Описание
Security update for dovecot23
This update for dovecot23 fixes the following issues:
- CVE-2021-29157: Local attacker can login as any user and access their emails (bsc#1187418)
- CVE-2021-33515: Attacker can potentially steal user credentials and mails (bsc#1187419)
Список пакетов
openSUSE Leap 15.3
dovecot23-2.3.11.3-55.1
dovecot23-backend-mysql-2.3.11.3-55.1
dovecot23-backend-pgsql-2.3.11.3-55.1
dovecot23-backend-sqlite-2.3.11.3-55.1
dovecot23-devel-2.3.11.3-55.1
dovecot23-fts-2.3.11.3-55.1
dovecot23-fts-lucene-2.3.11.3-55.1
dovecot23-fts-solr-2.3.11.3-55.1
dovecot23-fts-squat-2.3.11.3-55.1
Ссылки
- E-Mail link for openSUSE-SU-2021:2123-1
- SUSE Security Ratings
- SUSE Bug 1187418
- SUSE Bug 1187419
- SUSE CVE CVE-2021-29157 page
- SUSE CVE CVE-2021-33515 page
Описание
Dovecot before 2.3.15 allows ../ Path Traversal. An attacker with access to the local filesystem can trick OAuth2 authentication into using an HS256 validation key from an attacker-controlled location. This occurs during use of local JWT validation with the posix fs driver.
Затронутые продукты
openSUSE Leap 15.3:dovecot23-2.3.11.3-55.1
openSUSE Leap 15.3:dovecot23-backend-mysql-2.3.11.3-55.1
openSUSE Leap 15.3:dovecot23-backend-pgsql-2.3.11.3-55.1
openSUSE Leap 15.3:dovecot23-backend-sqlite-2.3.11.3-55.1
Ссылки
- CVE-2021-29157
- SUSE Bug 1187418
Описание
The submission service in Dovecot before 2.3.15 allows STARTTLS command injection in lib-smtp. Sensitive information can be redirected to an attacker-controlled address.
Затронутые продукты
openSUSE Leap 15.3:dovecot23-2.3.11.3-55.1
openSUSE Leap 15.3:dovecot23-backend-mysql-2.3.11.3-55.1
openSUSE Leap 15.3:dovecot23-backend-pgsql-2.3.11.3-55.1
openSUSE Leap 15.3:dovecot23-backend-sqlite-2.3.11.3-55.1
Ссылки
- CVE-2021-33515
- SUSE Bug 1187419