On Sat, Jul 17, 2021 at 09:05:32PM +0200, Salvatore Bonaccorso wrote:
> > CVE-2021-33515[0]:
> > | The submission service in Dovecot before 2.3.15 allows STARTTLS
> > | command injection in lib-smtp. Sensitive information can be redirected
> > | to an attacker-controlled address.
> > 
> > https://dovecot.org/pipermail/dovecot-news/2021-June/000462.html
> > https://www.openwall.com/lists/oss-security/2021/06/28/2
> > 
> > 
> > CVE-2021-29157[1]:
> > | Dovecot before 2.3.15 allows ../ Path Traversal. An attacker with
> > | access to the local filesystem can trick OAuth2 authentication into
> > | using an HS256 validation key from an attacker-controlled location.
> > | This occurs during use of local JWT validation with the posix fs
> > | driver.
> > 
> > https://dovecot.org/pipermail/dovecot-news/2021-June/000461.html
> > https://www.openwall.com/lists/oss-security/2021/06/28/1
> > 
> > 
> > CVE-2020-28200[2]:
> > | The Sieve engine in Dovecot before 2.3.15 allows Uncontrolled Resource
> > | Consumption, as demonstrated by a situation with a complex regular
> > | expression for the regex extension.
> > 
> > https://dovecot.org/pipermail/dovecot-news/2021-June/000460.html
> > https://www.openwall.com/lists/oss-security/2021/06/28/3
> > 
> >     
> > If you fix the vulnerabilities please also make sure to include the
> > CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.
> > 
> > For further information see:
> > 
> > [0] https://security-tracker.debian.org/tracker/CVE-2021-33515
> >     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33515
> > [1] https://security-tracker.debian.org/tracker/CVE-2021-29157
> >     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29157
> > [2] https://security-tracker.debian.org/tracker/CVE-2020-28200
> >     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28200
> > 
> > Please adjust the affected versions in the BTS as needed.
> 
> Do you have a chance to try to get this yet in time for bullseye? Do
> you have time for it (I do agree the time is now very tight).

It's not clear if I'll be able to get this fixed ahead of the release,
but I am working on it.  The individual upstream git commits aren't
easily correlated with the CVEs, and there's a lot of modified context,
making it difficult to cherry-pick individual changes even when they can
be identified.

Stay tuned...

noah

Reply via email to