Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2024:9195

Опубликовано: 17 мар. 2025
Источник: rocky
Оценка: Moderate

Описание

Moderate: cyrus-imapd security update

The cyrus-imapd packages contain a high-performance mail server with IMAP, POP3, NNTP, and SIEVE support.

Security Fix(es):

  • cyrus-imapd: unbounded memory allocation by sending many LITERALs in a single command (CVE-2024-34055)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.

Затронутые продукты

  • Rocky Linux 9

НаименованиеАрхитектураРелизRPM
cyrus-imapdx86_641.el9cyrus-imapd-3.4.8-1.el9.x86_64.rpm
cyrus-imapd-libsi6861.el9cyrus-imapd-libs-3.4.8-1.el9.i686.rpm
cyrus-imapd-libsx86_641.el9cyrus-imapd-libs-3.4.8-1.el9.x86_64.rpm
cyrus-imapd-utilsx86_641.el9cyrus-imapd-utils-3.4.8-1.el9.x86_64.rpm
perl-Cyrusx86_641.el9perl-Cyrus-3.4.8-1.el9.x86_64.rpm

Показывать по

Связанные CVE

Исправления

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 1 года назад

Cyrus IMAP before 3.8.3 and 3.10.x before 3.10.0-rc1 allows authenticated attackers to cause unbounded memory allocation by sending many LITERALs in a single command.

CVSS3: 6.5
redhat
больше 1 года назад

Cyrus IMAP before 3.8.3 and 3.10.x before 3.10.0-rc1 allows authenticated attackers to cause unbounded memory allocation by sending many LITERALs in a single command.

CVSS3: 6.5
nvd
больше 1 года назад

Cyrus IMAP before 3.8.3 and 3.10.x before 3.10.0-rc1 allows authenticated attackers to cause unbounded memory allocation by sending many LITERALs in a single command.

CVSS3: 6.5
debian
больше 1 года назад

Cyrus IMAP before 3.8.3 and 3.10.x before 3.10.0-rc1 allows authentica ...

CVSS3: 6.5
github
больше 1 года назад

Cyrus IMAP before 3.8.3 and 3.10.x before 3.10.0-rc1 allows authenticated attackers to cause unbounded memory allocation by sending many LITERALs in a single command.