SUSE-SU-2018:0466-1: moderate: Security update for dovecot22

sle-updates at lists.suse.com sle-updates at lists.suse.com
Fri Feb 16 13:08:06 MST 2018


   SUSE Security Update: Security update for dovecot22
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:0466-1
Rating:             moderate
References:         #1075608 
Cross-References:   CVE-2017-15132
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 12-SP3
                    SUSE Linux Enterprise Software Development Kit 12-SP2
                    SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
                    SUSE Linux Enterprise Server 12-SP3
                    SUSE Linux Enterprise Server 12-SP2
______________________________________________________________________________

   An update that fixes one vulnerability is now available.

Description:

   This update for dovecot22 fixes one issue.

   This security issue was fixed:

   - CVE-2017-15132: An abort of SASL authentication resulted in a memory
     leak in dovecot's auth client used by login processes. The leak has
     impact in high performance configuration where same login processes are
     reused and can cause the process to crash due to memory exhaustion
     (bsc#1075608).


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 12-SP3:

      zypper in -t patch SUSE-SLE-SDK-12-SP3-2018-321=1

   - SUSE Linux Enterprise Software Development Kit 12-SP2:

      zypper in -t patch SUSE-SLE-SDK-12-SP2-2018-321=1

   - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:

      zypper in -t patch SUSE-SLE-RPI-12-SP2-2018-321=1

   - SUSE Linux Enterprise Server 12-SP3:

      zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-321=1

   - SUSE Linux Enterprise Server 12-SP2:

      zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-321=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 ppc64le s390x x86_64):

      dovecot22-debuginfo-2.2.31-19.5.1
      dovecot22-debugsource-2.2.31-19.5.1
      dovecot22-devel-2.2.31-19.5.1

   - SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64):

      dovecot22-debuginfo-2.2.31-19.5.1
      dovecot22-debugsource-2.2.31-19.5.1
      dovecot22-devel-2.2.31-19.5.1

   - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):

      dovecot22-2.2.31-19.5.1
      dovecot22-backend-mysql-2.2.31-19.5.1
      dovecot22-backend-mysql-debuginfo-2.2.31-19.5.1
      dovecot22-backend-pgsql-2.2.31-19.5.1
      dovecot22-backend-pgsql-debuginfo-2.2.31-19.5.1
      dovecot22-backend-sqlite-2.2.31-19.5.1
      dovecot22-backend-sqlite-debuginfo-2.2.31-19.5.1
      dovecot22-debuginfo-2.2.31-19.5.1
      dovecot22-debugsource-2.2.31-19.5.1

   - SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64):

      dovecot22-2.2.31-19.5.1
      dovecot22-backend-mysql-2.2.31-19.5.1
      dovecot22-backend-mysql-debuginfo-2.2.31-19.5.1
      dovecot22-backend-pgsql-2.2.31-19.5.1
      dovecot22-backend-pgsql-debuginfo-2.2.31-19.5.1
      dovecot22-backend-sqlite-2.2.31-19.5.1
      dovecot22-backend-sqlite-debuginfo-2.2.31-19.5.1
      dovecot22-debuginfo-2.2.31-19.5.1
      dovecot22-debugsource-2.2.31-19.5.1

   - SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le s390x x86_64):

      dovecot22-2.2.31-19.5.1
      dovecot22-backend-mysql-2.2.31-19.5.1
      dovecot22-backend-mysql-debuginfo-2.2.31-19.5.1
      dovecot22-backend-pgsql-2.2.31-19.5.1
      dovecot22-backend-pgsql-debuginfo-2.2.31-19.5.1
      dovecot22-backend-sqlite-2.2.31-19.5.1
      dovecot22-backend-sqlite-debuginfo-2.2.31-19.5.1
      dovecot22-debuginfo-2.2.31-19.5.1
      dovecot22-debugsource-2.2.31-19.5.1


References:

   https://www.suse.com/security/cve/CVE-2017-15132.html
   https://bugzilla.suse.com/1075608



More information about the sle-updates mailing list