260bb2af9
ppc64
mutt-1.5.21-28.el7_5.ppc64.rpm SHA-256: 02830070f8047f463bfabc723c2af42a28c9ec931fab73f72375844a292aaee1
mutt-debuginfo-1.5.21-28.el7_5.ppc64.rpm SHA-256: 4a576a73c743e06c4cdc9040720b161d743391304e1ec1846d7fef1d604b500a

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.6

SRPM
mutt-1.5.21-28.el7_5.src.rpm SHA-256: a078fd3c15b881509853c2b5e630b9bd10bc40c0e7c6359eeea6997260bb2af9
ppc64
mutt-1.5.21-28.el7_5.ppc64.rpm SHA-256: 02830070f8047f463bfabc723c2af42a28c9ec931fab73f72375844a292aaee1
mutt-debuginfo-1.5.21-28.el7_5.ppc64.rpm SHA-256: 4a576a73c743e06c4cdc9040720b161d743391304e1ec1846d7fef1d604b500a

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.5

SRPM
mutt-1.5.21-28.el7_5.src.rpm SHA-256: a078fd3c15b881509853c2b5e630b9bd10bc40c0e7c6359eeea6997260bb2af9
ppc64
mutt-1.5.21-28.el7_5.ppc64.rpm SHA-256: 02830070f8047f463bfabc723c2af42a28c9ec931fab73f72375844a292aaee1
mutt-debuginfo-1.5.21-28.el7_5.ppc64.rpm SHA-256: 4a576a73c743e06c4cdc9040720b161d743391304e1ec1846d7fef1d604b500a

Red Hat Enterprise Linux for Scientific Computing 7

SRPM
mutt-1.5.21-28.el7_5.src.rpm SHA-256: a078fd3c15b881509853c2b5e630b9bd10bc40c0e7c6359eeea6997260bb2af9
x86_64
mutt-1.5.21-28.el7_5.x86_64.rpm SHA-256: f6a5a6bd680d8b3b905a2cecca51cf9bacb3507205bcf48548024b08d263e314
mutt-debuginfo-1.5.21-28.el7_5.x86_64.rpm SHA-256: d9ff83a0fd52723b2c402e0e5796513ab8e56a2acb498c1016495e596a9ca721

Red Hat Enterprise Linux for Power, little endian 7

SRPM
mutt-1.5.21-28.el7_5.src.rpm SHA-256: a078fd3c15b881509853c2b5e630b9bd10bc40c0e7c6359eeea6997260bb2af9
ppc64le
mutt-1.5.21-28.el7_5.ppc64le.rpm SHA-256: 57ac5b1593ae548111e6d077c83a5333749c7cea251fd619402295285c0b4cd5
mutt-debuginfo-1.5.21-28.el7_5.ppc64le.rpm SHA-256: af3463b7213c08add2aab9dc81bf80336db2fce9991630a2aaaed0f2a5df631c

Red Hat Enterprise Linux for Scientific Computing 6

SRPM
mutt-1.5.20-9.20091214hg736b6a.el6.src.rpm SHA-256: cdfb045347e7d404ddeb1d4c49beeef076ff7f786106e3a40dc9b7f8b0ccad8a
x86_64
mutt-1.5.20-9.20091214hg736b6a.el6.x86_64.rpm SHA-256: 3d244c518486e3bb94c481c97d0548b3dc52f8e24bb3226ed03de307af94c4f8
mutt-debuginfo-1.5.20-9.20091214hg736b6a.el6.x86_64.rpm SHA-256: a5239afe83e0aa8f41a783f7852e055c840f8abb5b9e57e7108d441ce6f6fc51

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.7

SRPM
mutt-1.5.21-28.el7_5.src.rpm SHA-256: a078fd3c15b881509853c2b5e630b9bd10bc40c0e7c6359eeea6997260bb2af9
ppc64le
mutt-1.5.21-28.el7_5.ppc64le.rpm SHA-256: 57ac5b1593ae548111e6d077c83a5333749c7cea251fd619402295285c0b4cd5
mutt-debuginfo-1.5.21-28.el7_5.ppc64le.rpm SHA-256: af3463b7213c08add2aab9dc81bf80336db2fce9991630a2aaaed0f2a5df631c

