dovecot23

Edit Package dovecot23
No description set
Refresh
Refresh
Source Files
Filename Size Changed
dovecot-2.0.configfiles 0000001000 1000 Bytes
dovecot-2.1-pigeonhole.configfiles 0000000074 74 Bytes
dovecot-2.1.configfiles 0000001117 1.09 KB
dovecot-2.2-pigeonhole.configfiles 0000000149 149 Bytes
dovecot-2.2.configfiles 0000001127 1.1 KB
dovecot-2.3-pigeonhole-0.5.0.1.tar.gz 0001783039 1.7 MB
dovecot-2.3-pigeonhole.configfiles 0000000149 149 Bytes
dovecot-2.3.0-better_ssl_defaults.patch 0000002588 2.53 KB
dovecot-2.3.0-dont_use_etc_ssl_certs.patch 0000005212 5.09 KB
dovecot-2.3.0.1-over-quota-lmtp-crash.patch 0000005988 5.85 KB
dovecot-2.3.0.1.tar.gz 0006499984 6.2 MB
dovecot-2.3.configfiles 0000001123 1.1 KB
dovecot-rpmlintrc 0000000122 122 Bytes
dovecot23.changes 0000006373 6.22 KB
dovecot23.spec 0000027107 26.5 KB
Revision 3 (latest revision is 53)
Dominique Leuenberger's avatar Dominique Leuenberger (dimstar_suse) accepted request 583681 from Marcus Rueckert's avatar Marcus Rueckert (darix) (revision 3)
- update pigeonhole to 0.5.0.1
  - imap4flags extension: Fix binary corruption occurring when
    setflag/addflag/removeflag flag-list is a variable.
  - sieve-extprograms plugin: Fix segfault occurring when used in
    IMAPSieve context.
- drop 321a39be974deb2e7eff7b2a509a3ee6ff2e5ae1.patch

- pull backport patch dovecot-2.3.0.1-over-quota-lmtp-crash.patch

- update to 2.3.0.1
  * CVE-2017-15130: TLS SNI config lookups may lead to excessive
    memory usage, causing imap-login/pop3-login VSZ limit to be
    reached and the process restarted. This happens only if Dovecot
    config has local_name { } or local { } configuration blocks and
    attacker uses randomly generated SNI servernames.
  * CVE-2017-14461: Parsing invalid email addresses may cause a
    crash or leak memory contents to attacker. For example, these
    memory contents might contain parts of an email from another
    user if the same imap process is reused for multiple users.
    First discovered by Aleksandar Nikolic of Cisco Talos.
    Independently also discovered by "flxflndy" via HackerOne.
  * CVE-2017-15132: Aborted SASL authentication leaks memory in
    login process.
  * Linux: Core dumping is no longer enabled by default via
    PR_SET_DUMPABLE, because this may allow attackers to bypass
    chroot/group restrictions. Found by cPanel Security Team.
    Nowadays core dumps can be safely enabled by using "sysctl -w
    fs.suid_dumpable=2". If the old behaviour is wanted, it can
    still be enabled by setting:
    import_environment=$import_environment PR_SET_DUMPABLE=1
  - imap-login with SSL/TLS connections may end up in infinite loop
Comments 0
openSUSE Build Service is sponsored by