RLSA-2022:1964

See a problem?
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2022:1964.json
JSON Data
https://api.osv.dev/v1/vulns/RLSA-2022:1964
Related
Published
2022-05-10T06:41:48Z
Modified
2023-02-02T13:39:11.715783Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Moderate: fetchmail security update
Details

Fetchmail is a remote mail retrieval and forwarding utility intended for use over on-demand TCP/IP links, like SLIP or PPP connections. Fetchmail supports every remote-mail protocol currently in use on the Internet (POP2, POP3, RPOP, APOP, KPOP, all IMAPs, ESMTP ETRN, IPv6, and IPSEC) for retrieval. Then Fetchmail forwards the mail through SMTP so the user can read it through their favorite mail client.

Security Fix(es):

  • fetchmail: DoS or information disclosure when logging long messages (CVE-2021-36386)

  • fetchmail: STARTTLS session encryption bypassing (CVE-2021-39272)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:8 / fetchmail

Package

Name
fetchmail
Purl
pkg:rpm/rocky-linux/fetchmail?distro=rocky-linux-8&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:6.4.24-1.el8