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.6

SRPM
mutt-1.5.21-28.el7_5.src.rpm SHA-256: a078fd3c15b881509853c2b5e630b9bd10bc40c0e7c6359eeea6997260bb2af9
ppc64le
mutt-1.5.21-28.el7_5.ppc64le.rpm SHA-256: 57ac5b1593ae548111e6d077c83a5333749c7cea251fd619402295285c0b4cd5
mutt-debuginfo-1.5.21-28.el7_5.ppc64le.rpm SHA-256: af3463b7213c08add2aab9dc81bf80336db2fce9991630a2aaaed0f2a5df631c

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.5

SRPM
mutt-1.5.21-28.el7_5.src.rpm SHA-256: a078fd3c15b881509853c2b5e630b9bd10bc40c0e7c6359eeea6997260bb2af9
ppc64le
mutt-1.5.21-28.el7_5.ppc64le.rpm SHA-256: 57ac5b1593ae548111e6d077c83a5333749c7cea251fd619402295285c0b4cd5
mutt-debuginfo-1.5.21-28.el7_5.ppc64le.rpm SHA-256: af3463b7213c08add2aab9dc81bf80336db2fce9991630a2aaaed0f2a5df631c

Red Hat Enterprise Linux Server - TUS 7.7

SRPM
mutt-1.5.21-28.el7_5.src.rpm SHA-256: a078fd3c15b881509853c2b5e630b9bd10bc40c0e7c6359eeea6997260bb2af9
x86_64
mutt-1.5.21-28.el7_5.x86_64.rpm SHA-256: f6a5a6bd680d8b3b905a2cecca51cf9bacb3507205bcf48548024b08d263e314
mutt-debuginfo-1.5.21-28.el7_5.x86_64.rpm SHA-256: d9ff83a0fd52723b2c402e0e5796513ab8e56a2acb498c1016495e596a9ca721

Red Hat Enterprise Linux Server - TUS 7.6

SRPM
mutt-1.5.21-28.el7_5.src.rpm SHA-256: a078fd3c15b881509853c2b5e630b9bd10bc40c0e7c6359eeea6997260bb2af9
x86_64
mutt-1.5.21-28.el7_5.x86_64.rpm SHA-256: f6a5a6bd680d8b3b905a2cecca51cf9bacb3507205bcf48548024b08d263e314
mutt-debuginfo-1.5.21-28.el7_5.x86_64.rpm SHA-256: d9ff83a0fd52723b2c402e0e5796513ab8e56a2acb498c1016495e596a9ca721

Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 7

SRPM
mutt-1.5.21-28.el7_5.src.rpm SHA-256: a078fd3c15b881509853c2b5e630b9bd10bc40c0e7c6359eeea6997260bb2af9
s390x
mutt-1.5.21-28.el7_5.s390x.rpm SHA-256: d5f94e28794285b0786441df922ab9a193bca5de0de82eb4275ea9f077244c21
mutt-debuginfo-1.5.21-28.el7_5.s390x.rpm SHA-256: ccd6b24e59b50138aa2e96363394fb0d68982de77f3bbea96bf08797e8467626

Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6

SRPM
mutt-1.5.20-9.20091214hg736b6a.el6.src.rpm SHA-256: cdfb045347e7d404ddeb1d4c49beeef076ff7f786106e3a40dc9b7f8b0ccad8a
s390x
mutt-1.5.20-9.20091214hg736b6a.el6.s390x.rpm SHA-256: 02a1c27d0477a73a04180cd64dbbd0fb9093ec8ef8c9d8a2af27556420f5eecb
mutt-debuginfo-1.5.20-9.20091214hg736b6a.el6.s390x.rpm SHA-256: 7e6b39b605ae8028973e478571c4aa59e99c2a36e036be0ee2916342bdb1a8ac

Red Hat Enterprise Linux for ARM 64 7

SRPM
mutt-1.5.21-28.el7_5.src.rpm SHA-256: a078fd3c15b881509853c2b5e630b9bd10bc40c0e7c6359eeea6997260bb2af9
aarch64
mutt-1.5.21-28.el7_5.aarch64.rpm SHA-256: 66a595a27f317b6f9d5e26c8f4cc0bf4cb4366f890e25c9b83d438aa95002865
mutt-debuginfo-1.5.21-28.el7_5.aarch64.rpm SHA-256: f58bf49595eaf996711ada1fb7e54ad32efdc82af9a539c259a043204943cbbf

