SB2022100550 - SUSE Linux Enterprise Module for Legacy Software 12 update for sendmail
Published: October 5, 2022
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Security features bypass (CVE-ID: N/A)
The vulnerability allows a remote attacker to disable TLS encryption.
The vulnerability exists due to an error related to SMTP session reuse. If sendmail tries to reuse an SMTP session which had already been closed by the server, then the connection cache can have invalid information about the session. As a result, STARTTLS is never used for the new session, even if offered by the peer.
Remediation
Install update from vendor's website.