SUSE-SU-2017:1250-1: moderate: Security update for dovecot22
sle-updates at lists.suse.com
sle-updates at lists.suse.com
Thu May 11 13:18:58 MDT 2017
SUSE Security Update: Security update for dovecot22
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:1250-1
Rating: moderate
References: #1032248 #854512 #932386
Cross-References: CVE-2017-2669
Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP2
SUSE Linux Enterprise Software Development Kit 12-SP1
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
SUSE Linux Enterprise Server 12-SP2
SUSE Linux Enterprise Server 12-SP1
______________________________________________________________________________
An update that solves one vulnerability and has two fixes
is now available.
Description:
This update for dovecot22 to version 2.2.29.1 fixes the following issues:
This security issue was fixed:
- CVE-2017-2669: Don't double-expand %variables in keys. If dict was used
as the authentication passdb, using specially crafted %variables in the
username could be used to cause DoS (bsc#1032248)
Additionally stronger SSL default ciphers are now used.
This non-security issue was fixed:
- Remove all references /etc/ssl/certs/. It should not be used anymore
(bsc#932386)
More changes are available in the changelog. Please make sure you read
README.SUSE after installing this update.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 12-SP2:
zypper in -t patch SUSE-SLE-SDK-12-SP2-2017-747=1
- SUSE Linux Enterprise Software Development Kit 12-SP1:
zypper in -t patch SUSE-SLE-SDK-12-SP1-2017-747=1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:
zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-747=1
- SUSE Linux Enterprise Server 12-SP2:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-747=1
- SUSE Linux Enterprise Server 12-SP1:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-747=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64):
dovecot22-debuginfo-2.2.29.1-11.1
dovecot22-debugsource-2.2.29.1-11.1
dovecot22-devel-2.2.29.1-11.1
- SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64):
dovecot22-debuginfo-2.2.29.1-11.1
dovecot22-debugsource-2.2.29.1-11.1
dovecot22-devel-2.2.29.1-11.1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):
dovecot22-2.2.29.1-11.1
dovecot22-backend-mysql-2.2.29.1-11.1
dovecot22-backend-mysql-debuginfo-2.2.29.1-11.1
dovecot22-backend-pgsql-2.2.29.1-11.1
dovecot22-backend-pgsql-debuginfo-2.2.29.1-11.1
dovecot22-backend-sqlite-2.2.29.1-11.1
dovecot22-backend-sqlite-debuginfo-2.2.29.1-11.1
dovecot22-debuginfo-2.2.29.1-11.1
dovecot22-debugsource-2.2.29.1-11.1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (noarch):
dovecot-2.2-3.1
- SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le x86_64):
dovecot22-2.2.29.1-11.1
dovecot22-backend-mysql-2.2.29.1-11.1
dovecot22-backend-mysql-debuginfo-2.2.29.1-11.1
dovecot22-backend-pgsql-2.2.29.1-11.1
dovecot22-backend-pgsql-debuginfo-2.2.29.1-11.1
dovecot22-backend-sqlite-2.2.29.1-11.1
dovecot22-backend-sqlite-debuginfo-2.2.29.1-11.1
dovecot22-debuginfo-2.2.29.1-11.1
dovecot22-debugsource-2.2.29.1-11.1
- SUSE Linux Enterprise Server 12-SP2 (noarch):
dovecot-2.2-3.1
- SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64):
dovecot22-2.2.29.1-11.1
dovecot22-backend-mysql-2.2.29.1-11.1
dovecot22-backend-mysql-debuginfo-2.2.29.1-11.1
dovecot22-backend-pgsql-2.2.29.1-11.1
dovecot22-backend-pgsql-debuginfo-2.2.29.1-11.1
dovecot22-backend-sqlite-2.2.29.1-11.1
dovecot22-backend-sqlite-debuginfo-2.2.29.1-11.1
dovecot22-debuginfo-2.2.29.1-11.1
dovecot22-debugsource-2.2.29.1-11.1
- SUSE Linux Enterprise Server 12-SP1 (noarch):
dovecot-2.2-3.1
References:
https://www.suse.com/security/cve/CVE-2017-2669.html
https://bugzilla.suse.com/1032248
https://bugzilla.suse.com/854512
https://bugzilla.suse.com/932386
More information about the sle-updates
mailing list