Red Hat Enterprise Linux for Power 9 7

SRPM
mutt-1.5.21-28.el7_5.src.rpm SHA-256: a078fd3c15b881509853c2b5e630b9bd10bc40c0e7c6359eeea6997260bb2af9
ppc64le
mutt-1.5.21-28.el7_5.ppc64le.rpm SHA-256: 57ac5b1593ae548111e6d077c83a5333749c7cea251fd619402295285c0b4cd5
mutt-debuginfo-1.5.21-28.el7_5.ppc64le.rpm SHA-256: af3463b7213c08add2aab9dc81bf80336db2fce9991630a2aaaed0f2a5df631c

Red Hat Enterprise Linux EUS Compute Node 7.7

SRPM
mutt-1.5.21-28.el7_5.src.rpm SHA-256: a078fd3c15b881509853c2b5e630b9bd10bc40c0e7c6359eeea6997260bb2af9
x86_64
mutt-1.5.21-28.el7_5.x86_64.rpm SHA-256: f6a5a6bd680d8b3b905a2cecca51cf9bacb3507205bcf48548024b08d263e314
mutt-debuginfo-1.5.21-28.el7_5.x86_64.rpm SHA-256: d9ff83a0fd52723b2c402e0e5796513ab8e56a2acb498c1016495e596a9ca721

Red Hat Enterprise Linux EUS Compute Node 7.6

SRPM
mutt-1.5.21-28.el7_5.src.rpm SHA-256: a078fd3c15b881509853c2b5e630b9bd10bc40c0e7c6359eeea6997260bb2af9
x86_64
mutt-1.5.21-28.el7_5.x86_64.rpm SHA-256: f6a5a6bd680d8b3b905a2cecca51cf9bacb3507205bcf48548024b08d263e314
mutt-debuginfo-1.5.21-28.el7_5.x86_64.rpm SHA-256: d9ff83a0fd52723b2c402e0e5796513ab8e56a2acb498c1016495e596a9ca721

Red Hat Enterprise Linux EUS Compute Node 7.5

SRPM
mutt-1.5.21-28.el7_5.src.rpm SHA-256: a078fd3c15b881509853c2b5e630b9bd10bc40c0e7c6359eeea6997260bb2af9
x86_64
mutt-1.5.21-28.el7_5.x86_64.rpm SHA-256: f6a5a6bd680d8b3b905a2cecca51cf9bacb3507205bcf48548024b08d263e314
mutt-debuginfo-1.5.21-28.el7_5.x86_64.rpm SHA-256: d9ff83a0fd52723b2c402e0e5796513ab8e56a2acb498c1016495e596a9ca721

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.7

SRPM
mutt-1.5.21-28.el7_5.src.rpm SHA-256: a078fd3c15b881509853c2b5e630b9bd10bc40c0e7c6359eeea6997260bb2af9
ppc64le
mutt-1.5.21-28.el7_5.ppc64le.rpm SHA-256: 57ac5b1593ae548111e6d077c83a5333749c7cea251fd619402295285c0b4cd5
mutt-debuginfo-1.5.21-28.el7_5.ppc64le.rpm SHA-256: af3463b7213c08add2aab9dc81bf80336db2fce9991630a2aaaed0f2a5df631c

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.6

SRPM
mutt-1.5.21-28.el7_5.src.rpm SHA-256: a078fd3c15b881509853c2b5e630b9bd10bc40c0e7c6359eeea6997260bb2af9
ppc64le
mutt-1.5.21-28.el7_5.ppc64le.rpm SHA-256: 57ac5b1593ae548111e6d077c83a5333749c7cea251fd619402295285c0b4cd5
mutt-debuginfo-1.5.21-28.el7_5.ppc64le.rpm SHA-256: af3463b7213c08add2aab9dc81bf80336db2fce9991630a2aaaed0f2a5df631c

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.7

SRPM
mutt-1.5.21-28.el7_5.src.rpm SHA-256: a078fd3c15b881509853c2b5e630b9bd10bc40c0e7c6359eeea6997260bb2af9
x86_64
mutt-1.5.21-28.el7_5.x86_64.rpm SHA-256: f6a5a6bd680d8b3b905a2cecca51cf9bacb3507205bcf48548024b08d263e314
mutt-debuginfo-1.5.21-28.el7_5.x86_64.rpm SHA-256: d9ff83a0fd52723b2c402e0e5796513ab8e56a2acb498c1016495e596a9ca721

