dovecot: CVE-2019-11494 CVE-2019-11499

Related Vulnerabilities: CVE-2019-11494   CVE-2019-11499  

Debian Bug report logs - #928235
dovecot: CVE-2019-11494 CVE-2019-11499

version graph

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Tue, 30 Apr 2019 14:03:02 UTC

Severity: grave

Tags: security, upstream

Found in version dovecot/1:2.3.4.1-4

Fixed in version dovecot/1:2.3.4.1-5

Done: Apollon Oikonomopoulos <apoikos@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, team@security.debian.org, Dovecot Maintainers <dovecot@packages.debian.org>:
Bug#928235; Package src:dovecot. (Tue, 30 Apr 2019 14:03:04 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, team@security.debian.org, Dovecot Maintainers <dovecot@packages.debian.org>. (Tue, 30 Apr 2019 14:03:04 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: dovecot: CVE-2019-11494 CVE-2019-11499
Date: Tue, 30 Apr 2019 15:59:10 +0200
Source: dovecot
Version: 1:2.3.4.1-4
Severity: grave
Tags: security upstream
Justification: user security hole

Hi,

The following vulnerabilities were published for dovecot.

CVE-2019-11494[0]:
| Submission-login crashes with signal 11 due to null pointer access
| when authentication is aborted by disconnecting.

CVE-2019-11499[1]:
| Submission-login crashes when authentication is started over TLS
| secured channel and invalid authentication message is sent

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2019-11494
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11494
    https://dovecot.org/pipermail/dovecot/2019-April/115757.html
[1] https://security-tracker.debian.org/tracker/CVE-2019-11499
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11499
    https://dovecot.org/pipermail/dovecot/2019-April/115758.html

Regards,
Salvatore



Reply sent to Apollon Oikonomopoulos <apoikos@debian.org>:
You have taken responsibility. (Tue, 30 Apr 2019 18:51:03 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Tue, 30 Apr 2019 18:51:04 GMT) (full text, mbox, link).


Message #10 received at 928235-close@bugs.debian.org (full text, mbox, reply):

From: Apollon Oikonomopoulos <apoikos@debian.org>
To: 928235-close@bugs.debian.org
Subject: Bug#928235: fixed in dovecot 1:2.3.4.1-5
Date: Tue, 30 Apr 2019 18:48:37 +0000
Source: dovecot
Source-Version: 1:2.3.4.1-5

We believe that the bug you reported is fixed in the latest version of
dovecot, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 928235@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Apollon Oikonomopoulos <apoikos@debian.org> (supplier of updated dovecot package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Tue, 30 Apr 2019 21:26:28 EEST
Source: dovecot
Architecture: source
Version: 1:2.3.4.1-5
Distribution: unstable
Urgency: medium
Maintainer: Dovecot Maintainers <dovecot@packages.debian.org>
Changed-By: Apollon Oikonomopoulos <apoikos@debian.org>
Closes: 928235
Changes:
 dovecot (1:2.3.4.1-5) unstable; urgency=medium
 .
   * [bd00402] Fix CVE-2019-11494 and CVE-2019-11499 (Closes: #928235)
      - submission-login: fix null pointer dereference when client
        disconnects during authentication (CVE-2019-11494)
      - submission-login: fix assert-crash when receiving an invalid
        authentication message over TLS (CVE-2019-11499)
Checksums-Sha256: 
 45fa97e83e60abaf567518a061fc8b30b7cca7a07af475cd7316dc8e449110a5 3590 dovecot_2.3.4.1-5.dsc
 51d4699c3631ca2cb7bcae5ddb9a945b4cd927879ebc4a0c3e9fdc7f4dab425e 533900 dovecot_2.3.4.1-5.debian.tar.xz
 a89ddd4ab25b58a67ee4975a8b6f9316bc656f5cabd725ab27d7317bbf372f50 9024 dovecot_2.3.4.1-5_source.buildinfo
 d244ae94e316e69a1c2fb272cadd71a5c87b4dfa88edfcc511eceb1dd2252c5d 1286 dovecot_2.3.4.1.orig.tar.gz.asc
Checksums-Sha1: 
 5c4c28e1a5440ae449f74f5889e6d81098cd4f2f 3590 dovecot_2.3.4.1-5.dsc
 d84107710a4aa1e948e6ea212c086fa0b20bf5b2 533900 dovecot_2.3.4.1-5.debian.tar.xz
 1722fc76dfbf12976487ecc658d46b841a8978bd 9024 dovecot_2.3.4.1-5_source.buildinfo
 cf6a7d63be252c98b0aeed62fb1e8cea558fd2a1 1286 dovecot_2.3.4.1.orig.tar.gz.asc
Files: 
 320c2f1e20bebdee323da34e0e00ee26 3590 mail optional dovecot_2.3.4.1-5.dsc
 d0a6314f3421f98c319fc36e722beed1 533900 mail optional dovecot_2.3.4.1-5.debian.tar.xz
 66fb79cb18868b42061d768953d89eff 9024 mail optional dovecot_2.3.4.1-5_source.buildinfo
 8c93e4114a2edfd50e881bc0be06e82a 1286 - - dovecot_2.3.4.1.orig.tar.gz.asc

-----BEGIN PGP SIGNATURE-----
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=yxHS
-----END PGP SIGNATURE-----




Information forwarded to debian-bugs-dist@lists.debian.org, Dovecot Maintainers <dovecot@packages.debian.org>:
Bug#928235; Package src:dovecot. (Mon, 06 May 2019 18:33:04 GMT) (full text, mbox, link).


Acknowledgement sent to Bryce Harrington <bryce.harrington@canonical.com>:
Extra info received and forwarded to list. Copy sent to Dovecot Maintainers <dovecot@packages.debian.org>. (Mon, 06 May 2019 18:33:04 GMT) (full text, mbox, link).


Message #15 received at 928235@bugs.debian.org (full text, mbox, reply):

From: Bryce Harrington <bryce.harrington@canonical.com>
To: 928235@bugs.debian.org
Subject: Reason for omission of client-pending patch?
Date: Mon, 6 May 2019 11:30:11 -0700
For CVE-2019-11494, three patches were provided by the vendor:

  https://seclists.org/oss-sec/2019/q2/82

In Ubuntu we included the three patches, but in updating our merge with
Debian I notice you included only the latter two.  Is this because the
first one suppresses a warning, and is considered non-critical?

Thank you,
Bryce



Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Tue, 04 Jun 2019 07:27:00 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 17:27:30 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.