<html>
    <head>
      <base href="https://bugzilla.rosalinux.ru/">
    </head>
    <body><table border="1" cellspacing="0" cellpadding="8">
        <tr>
          <th>Platform</th>
          <td>2021.1
          </td>
        </tr>

        <tr>
          <th>Bug ID</th>
          <td><a class="bz_bug_link 
          bz_status_CONFIRMED "
   title="CONFIRMED - [CVE 21] dovecot 2.3.11.3 CVEs found"
   href="https://bugzilla.rosalinux.ru/show_bug.cgi?id=13517">13517</a>
          </td>
        </tr>

        <tr>
          <th>Summary</th>
          <td>[CVE 21] dovecot 2.3.11.3  CVEs found
          </td>
        </tr>

        <tr>
          <th>Classification</th>
          <td>ROSA-based products
          </td>
        </tr>

        <tr>
          <th>Product</th>
          <td>ROSA Fresh
          </td>
        </tr>

        <tr>
          <th>Version</th>
          <td>All
          </td>
        </tr>

        <tr>
          <th>Hardware</th>
          <td>All
          </td>
        </tr>

        <tr>
          <th>URL</th>
          <td>CVE-2020-24386, CVE-2020-25275, CVE-2020-28200, CVE-2020-7046, CVE-2020-7957, CVE-2021-29157, CVE-2021-33515, CVE-2022-30550,
          </td>
        </tr>

        <tr>
          <th>OS</th>
          <td>Linux
          </td>
        </tr>

        <tr>
          <th>Status</th>
          <td>CONFIRMED
          </td>
        </tr>

        <tr>
          <th>Severity</th>
          <td>normal
          </td>
        </tr>

        <tr>
          <th>Priority</th>
          <td>Normal
          </td>
        </tr>

        <tr>
          <th>Component</th>
          <td>System (kernel, glibc, systemd, bash, PAM...)
          </td>
        </tr>

        <tr>
          <th>Assignee</th>
          <td>bugs&#64;lists.rosalinux.ru
          </td>
        </tr>

        <tr>
          <th>Reporter</th>
          <td>y.tumanov&#64;rosalinux.ru
          </td>
        </tr>

        <tr>
          <th>QA Contact</th>
          <td>bugs&#64;lists.rosalinux.ru
          </td>
        </tr>

        <tr>
          <th>CC</th>
          <td>e.kosachev&#64;rosalinux.ru, s.matveev&#64;rosalinux.ru, y.tumanov&#64;rosalinux.ru
          </td>
        </tr>

        <tr>
          <th>Target Milestone</th>
          <td>---
          </td>
        </tr>

        <tr>
          <th>Flags</th>
          <td>secteam_verified?
          </td>
        </tr></table>
      <p>
        <div>
        <pre>Please patch CVEs for package dovecot version 2.3.11.3

INFO (CVEs are): dovecot 2.3.11.3
 cves found
CVE-2020-24386
Desc: An issue was discovered in Dovecot before 2.3.13. By using IMAP IDLE, an
authenticated attacker can trigger unhibernation via attacker-controlled
parameters, leading to access to other users' email messages (and path
disclosure).
Link: <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-24386">https://nvd.nist.gov/vuln/detail/CVE-2020-24386</a>
Severity: MEDIUM
CVE-2020-25275
Desc: Dovecot before 2.3.13 has Improper Input Validation in lda, lmtp, and
imap, leading to an application crash via a crafted email message with certain
choices for ten thousand MIME parts.
Link: <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25275">https://nvd.nist.gov/vuln/detail/CVE-2020-25275</a>
Severity: HIGH
CVE-2020-28200
Desc: The Sieve engine in Dovecot before 2.3.15 allows Uncontrolled Resource
Consumption, as demonstrated by a situation with a complex regular expression
for the regex extension.
Link: <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-28200">https://nvd.nist.gov/vuln/detail/CVE-2020-28200</a>
Severity: MEDIUM
CVE-2020-7046
Desc: lib-smtp in submission-login and lmtp in Dovecot 2.3.9 before 2.3.9.3
mishandles truncated UTF-8 data in command parameters, as demonstrated by the
unauthenticated triggering of a submission-login infinite loop.
Link: <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-7046">https://nvd.nist.gov/vuln/detail/CVE-2020-7046</a>
Severity: HIGH
CVE-2020-7957
Desc: The IMAP and LMTP components in Dovecot 2.3.9 before 2.3.9.3 mishandle
snippet generation when many characters must be read to compute the snippet and
a trailing &gt; character exists. This causes a denial of service in which the
recipient cannot read all of their messages.
Link: <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-7957">https://nvd.nist.gov/vuln/detail/CVE-2020-7957</a>
Severity: MEDIUM
CVE-2021-29157
Desc: Dovecot before 2.3.15 allows ../ Path Traversal. An attacker with access
to the local filesystem can trick OAuth2 authentication into using an HS256
validation key from an attacker-controlled location. This occurs during use of
local JWT validation with the posix fs driver.
Link: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29157">https://nvd.nist.gov/vuln/detail/CVE-2021-29157</a>
Severity: MEDIUM
CVE-2021-33515
Desc: The submission service in Dovecot before 2.3.15 allows STARTTLS command
injection in lib-smtp. Sensitive information can be redirected to an
attacker-controlled address.
Link: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33515">https://nvd.nist.gov/vuln/detail/CVE-2021-33515</a>
Severity: MEDIUM
CVE-2022-30550
Desc: An issue was discovered in the auth component in Dovecot 2.2 and 2.3
before 2.3.20. When two passdb configuration entries exist with the same driver
and args settings, incorrect username_filter and mechanism settings can be
applied to passdb definitions. These incorrectly applied settings can lead to
an unintended security configuration and can permit privilege escalation in
certain configurations. The documentation does not advise against the use of
passdb definitions that have the same driver and args settings. One such
configuration would be where an administrator wishes to use the same PAM
configuration or passwd file for both normal and master users but use the
username_filter setting to restrict which of the users is able to be a master
user.
Link: <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30550">https://nvd.nist.gov/vuln/detail/CVE-2022-30550</a>
Severity: HIGH</pre>
        </div>
      </p>


      <hr>
      <span>You are receiving this mail because:</span>

      <ul>
          <li>You are the QA Contact for the bug.</li>
          <li>You are the assignee for the bug.</li>
      </ul>
    </body>
</html>