SUSE-SU-2017:3231-1

Source
https://www.suse.com/support/update/announcement/2017/suse-su-20173231-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2017:3231-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/SUSE-SU-2017:3231-1
Related
Published
2017-12-07T14:27:27Z
Modified
2025-05-08T17:03:09.577615Z
Upstream
Summary
Security update for procmail
Details

This update for procmail fixes the following issues:

Security issue fixed:

  • CVE-2017-16844: Heap-based buffer overflow in the loadbuf function in formisc.c in formail in procmail 3.22 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted e-mail message because of a hardcoded realloc size, a different vulnerability than CVE-2014-3618. (bnc#1068648)
References

Affected packages

SUSE:Linux Enterprise Server 11 SP4 / procmail

Package

Name
procmail
Purl
pkg:rpm/suse/procmail&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.22-240.8.3.1

Ecosystem specific

{
    "binaries": [
        {
            "procmail": "3.22-240.8.3.1"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 11 SP4 / procmail

Package

Name
procmail
Purl
pkg:rpm/suse/procmail&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.22-240.8.3.1

Ecosystem specific

{
    "binaries": [
        {
            "procmail": "3.22-240.8.3.1"
        }
    ]
}