Attacker can send a specifically crafted message before authentication that causes managesieve to allocate large amount of memory. Attacker can force managesieve-login to be unavailable by repeatedly crashing the process. Protect access to managesieve protocol, or install fixed version. No publicly available exploits are known.
This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2026:13498 https://access.redhat.com/errata/RHSA-2026:13498
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2026:13830 https://access.redhat.com/errata/RHSA-2026:13830
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2026:13857 https://access.redhat.com/errata/RHSA-2026:13857
This issue has been addressed in the following products: Red Hat Enterprise Linux 10.0 Extended Update Support Via RHSA-2026:17602 https://access.redhat.com/errata/RHSA-2026:17602
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions Via RHSA-2026:17630 https://access.redhat.com/errata/RHSA-2026:17630
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.4 Extended Update Support Via RHSA-2026:17625 https://access.redhat.com/errata/RHSA-2026:17625
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions Via RHSA-2026:17628 https://access.redhat.com/errata/RHSA-2026:17628
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.6 Extended Update Support Via RHSA-2026:17626 https://access.redhat.com/errata/RHSA-2026:17626
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions Red Hat Enterprise Linux 8.8 Telecommunications Update Service Via RHSA-2026:18053 https://access.redhat.com/errata/RHSA-2026:18053