• [SECURITY] [DSA 5708-1] cyrus-imapd security update

    From Moritz Muehlenhoff@21:1/5 to All on Tue Jun 11 20:30:01 2024
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA512

    - ------------------------------------------------------------------------- Debian Security Advisory DSA-5708-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff
    June 11, 2024 https://www.debian.org/security/faq
    - -------------------------------------------------------------------------

    Package : cyrus-imapd
    CVE ID : CVE-2024-34055

    Damian Poddebniak discovered that the Cyrus IMAP server didn't restrict
    memory allocation for some command arguments which may result in denial
    of service. This update backports new config directives which allow to configure limits, additional details can be found at:

    https://www.cyrusimap.org/3.6/imap/download/release-notes/3.6/x/3.6.5.html

    These changes are too intrusive to be backported to the version of
    Cyrus in the oldstable distribution (bullseye). If the IMAP server is used
    by untrusted users an update to Debian stable/bookworm is recommended.
    In addition the version of cyrus-imapd in bullseye-backports will be
    updated with a patch soon.

    For the stable distribution (bookworm), this problem has been fixed in
    version 3.6.1-4+deb12u2.

    We recommend that you upgrade your cyrus-imapd packages.

    For the detailed security status of cyrus-imapd please refer to
    its security tracker page at: https://security-tracker.debian.org/tracker/cyrus-imapd

    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/

    Mailing list: debian-security-announce@lists.debian.org
    -----BEGIN PGP SIGNATURE-----

    iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmZoliMACgkQEMKTtsN8 TjZehRAAmsG/uxV+I5d5ftA5Zt6vHzr+JGjjA9nOdRijRWI1eITjPIZV+IQgUszr rW/jgbYmRbzI1WNpHKp6bkB70s22bQjShw00MeLk1FSaQkTJyDIkA5sq/xiRM0Yn Ie8nVDaMhVpcYjfeFc/5ZKXZQoea4UiQpIKIGNdq/FHaY3vMja0xYvxVx+0BCrsc aRQrk/wyf7dBgS5HSiJpJruXOAW9zh3IBVF9IDXOpMDG266ymPUuIPmgRUwHjlwj TrWHkdiuHs6CO8zvETnukZOdJCebrfet6dE3/MFyt+Y3w+X6SLTzWD6quYV5rAp1 yaxHlwaeewXaBeX90OoRGL4wYElbl6NJPc2SKi3/uTuDHGzAExqXXzorhvGcmVgG SGmMlcSAp9CLNo9/VznMo8q3TJq6+RaJ1ivqh163fisQxsigsG3DjuBM0uBEHHXJ z/W7VCYVm1VcYsR3PCpfPI81Ds92SNHBf9HsDYI07fJV82BZ+EIPiXa6a9SAfI4+ dbG4C9Rz7tmh5XCVHBTg8ZxlJQhrF2S67ENI6IxjHjyLVfJiYVReEJ06GiytkcJ0 ZYzXu8pRjDP8s/jynCPGbmWbXSEEW6QykOWPT1qM2Uq5lGxZluKIKQySs+GJ6UJx guHK1eC2XCc4p9FDtEq6Nd0C593VPoYyf7CTqVKXfBL/N0uk/7U=
    =rPUU
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)