dovecot23
No description set
- Developed at server:mail
-
3
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:Factory/dovecot23 && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
dovecot-2.0.configfiles | 0000001000 1000 Bytes | |
dovecot-2.1-pigeonhole.configfiles | 0000000074 74 Bytes | |
dovecot-2.1.configfiles | 0000001117 1.09 KB | |
dovecot-2.2-pigeonhole.configfiles | 0000000149 149 Bytes | |
dovecot-2.2.configfiles | 0000001127 1.1 KB | |
dovecot-2.3-pigeonhole-0.5.0.1.tar.gz | 0001783039 1.7 MB | |
dovecot-2.3-pigeonhole.configfiles | 0000000149 149 Bytes | |
dovecot-2.3.0-better_ssl_defaults.patch | 0000002588 2.53 KB | |
dovecot-2.3.0-dont_use_etc_ssl_certs.patch | 0000005212 5.09 KB | |
dovecot-2.3.0.1-over-quota-lmtp-crash.patch | 0000005988 5.85 KB | |
dovecot-2.3.0.1.tar.gz | 0006499984 6.2 MB | |
dovecot-2.3.configfiles | 0000001123 1.1 KB | |
dovecot-rpmlintrc | 0000000122 122 Bytes | |
dovecot23.changes | 0000006373 6.22 KB | |
dovecot23.spec | 0000027107 26.5 KB |
Revision 3 (latest revision is 53)
Dominique Leuenberger (dimstar_suse)
accepted
request 583681
from
Marcus Rueckert (darix)
(revision 3)
- update pigeonhole to 0.5.0.1 - imap4flags extension: Fix binary corruption occurring when setflag/addflag/removeflag flag-list is a variable. - sieve-extprograms plugin: Fix segfault occurring when used in IMAPSieve context. - drop 321a39be974deb2e7eff7b2a509a3ee6ff2e5ae1.patch - pull backport patch dovecot-2.3.0.1-over-quota-lmtp-crash.patch - update to 2.3.0.1 * CVE-2017-15130: TLS SNI config lookups may lead to excessive memory usage, causing imap-login/pop3-login VSZ limit to be reached and the process restarted. This happens only if Dovecot config has local_name { } or local { } configuration blocks and attacker uses randomly generated SNI servernames. * CVE-2017-14461: Parsing invalid email addresses may cause a crash or leak memory contents to attacker. For example, these memory contents might contain parts of an email from another user if the same imap process is reused for multiple users. First discovered by Aleksandar Nikolic of Cisco Talos. Independently also discovered by "flxflndy" via HackerOne. * CVE-2017-15132: Aborted SASL authentication leaks memory in login process. * Linux: Core dumping is no longer enabled by default via PR_SET_DUMPABLE, because this may allow attackers to bypass chroot/group restrictions. Found by cPanel Security Team. Nowadays core dumps can be safely enabled by using "sysctl -w fs.suid_dumpable=2". If the old behaviour is wanted, it can still be enabled by setting: import_environment=$import_environment PR_SET_DUMPABLE=1 - imap-login with SSL/TLS connections may end up in infinite loop
Comments 0