FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-11-01 00:46:00 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
14908bda-232b-11ef-b621-00155d645102cyrus-imapd -- unbounded memory allocation

Cyrus IMAP 3.8.3 Release Notes states:

Fixed CVE-2024-34055: Cyrus-IMAP through 3.8.2 and 3.10.0-beta2 allow authenticated attackers to cause unbounded memory allocation by sending many LITERALs in a single command.

The IMAP protocol allows for command arguments to be LITERALs of negotiated length, and for these the server allocates memory to receive the content before instructing the client to proceed. The allocated memory is released when the whole command has been received and processed.

The IMAP protocol has a number commands that specify an unlimited number of arguments, for example SEARCH. Each of these arguments can be a LITERAL, for which memory will be allocated and not released until the entire command has been received and processed. This can run a server out of memory, with varying consequences depending on the server's OOM policy.


Discovery 2024-04-30
Entry 2024-06-05
cyrus-imapd38
< 3.8.2_1

cyrus-imapd36
< 3.6.4_1

cyrus-imapd34
< 3.4.7_1

cyrus-imapd32
cyrus-imapd30
cyrus-imapd25
> 0

CVE-2024-34055
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34055
3d915d96-0b1f-11ec-8d9f-080027415d17cyrus-imapd -- multiple-minute daemon hang via input that is mishandled during hash-table interaction

Cyrus IMAP 3.4.2 Release Notes states:

Fixed CVE-2021-33582: Certain user inputs are used as hash table keys during processing. A poorly chosen string hashing algorithm meant that the user could control which bucket their data was stored in, allowing a malicious user to direct many inputs to a single bucket. Each subsequent insertion to the same bucket requires a strcmp of every other entry in it. At tens of thousands of entries, each new insertion could keep the CPU busy in a strcmp loop for minutes. The string hashing algorithm has been replaced with a better one, and now also uses a random seed per hash table, so malicious inputs cannot be precomputed.


Discovery 2021-05-26
Entry 2021-09-01
cyrus-imapd34
< 3.4.2

cyrus-imapd32
< 3.2.8

cyrus-imapd30
< 3.0.16

cyrus-imapd25
cyrus-imapd24
cyrus-imapd23
> 0

CVE-2021-33582
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33582