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.6

SRPM
mutt-1.5.21-28.el7_5.src.rpm SHA-256: a078fd3c15b881509853c2b5e630b9bd10bc40c0e7c6359eeea6997260bb2af9
x86_64
mutt-1.5.21-28.el7_5.x86_64.rpm SHA-256: f6a5a6bd680d8b3b905a2cecca51cf9bacb3507205bcf48548024b08d263e314
mutt-debuginfo-1.5.21-28.el7_5.x86_64.rpm SHA-256: d9ff83a0fd52723b2c402e0e5796513ab8e56a2acb498c1016495e596a9ca721

Red Hat Enterprise Linux for IBM System z (Structure A) 7

SRPM
mutt-1.5.21-28.el7_5.src.rpm SHA-256: a078fd3c15b881509853c2b5e630b9bd10bc40c0e7c6359eeea6997260bb2af9
s390x
mutt-1.5.21-28.el7_5.s390x.rpm SHA-256: d5f94e28794285b0786441df922ab9a193bca5de0de82eb4275ea9f077244c21
mutt-debuginfo-1.5.21-28.el7_5.s390x.rpm SHA-256: ccd6b24e59b50138aa2e96363394fb0d68982de77f3bbea96bf08797e8467626

Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, big endian 7

SRPM
mutt-1.5.21-28.el7_5.src.rpm SHA-256: a078fd3c15b881509853c2b5e630b9bd10bc40c0e7c6359eeea6997260bb2af9
ppc64
mutt-1.5.21-28.el7_5.ppc64.rpm SHA-256: 02830070f8047f463bfabc723c2af42a28c9ec931fab73f72375844a292aaee1
mutt-debuginfo-1.5.21-28.el7_5.ppc64.rpm SHA-256: 4a576a73c743e06c4cdc9040720b161d743391304e1ec1846d7fef1d604b500a

Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, little endian 7

SRPM
mutt-1.5.21-28.el7_5.src.rpm SHA-256: a078fd3c15b881509853c2b5e630b9bd10bc40c0e7c6359eeea6997260bb2af9
ppc64le
mutt-1.5.21-28.el7_5.ppc64le.rpm SHA-256: 57ac5b1593ae548111e6d077c83a5333749c7cea251fd619402295285c0b4cd5
mutt-debuginfo-1.5.21-28.el7_5.ppc64le.rpm SHA-256: af3463b7213c08add2aab9dc81bf80336db2fce9991630a2aaaed0f2a5df631c

Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6

SRPM
mutt-1.5.20-9.20091214hg736b6a.el6.src.rpm SHA-256: cdfb045347e7d404ddeb1d4c49beeef076ff7f786106e3a40dc9b7f8b0ccad8a
x86_64
mutt-1.5.20-9.20091214hg736b6a.el6.x86_64.rpm SHA-256: 3d244c518486e3bb94c481c97d0548b3dc52f8e24bb3226ed03de307af94c4f8
mutt-debuginfo-1.5.20-9.20091214hg736b6a.el6.x86_64.rpm SHA-256: a5239afe83e0aa8f41a783f7852e055c840f8abb5b9e57e7108d441ce6f6fc51
i386
mutt-1.5.20-9.20091214hg736b6a.el6.i686.rpm SHA-256: bf33719586bbb8fcf16e74d261e147d55d232f975fe3661e28aef651277fcc5a
mutt-debuginfo-1.5.20-9.20091214hg736b6a.el6.i686.rpm SHA-256: 8357e90b7f725578593a88f11eb48beae4401736520152f28138226408871c06

Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6

SRPM
mutt-1.5.20-9.20091214hg736b6a.el6.src.rpm SHA-256: cdfb045347e7d404ddeb1d4c49beeef076ff7f786106e3a40dc9b7f8b0ccad8a
s390x
mutt-1.5.20-9.20091214hg736b6a.el6.s390x.rpm SHA-256: 02a1c27d0477a73a04180cd64dbbd0fb9093ec8ef8c9d8a2af27556420f5eecb
mutt-debuginfo-1.5.20-9.20091214hg736b6a.el6.s390x.rpm SHA-256: 7e6b39b605ae8028973e478571c4aa59e99c2a36e036be0ee2916342bdb1a8ac

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility