ALT-PU-2015-1608-1
Package cyrus-imapd updated to version 2.4.18-alt0.M70P.1 for branch p7 in task 146279.
Closed vulnerabilities
BDU:2016-00362
Уязвимость почтового сервера Cyrus IMAP и операционных систем openSUSE и OpenSUSE Leap, позволяющая нарушителю получить конфиденциальную информацию или оказать другое воздействие
BDU:2016-00363
Уязвимость почтового сервера Cyrus IMAP и операционных систем openSUSE и OpenSUSE Leap, позволяющая нарушителю нарушить целостность и доступность защищаемой информации
BDU:2016-00364
Уязвимость почтового сервера Cyrus IMAP и операционных систем openSUSE и OpenSUSE Leap, позволяющая нарушителю нарушить целостность и доступность защищаемой информации
Modified: 2025-04-12
CVE-2015-8076
The index_urlfetch function in index.c in Cyrus IMAP 2.3.x before 2.3.19, 2.4.x before 2.4.18, 2.5.x before 2.5.4 allows remote attackers to obtain sensitive information or possibly have unspecified other impact via vectors related to the urlfetch range, which triggers an out-of-bounds heap read.
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00000.html
- http://lists.opensuse.org/opensuse-updates/2015-09/msg00037.html
- http://lists.opensuse.org/opensuse-updates/2015-09/msg00038.html
- http://www.openwall.com/lists/oss-security/2015/09/29/2
- http://www.openwall.com/lists/oss-security/2015/09/30/3
- http://www.openwall.com/lists/oss-security/2015/11/04/3
- https://cyrus.foundation/cyrus-imapd/commit/?id=07de4ff1bf2fa340b9d77b8e7de8d43d47a33921
- https://cyrus.foundation/cyrus-imapd/commit/?id=c21e179c1f6b968fe69bebe079176714e511587b
- https://docs.cyrus.foundation/imap/release-notes/2.3/x/2.3.19.html
- https://docs.cyrus.foundation/imap/release-notes/2.4/x/2.4.18.html
- https://docs.cyrus.foundation/imap/release-notes/2.5/x/2.5.4.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00000.html
- http://lists.opensuse.org/opensuse-updates/2015-09/msg00037.html
- http://lists.opensuse.org/opensuse-updates/2015-09/msg00038.html
- http://www.openwall.com/lists/oss-security/2015/09/29/2
- http://www.openwall.com/lists/oss-security/2015/09/30/3
- http://www.openwall.com/lists/oss-security/2015/11/04/3
- https://cyrus.foundation/cyrus-imapd/commit/?id=07de4ff1bf2fa340b9d77b8e7de8d43d47a33921
- https://cyrus.foundation/cyrus-imapd/commit/?id=c21e179c1f6b968fe69bebe079176714e511587b
- https://docs.cyrus.foundation/imap/release-notes/2.3/x/2.3.19.html
- https://docs.cyrus.foundation/imap/release-notes/2.4/x/2.4.18.html
- https://docs.cyrus.foundation/imap/release-notes/2.5/x/2.5.4.html
Modified: 2025-04-12
CVE-2015-8077
Integer overflow in the index_urlfetch function in imap/index.c in Cyrus IMAP 2.3.19, 2.4.18, and 2.5.6 allows remote attackers to have unspecified impact via vectors related to urlfetch range checks and the start_octet variable. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8076.
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00000.html
- http://lists.opensuse.org/opensuse-updates/2015-11/msg00156.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00015.html
- http://www.openwall.com/lists/oss-security/2015/09/30/3
- http://www.openwall.com/lists/oss-security/2015/11/04/3
- http://www.securitytracker.com/id/1034282
- https://cyrus.foundation/cyrus-imapd/commit/?id=745e161c834f1eb6d62fc14477f51dae799e1e08
- https://docs.cyrus.foundation/imap/release-notes/2.5/x/2.5.7.html
- https://lists.andrew.cmu.edu/pipermail/cyrus-devel/2015-October/003534.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00000.html
- http://lists.opensuse.org/opensuse-updates/2015-11/msg00156.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00015.html
- http://www.openwall.com/lists/oss-security/2015/09/30/3
- http://www.openwall.com/lists/oss-security/2015/11/04/3
- http://www.securitytracker.com/id/1034282
- https://cyrus.foundation/cyrus-imapd/commit/?id=745e161c834f1eb6d62fc14477f51dae799e1e08
- https://docs.cyrus.foundation/imap/release-notes/2.5/x/2.5.7.html
- https://lists.andrew.cmu.edu/pipermail/cyrus-devel/2015-October/003534.html
Modified: 2025-04-12
CVE-2015-8078
Integer overflow in the index_urlfetch function in imap/index.c in Cyrus IMAP 2.3.19, 2.4.18, and 2.5.6 allows remote attackers to have unspecified impact via vectors related to urlfetch range checks and the section_offset variable. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8076.
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00000.html
- http://lists.opensuse.org/opensuse-updates/2015-11/msg00156.html
- http://www.openwall.com/lists/oss-security/2015/11/04/3
- http://www.securitytracker.com/id/1034282
- https://cyrus.foundation/cyrus-imapd/commit/?id=6fb6a272171f49c79ba6ab7c6403eb25b39ec1b2
- https://docs.cyrus.foundation/imap/release-notes/2.5/x/2.5.7.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00000.html
- http://lists.opensuse.org/opensuse-updates/2015-11/msg00156.html
- http://www.openwall.com/lists/oss-security/2015/11/04/3
- http://www.securitytracker.com/id/1034282
- https://cyrus.foundation/cyrus-imapd/commit/?id=6fb6a272171f49c79ba6ab7c6403eb25b39ec1b2
- https://docs.cyrus.foundation/imap/release-notes/2.5/x/2.5.7.html
Closed bugs
стартовый скрипт cyrus-imap всегда перезаписывает ключи SSL