A flaw was found in dovecot 2.0 up to 2.2.33 and 2.3.0. An abort of SASL
authentication results in a memory leak in dovecot’s auth client used by
login processes. The leak has impact in high performance configuration
where same login processes are reused and can cause the process to crash
due to memory exhaustion.
Author | Note |
---|---|
leosilva | debian found a regression caused by this commit. In order to fix this both commit/patch should be applied. |
www.openwall.com/lists/oss-security/2018/01/31/1
bugzilla.redhat.com/show_bug.cgi?id=1532768
github.com/dovecot/core/commit/1a29ed2f96da1be22fa5a4d96c7583aa81b8b060.patch
github.com/dovecot/core/commit/a9b135760aea6d1790d447d351c56b78889dac22.patch
launchpad.net/bugs/cve/CVE-2017-15132
nvd.nist.gov/vuln/detail/CVE-2017-15132
security-tracker.debian.org/tracker/CVE-2017-15132
ubuntu.com/security/notices/USN-3556-1
ubuntu.com/security/notices/USN-3556-2
www.cve.org/CVERecord?id=CVE-2017-15132