Bugzilla – Bug 1174922
VUL-0: CVE-2020-12673: dovecot22,dovecot23: improper implementation of NTLM does not check message buffer size
Last modified: 2021-02-16 10:51:21 UTC
This is an autogenerated message for OBS integration: This bug (1174922) was mentioned in https://build.opensuse.org/request/show/826276 Factory / dovecot23
SUSE-SU-2020:2267-1: An update that fixes two vulnerabilities is now available. Category: security (important) Bug References: 1174922,1174923 CVE References: CVE-2020-12673,CVE-2020-12674 JIRA References: Sources used: SUSE Linux Enterprise Module for Server Applications 15-SP1 (src): dovecot23-2.3.10-16.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2020:2266-1: An update that fixes two vulnerabilities is now available. Category: security (important) Bug References: 1174922,1174923 CVE References: CVE-2020-12673,CVE-2020-12674 JIRA References: Sources used: SUSE Linux Enterprise Server for SAP 15 (src): dovecot23-2.3.10-4.27.1 SUSE Linux Enterprise Server 15-LTSS (src): dovecot23-2.3.10-4.27.1 SUSE Linux Enterprise High Performance Computing 15-LTSS (src): dovecot23-2.3.10-4.27.1 SUSE Linux Enterprise High Performance Computing 15-ESPOS (src): dovecot23-2.3.10-4.27.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2020:2274-1: An update that fixes two vulnerabilities is now available. Category: security (important) Bug References: 1174922,1174923 CVE References: CVE-2020-12673,CVE-2020-12674 JIRA References: Sources used: SUSE OpenStack Cloud Crowbar 9 (src): dovecot22-2.2.31-19.22.1 SUSE OpenStack Cloud Crowbar 8 (src): dovecot22-2.2.31-19.22.1 SUSE OpenStack Cloud 9 (src): dovecot22-2.2.31-19.22.1 SUSE OpenStack Cloud 8 (src): dovecot22-2.2.31-19.22.1 SUSE OpenStack Cloud 7 (src): dovecot22-2.2.31-19.22.1 SUSE Linux Enterprise Software Development Kit 12-SP5 (src): dovecot22-2.2.31-19.22.1 SUSE Linux Enterprise Server for SAP 12-SP4 (src): dovecot22-2.2.31-19.22.1 SUSE Linux Enterprise Server for SAP 12-SP3 (src): dovecot22-2.2.31-19.22.1 SUSE Linux Enterprise Server for SAP 12-SP2 (src): dovecot22-2.2.31-19.22.1 SUSE Linux Enterprise Server 12-SP5 (src): dovecot22-2.2.31-19.22.1 SUSE Linux Enterprise Server 12-SP4-LTSS (src): dovecot22-2.2.31-19.22.1 SUSE Linux Enterprise Server 12-SP3-LTSS (src): dovecot22-2.2.31-19.22.1 SUSE Linux Enterprise Server 12-SP3-BCL (src): dovecot22-2.2.31-19.22.1 SUSE Linux Enterprise Server 12-SP2-LTSS (src): dovecot22-2.2.31-19.22.1 SUSE Linux Enterprise Server 12-SP2-BCL (src): dovecot22-2.2.31-19.22.1 SUSE Enterprise Storage 5 (src): dovecot22-2.2.31-19.22.1 HPE Helion Openstack 8 (src): dovecot22-2.2.31-19.22.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
openSUSE-SU-2020:1241-1: An update that fixes two vulnerabilities is now available. Category: security (important) Bug References: 1174922,1174923 CVE References: CVE-2020-12673,CVE-2020-12674 JIRA References: Sources used: openSUSE Leap 15.1 (src): dovecot23-2.3.10-lp151.2.12.1
openSUSE-SU-2020:1262-1: An update that fixes two vulnerabilities is now available. Category: security (important) Bug References: 1174922,1174923 CVE References: CVE-2020-12673,CVE-2020-12674 JIRA References: Sources used: openSUSE Leap 15.2 (src): dovecot23-2.3.10-lp152.2.3.1
SUSE-SU-2021:0028-1: An update that fixes 5 vulnerabilities is now available. Category: security (important) Bug References: 1174920,1174922,1174923,1180405,1180406 CVE References: CVE-2020-12100,CVE-2020-12673,CVE-2020-12674,CVE-2020-24386,CVE-2020-25275 JIRA References: Sources used: SUSE Linux Enterprise Module for Server Applications 15-SP2 (src): dovecot23-2.3.11.3-17.5.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Fixed