The while() loop at auth_rimap.c:496 (upstream) in cyrus-sasl2 2.1.26 has incorrect exit criteria -- if the socket is closed and the fd is at EOF the loop will not exit. This causes auth_rimap to go into an infinite loop as its criteria for if data is available on the socket is incorrect. Reference: https://bugzilla.redhat.com/show_bug.cgi?id=1636824
Created cyrus-sasl tracking bugs for this issue: Affects: fedora-all [bug 1725498]
Analysis: This issue only affects cyrus-sasl configured to authenticate via remote IMAP server. Other authentication methods are not affected by this flaw. This bug was introduced by the patch for upstream bug #3211, included in cyrus-sasl2 2.1.26. The while() loop at auth_rimap.c:496 (upstream) has incorrect exit criteria -- if the socket is closed and the fd is at EOF the loop will not exit. This issue was fixed in the upstream version 2.1.27.
This vulnerability is out of security support scope for the following products: * Red Hat Enterprise Application Platform 5 * Red Hat Enterprise Application Platform 6 * Red Hat JBoss Enterprise Web Server 2 Please refer to https://access.redhat.com/support/policy/updates/jboss_notes for more details.
Statement: Red Hat Virtualization Hypervisor includes the cyrus-sasl package as a dependency of postfix, but it is not enabled in the supported configuration.